Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2023, 11:45

General

  • Target

    4db2fb89c3836236db86b26f04732827f408a164d60468b5b7029052394df34d.exe

  • Size

    530KB

  • MD5

    be3133127c1f9d7e9d26a2adbefc8109

  • SHA1

    e0f7dbcc327d0523d12e1a4825814f2ff4790207

  • SHA256

    4db2fb89c3836236db86b26f04732827f408a164d60468b5b7029052394df34d

  • SHA512

    c58526439ada1a75e3014fb6a5dbc470141fd8669abc7754a1c1c50481f1db7ea591317f06f1ed9870502ca47731fed211ed5cbcfbbe2585970105f9860677ce

  • SSDEEP

    12288:cMrhy90PAiyVd5vlysLFgnEEG8hVRKkjZ1qfZ:NydtVbvlysLSnRhKkjZ1qfZ

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4db2fb89c3836236db86b26f04732827f408a164d60468b5b7029052394df34d.exe
    "C:\Users\Admin\AppData\Local\Temp\4db2fb89c3836236db86b26f04732827f408a164d60468b5b7029052394df34d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkdW2402pp.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkdW2402pp.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw85ly31yN50.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw85ly31yN50.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2288
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkQZ45XG53pq.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkQZ45XG53pq.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1792
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 1396
          4⤵
          • Program crash
          PID:4944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upSS77te31NA.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upSS77te31NA.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4516
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1792 -ip 1792
    1⤵
      PID:1416
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:5104

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upSS77te31NA.exe

      Filesize

      175KB

      MD5

      75ced8ad0d8cd237ebc9cb7b00852651

      SHA1

      adab63df3e0a40fd9f170ab57da66f01f226141c

      SHA256

      a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

      SHA512

      f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upSS77te31NA.exe

      Filesize

      175KB

      MD5

      75ced8ad0d8cd237ebc9cb7b00852651

      SHA1

      adab63df3e0a40fd9f170ab57da66f01f226141c

      SHA256

      a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

      SHA512

      f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkdW2402pp.exe

      Filesize

      385KB

      MD5

      d53dc872572d1921eb5068df3e383ea5

      SHA1

      8628e96fa93383ff13f8c32b99b2de8c887f4439

      SHA256

      5d2504ffe9be6c6677a3d96ea34adb5f2d5eb12ff65a60620a9871f97ee596c0

      SHA512

      2be4a92e50e587c8b492b96a76cdda2336825ba6f4bfb354375626713c9db306a48606ff4cd294f883789ded3cc1dda01c5a5043ab6308732ec907c09eefd66a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkdW2402pp.exe

      Filesize

      385KB

      MD5

      d53dc872572d1921eb5068df3e383ea5

      SHA1

      8628e96fa93383ff13f8c32b99b2de8c887f4439

      SHA256

      5d2504ffe9be6c6677a3d96ea34adb5f2d5eb12ff65a60620a9871f97ee596c0

      SHA512

      2be4a92e50e587c8b492b96a76cdda2336825ba6f4bfb354375626713c9db306a48606ff4cd294f883789ded3cc1dda01c5a5043ab6308732ec907c09eefd66a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw85ly31yN50.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw85ly31yN50.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkQZ45XG53pq.exe

      Filesize

      289KB

      MD5

      80ad78834be0ad9185b162f76f1a7e45

      SHA1

      a8c8609a21d6604ec0ae56e3f0c207efaf49c834

      SHA256

      6075119c12150786e65a66d8d4029583d731a576d624f23f1d98e7b3d52bf985

      SHA512

      19ce0b292ddd80090af629465d83a68fb89a0d1b2f80ec183fe0759ee358095dca2107bc99596059bace41472dc617661a4d68086b3b6866d47c07187245cd88

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkQZ45XG53pq.exe

      Filesize

      289KB

      MD5

      80ad78834be0ad9185b162f76f1a7e45

      SHA1

      a8c8609a21d6604ec0ae56e3f0c207efaf49c834

      SHA256

      6075119c12150786e65a66d8d4029583d731a576d624f23f1d98e7b3d52bf985

      SHA512

      19ce0b292ddd80090af629465d83a68fb89a0d1b2f80ec183fe0759ee358095dca2107bc99596059bace41472dc617661a4d68086b3b6866d47c07187245cd88

    • memory/1792-153-0x0000000004B60000-0x0000000005104000-memory.dmp

      Filesize

      5.6MB

    • memory/1792-154-0x00000000006C0000-0x000000000070B000-memory.dmp

      Filesize

      300KB

    • memory/1792-155-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/1792-156-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/1792-157-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-158-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-160-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-162-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-164-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-166-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-168-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-170-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-172-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-174-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-176-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-178-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-180-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-182-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-184-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-186-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-188-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-190-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-192-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-194-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-196-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-198-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-200-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-202-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-204-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-206-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-208-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-210-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-212-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-214-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-216-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-218-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-220-0x0000000005150000-0x000000000518E000-memory.dmp

      Filesize

      248KB

    • memory/1792-1063-0x0000000005190000-0x00000000057A8000-memory.dmp

      Filesize

      6.1MB

    • memory/1792-1064-0x0000000005830000-0x000000000593A000-memory.dmp

      Filesize

      1.0MB

    • memory/1792-1065-0x0000000005970000-0x0000000005982000-memory.dmp

      Filesize

      72KB

    • memory/1792-1066-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/1792-1067-0x0000000005990000-0x00000000059CC000-memory.dmp

      Filesize

      240KB

    • memory/1792-1069-0x0000000005C90000-0x0000000005D22000-memory.dmp

      Filesize

      584KB

    • memory/1792-1070-0x0000000005D30000-0x0000000005D96000-memory.dmp

      Filesize

      408KB

    • memory/1792-1071-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/1792-1072-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/1792-1073-0x0000000006420000-0x0000000006496000-memory.dmp

      Filesize

      472KB

    • memory/1792-1074-0x00000000064B0000-0x0000000006500000-memory.dmp

      Filesize

      320KB

    • memory/1792-1075-0x0000000006770000-0x0000000006932000-memory.dmp

      Filesize

      1.8MB

    • memory/1792-1076-0x0000000006940000-0x0000000006E6C000-memory.dmp

      Filesize

      5.2MB

    • memory/1792-1077-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/2288-147-0x00000000008D0000-0x00000000008DA000-memory.dmp

      Filesize

      40KB

    • memory/4516-1083-0x0000000000520000-0x0000000000552000-memory.dmp

      Filesize

      200KB

    • memory/4516-1084-0x00000000050F0000-0x0000000005100000-memory.dmp

      Filesize

      64KB

    • memory/4516-1085-0x00000000050F0000-0x0000000005100000-memory.dmp

      Filesize

      64KB