Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    79s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2023, 12:06

General

  • Target

    55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe

  • Size

    529KB

  • MD5

    c03380a08757332d65b394750f91a03d

  • SHA1

    5091030b592eea675b2f8dddb137bee5acc8bfd7

  • SHA256

    55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f

  • SHA512

    4cd69583da452853f041887c2ee768baa987c3e4f47e44271f97ca5a4a1bd340bb4512ddadf48862b6190b9e3d49184dd0e7a013bb2b782b40d01a722d1faaae

  • SSDEEP

    12288:bMrfy90F5p6ZlCuIRA8iehLel28RQkg/rvQNZR:QyA5pSCBCrehLelzqvEZR

Malware Config

Extracted

Family

redline

Botnet

rulit

C2

pedigj.eu:4162

Attributes
  • auth_value

    f4df9ef56871d4ac883b282abaf635e0

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe
    "C:\Users\Admin\AppData\Local\Temp\55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhNt3677BW.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhNt3677BW.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf70gf15oY20.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf70gf15oY20.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf35Uw41EO94.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf35Uw41EO94.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5084
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 1604
          4⤵
          • Program crash
          PID:5012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhZC97fR93lZ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhZC97fR93lZ.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2580
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5084 -ip 5084
    1⤵
      PID:212

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhZC97fR93lZ.exe

      Filesize

      175KB

      MD5

      b060f8b79e8314205889a7f7472c0f99

      SHA1

      1b0d30a26a848c628d56952b366f5ef6bc8544bd

      SHA256

      26b591919dd56618debd75b42e733ddf15d44ea24002e1a658529c2014cbef5a

      SHA512

      5cba2545c28f358ed68bd7991b780203647a7934138e6955c5522261fb68b26a68622edfe6d6f3c3ceeb76395a3dc55aad1bb52829282f31f37874c5e9e0c44c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhZC97fR93lZ.exe

      Filesize

      175KB

      MD5

      b060f8b79e8314205889a7f7472c0f99

      SHA1

      1b0d30a26a848c628d56952b366f5ef6bc8544bd

      SHA256

      26b591919dd56618debd75b42e733ddf15d44ea24002e1a658529c2014cbef5a

      SHA512

      5cba2545c28f358ed68bd7991b780203647a7934138e6955c5522261fb68b26a68622edfe6d6f3c3ceeb76395a3dc55aad1bb52829282f31f37874c5e9e0c44c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhNt3677BW.exe

      Filesize

      385KB

      MD5

      d704129c756203d44a9f1e7732560890

      SHA1

      e2c65ec33aea6129b9c93ba764f105f37e66a426

      SHA256

      9febb7c674b3f933ebddea0dfcd82b5e13dd6eb63d387899c951e347c9145798

      SHA512

      75af8e089ca388712338871897c595e6aee1c06eebf790f9541d599094e436161dc9e79402ab035ceb364c3b1519d1ed6cf7116eb0c2f896ca6e4d851280af42

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhNt3677BW.exe

      Filesize

      385KB

      MD5

      d704129c756203d44a9f1e7732560890

      SHA1

      e2c65ec33aea6129b9c93ba764f105f37e66a426

      SHA256

      9febb7c674b3f933ebddea0dfcd82b5e13dd6eb63d387899c951e347c9145798

      SHA512

      75af8e089ca388712338871897c595e6aee1c06eebf790f9541d599094e436161dc9e79402ab035ceb364c3b1519d1ed6cf7116eb0c2f896ca6e4d851280af42

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf70gf15oY20.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf70gf15oY20.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf35Uw41EO94.exe

      Filesize

      293KB

      MD5

      ba27de08c518617ba15853a0f54717dd

      SHA1

      4f580231136fbbed921ac592a61a15be24b7d3bd

      SHA256

      35486d1f9ba6027805e7f437b7de245dbc75b6158001028ef162f4afcb1e256c

      SHA512

      8f60ca7fef2432843df136a0cc93b0b5ff650a130af00ae0ee28818da8f42886225f082ae4a71c33818d4d48e4eebbce86a6325c6a9181119919ea5dd2e2141c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf35Uw41EO94.exe

      Filesize

      293KB

      MD5

      ba27de08c518617ba15853a0f54717dd

      SHA1

      4f580231136fbbed921ac592a61a15be24b7d3bd

      SHA256

      35486d1f9ba6027805e7f437b7de245dbc75b6158001028ef162f4afcb1e256c

      SHA512

      8f60ca7fef2432843df136a0cc93b0b5ff650a130af00ae0ee28818da8f42886225f082ae4a71c33818d4d48e4eebbce86a6325c6a9181119919ea5dd2e2141c

    • memory/1372-147-0x0000000000D70000-0x0000000000D7A000-memory.dmp

      Filesize

      40KB

    • memory/2580-1085-0x00000000008D0000-0x0000000000902000-memory.dmp

      Filesize

      200KB

    • memory/2580-1086-0x00000000051D0000-0x00000000051E0000-memory.dmp

      Filesize

      64KB

    • memory/5084-189-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-201-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-155-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/5084-156-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/5084-157-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/5084-158-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-159-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-161-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-163-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-165-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-167-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-169-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-171-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-173-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-175-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-177-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-179-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-181-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-183-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-185-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-187-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-153-0x0000000004C80000-0x0000000005224000-memory.dmp

      Filesize

      5.6MB

    • memory/5084-191-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-193-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-197-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-195-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-199-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-154-0x0000000000590000-0x00000000005DB000-memory.dmp

      Filesize

      300KB

    • memory/5084-203-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-205-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-207-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-209-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-211-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-213-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-215-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-217-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-219-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-221-0x0000000004B40000-0x0000000004B7E000-memory.dmp

      Filesize

      248KB

    • memory/5084-1064-0x0000000005330000-0x0000000005948000-memory.dmp

      Filesize

      6.1MB

    • memory/5084-1065-0x0000000005970000-0x0000000005A7A000-memory.dmp

      Filesize

      1.0MB

    • memory/5084-1066-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

      Filesize

      72KB

    • memory/5084-1067-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

      Filesize

      240KB

    • memory/5084-1068-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/5084-1070-0x0000000005DD0000-0x0000000005E62000-memory.dmp

      Filesize

      584KB

    • memory/5084-1071-0x0000000005E70000-0x0000000005ED6000-memory.dmp

      Filesize

      408KB

    • memory/5084-1072-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/5084-1073-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/5084-1074-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/5084-1075-0x0000000006580000-0x0000000006742000-memory.dmp

      Filesize

      1.8MB

    • memory/5084-1076-0x0000000006760000-0x0000000006C8C000-memory.dmp

      Filesize

      5.2MB

    • memory/5084-1077-0x0000000007020000-0x0000000007096000-memory.dmp

      Filesize

      472KB

    • memory/5084-1078-0x00000000070A0000-0x00000000070F0000-memory.dmp

      Filesize

      320KB

    • memory/5084-1079-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB