Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    56s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/03/2023, 17:06

General

  • Target

    a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe

  • Size

    530KB

  • MD5

    a9e8bab6da6d60a329faf78e0b2efab2

  • SHA1

    0d49d120d1a34769976e8706f9b753a5de573c2d

  • SHA256

    a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c

  • SHA512

    4f825e6ade660723a53993a7bf7b4155477843b08f53122f5a8e64a6b3aab3b1abd32c357ed40474960de1148f213e76283373b3d9afd9955e7b6338454f9ee8

  • SSDEEP

    12288:tMrfy9045p3D2Ho/ptF/vSs62qPGFSG0gc9N:yyh5MCpmPPGFq7

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 37 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe
    "C:\Users\Admin\AppData\Local\Temp\a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhqw9767Hk.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhqw9767Hk.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf13Iz98KQ34.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf13Iz98KQ34.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03wr94QZ95.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03wr94QZ95.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhBP89vV16xa.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhBP89vV16xa.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhBP89vV16xa.exe

    Filesize

    175KB

    MD5

    96fda0275f5e6d19a55c5b415360862b

    SHA1

    a905088bccd23ba53d083f52d00dc45a3540f8e0

    SHA256

    d7e59e2ee2b7620b003aca4c046199cbaf07ee4bb94326d597e2a86dffe3d71b

    SHA512

    a493847bd64782cfa719acffa191b4980550d23b89021fa3b79321307f12aafd3b71c96b479a14329b7dbb9d516f1109c1bf8e913302c0569667273c86e97f73

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhBP89vV16xa.exe

    Filesize

    175KB

    MD5

    96fda0275f5e6d19a55c5b415360862b

    SHA1

    a905088bccd23ba53d083f52d00dc45a3540f8e0

    SHA256

    d7e59e2ee2b7620b003aca4c046199cbaf07ee4bb94326d597e2a86dffe3d71b

    SHA512

    a493847bd64782cfa719acffa191b4980550d23b89021fa3b79321307f12aafd3b71c96b479a14329b7dbb9d516f1109c1bf8e913302c0569667273c86e97f73

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhqw9767Hk.exe

    Filesize

    386KB

    MD5

    4858894522074c52a70f538747b21c14

    SHA1

    10940bb0911fd476e04f66edefdead440274858d

    SHA256

    d70ef1ec9f18d956dc223661d798b25096a7fe7e570bb17bb6ac11c9c68af007

    SHA512

    043460d9e5101f08767ad336bfe514f80bfb25d031dd19aa877f54e1f1b2e56f43067a7855009ae6f0e6fb4ffc154d7d5aca3bebe953ee3033b3adf29b98db39

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhqw9767Hk.exe

    Filesize

    386KB

    MD5

    4858894522074c52a70f538747b21c14

    SHA1

    10940bb0911fd476e04f66edefdead440274858d

    SHA256

    d70ef1ec9f18d956dc223661d798b25096a7fe7e570bb17bb6ac11c9c68af007

    SHA512

    043460d9e5101f08767ad336bfe514f80bfb25d031dd19aa877f54e1f1b2e56f43067a7855009ae6f0e6fb4ffc154d7d5aca3bebe953ee3033b3adf29b98db39

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf13Iz98KQ34.exe

    Filesize

    11KB

    MD5

    51ca1ac1040845b78480127865ac0378

    SHA1

    3bd4dd4d620728117aa090dc828d17da6f6eb8c8

    SHA256

    27d0fa6fd2d83136684d43fc81540375e2e047e5a1aecd793a576879fd0fd781

    SHA512

    4f9cabf1e71089acbcae35a180226b5fb4dd03f084bab03c85ac10a77545d0730d6cfbd8f80ed85e9337e6f2a99cc5431db90ce892fca908bb09d9c62d5b404d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf13Iz98KQ34.exe

    Filesize

    11KB

    MD5

    51ca1ac1040845b78480127865ac0378

    SHA1

    3bd4dd4d620728117aa090dc828d17da6f6eb8c8

    SHA256

    27d0fa6fd2d83136684d43fc81540375e2e047e5a1aecd793a576879fd0fd781

    SHA512

    4f9cabf1e71089acbcae35a180226b5fb4dd03f084bab03c85ac10a77545d0730d6cfbd8f80ed85e9337e6f2a99cc5431db90ce892fca908bb09d9c62d5b404d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03wr94QZ95.exe

    Filesize

    293KB

    MD5

    dc46cb34b733eb4be1b44f9cc7c7d6e1

    SHA1

    08972fbd4db0346b9a5aa7651f1948e212cbbe6f

    SHA256

    79e234cc24dfe4d038a4e8eeb3f6f993d71c4c7823ae4a7abfc0e149df57103e

    SHA512

    8cf36db8e149189b1262d31be684329159f3fd41b2bbd1a23a91413d821eb7d0b825a467b56e508d921d1464fcaa183424dc05ebe45280dfc389bec65ba1f1b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03wr94QZ95.exe

    Filesize

    293KB

    MD5

    dc46cb34b733eb4be1b44f9cc7c7d6e1

    SHA1

    08972fbd4db0346b9a5aa7651f1948e212cbbe6f

    SHA256

    79e234cc24dfe4d038a4e8eeb3f6f993d71c4c7823ae4a7abfc0e149df57103e

    SHA512

    8cf36db8e149189b1262d31be684329159f3fd41b2bbd1a23a91413d821eb7d0b825a467b56e508d921d1464fcaa183424dc05ebe45280dfc389bec65ba1f1b4

  • memory/2240-137-0x0000000001F60000-0x0000000001FAB000-memory.dmp

    Filesize

    300KB

  • memory/2240-138-0x0000000002590000-0x00000000025D6000-memory.dmp

    Filesize

    280KB

  • memory/2240-139-0x0000000004BE0000-0x00000000050DE000-memory.dmp

    Filesize

    5.0MB

  • memory/2240-140-0x0000000004B10000-0x0000000004B54000-memory.dmp

    Filesize

    272KB

  • memory/2240-141-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-144-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-146-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-142-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-148-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-150-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-152-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-154-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-156-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-159-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-157-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/2240-160-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/2240-162-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/2240-163-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-165-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-167-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-169-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-171-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-173-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-175-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-177-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-179-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-181-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-183-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-185-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-187-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-189-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-191-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-193-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-195-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-197-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-199-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-201-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-203-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-205-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-207-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2240-1050-0x00000000051E0000-0x00000000057E6000-memory.dmp

    Filesize

    6.0MB

  • memory/2240-1051-0x0000000005870000-0x000000000597A000-memory.dmp

    Filesize

    1.0MB

  • memory/2240-1052-0x00000000059B0000-0x00000000059C2000-memory.dmp

    Filesize

    72KB

  • memory/2240-1053-0x00000000059D0000-0x0000000005A0E000-memory.dmp

    Filesize

    248KB

  • memory/2240-1054-0x0000000005B20000-0x0000000005B6B000-memory.dmp

    Filesize

    300KB

  • memory/2240-1055-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/2240-1057-0x0000000005CB0000-0x0000000005D42000-memory.dmp

    Filesize

    584KB

  • memory/2240-1058-0x0000000005D50000-0x0000000005DB6000-memory.dmp

    Filesize

    408KB

  • memory/2240-1059-0x0000000006460000-0x0000000006622000-memory.dmp

    Filesize

    1.8MB

  • memory/2240-1060-0x0000000006630000-0x0000000006B5C000-memory.dmp

    Filesize

    5.2MB

  • memory/2240-1061-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/2240-1062-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/2240-1063-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/2240-1064-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/2240-1065-0x0000000007010000-0x0000000007086000-memory.dmp

    Filesize

    472KB

  • memory/2240-1066-0x00000000070A0000-0x00000000070F0000-memory.dmp

    Filesize

    320KB

  • memory/3040-1072-0x0000000000550000-0x0000000000582000-memory.dmp

    Filesize

    200KB

  • memory/3040-1073-0x0000000004F90000-0x0000000004FDB000-memory.dmp

    Filesize

    300KB

  • memory/3040-1074-0x00000000050D0000-0x00000000050E0000-memory.dmp

    Filesize

    64KB

  • memory/4144-131-0x00000000001D0000-0x00000000001DA000-memory.dmp

    Filesize

    40KB