Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2023, 12:19

General

  • Target

    45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe

  • Size

    560KB

  • MD5

    a721237fc59826593b16e05a77c9936c

  • SHA1

    498bcc6de832789d8bd6cbd941a7e62164e6c041

  • SHA256

    45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b

  • SHA512

    72cfb4d3bd17f84fd875f0729f5efa2cac1f32c0d39c86f404e4dc7103e2770bd93187a8c3c3bbcc75b688c4d7e10b43798a10e1097c9cb0bb8f691174c5c977

  • SSDEEP

    12288:jMrGy90kTg90DFAtleqvYmb+eB853zqtd8MeLbWgnC0:FyHkeDStlzvYqsJi8MUbxC0

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe
    "C:\Users\Admin\AppData\Local\Temp\45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhtD5163dm.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhtD5163dm.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf37Et27Wx29.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf37Et27Wx29.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf72kw99bn23.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf72kw99bn23.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4872
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 1356
          4⤵
          • Program crash
          PID:1224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhKq73SI34hE.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhKq73SI34hE.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:736
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4872 -ip 4872
    1⤵
      PID:2644

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhKq73SI34hE.exe

      Filesize

      176KB

      MD5

      ec802e335ad7e28e542dedadf5f4fd6f

      SHA1

      3413cf46b9f3baa7e5f661c2c87790f3ae20d3cd

      SHA256

      c15d54bd696064e2fc042f78a8d73f9ee64a4f083d38b70659684b0107aa76be

      SHA512

      ec4ed534e51c57c444dec3727a9dc7823f01bb86a2e446871c7392ce67068b7774428735fb42301bd60fcefd341209b5bbb90d2e1731c30b008e5bcb0d154045

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhKq73SI34hE.exe

      Filesize

      176KB

      MD5

      ec802e335ad7e28e542dedadf5f4fd6f

      SHA1

      3413cf46b9f3baa7e5f661c2c87790f3ae20d3cd

      SHA256

      c15d54bd696064e2fc042f78a8d73f9ee64a4f083d38b70659684b0107aa76be

      SHA512

      ec4ed534e51c57c444dec3727a9dc7823f01bb86a2e446871c7392ce67068b7774428735fb42301bd60fcefd341209b5bbb90d2e1731c30b008e5bcb0d154045

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhtD5163dm.exe

      Filesize

      416KB

      MD5

      3807fccbf75d9af066b5806228a8e22a

      SHA1

      7150b1585a9c800f6ff5b7dbee6af4196996a719

      SHA256

      4c8aa517f37d1687b59afc2e7fe24ecd40e02e2a6655841868192f203961bfc2

      SHA512

      54f09c6a795596a65c2b966e37bb81c1b50b50ecad69efe85136a99d6c3e7e5a5f35f2d765f8d6711bc4fb5aa017fb715621d699d79200695ca1fe1c4dd16eef

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhtD5163dm.exe

      Filesize

      416KB

      MD5

      3807fccbf75d9af066b5806228a8e22a

      SHA1

      7150b1585a9c800f6ff5b7dbee6af4196996a719

      SHA256

      4c8aa517f37d1687b59afc2e7fe24ecd40e02e2a6655841868192f203961bfc2

      SHA512

      54f09c6a795596a65c2b966e37bb81c1b50b50ecad69efe85136a99d6c3e7e5a5f35f2d765f8d6711bc4fb5aa017fb715621d699d79200695ca1fe1c4dd16eef

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf37Et27Wx29.exe

      Filesize

      11KB

      MD5

      5bf6bc3d5a8523694995b75a9a2f132f

      SHA1

      ad56cb421bc1e1fb54f6328d79a3c8fab167d72d

      SHA256

      1750c0ac6b1ac15d6764a920221efd05b1d5272ebb3ade0ce327142bc9097db2

      SHA512

      41e33b009a5ab6bce5ebe4d2f28190debe59b8728ba7384a5e42f40b5594a9ee270f19f91856ba915ce3d84735bb2de96f1c888076798be6e9b7c485e5b7a302

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf37Et27Wx29.exe

      Filesize

      11KB

      MD5

      5bf6bc3d5a8523694995b75a9a2f132f

      SHA1

      ad56cb421bc1e1fb54f6328d79a3c8fab167d72d

      SHA256

      1750c0ac6b1ac15d6764a920221efd05b1d5272ebb3ade0ce327142bc9097db2

      SHA512

      41e33b009a5ab6bce5ebe4d2f28190debe59b8728ba7384a5e42f40b5594a9ee270f19f91856ba915ce3d84735bb2de96f1c888076798be6e9b7c485e5b7a302

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf72kw99bn23.exe

      Filesize

      416KB

      MD5

      197d8f3be31e2a0e255e510348dccf49

      SHA1

      c55404597c3904b99ebb6eac727feeef78fda213

      SHA256

      e0f10554868f152ebcb4cbc700ca36c4e4661b8211b6af815c2e028ebb8da58c

      SHA512

      efd1b3f491868fa6b90876b8357a551d381f710016a5f398c1e0d273828bd42c4d9d4bfc3eaa98a65461b7b95811bf577f96cb45480b3c395fefb76ccdcbafc2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf72kw99bn23.exe

      Filesize

      416KB

      MD5

      197d8f3be31e2a0e255e510348dccf49

      SHA1

      c55404597c3904b99ebb6eac727feeef78fda213

      SHA256

      e0f10554868f152ebcb4cbc700ca36c4e4661b8211b6af815c2e028ebb8da58c

      SHA512

      efd1b3f491868fa6b90876b8357a551d381f710016a5f398c1e0d273828bd42c4d9d4bfc3eaa98a65461b7b95811bf577f96cb45480b3c395fefb76ccdcbafc2

    • memory/736-1084-0x0000000000A30000-0x0000000000A62000-memory.dmp

      Filesize

      200KB

    • memory/736-1085-0x0000000005690000-0x00000000056A0000-memory.dmp

      Filesize

      64KB

    • memory/1312-147-0x0000000000380000-0x000000000038A000-memory.dmp

      Filesize

      40KB

    • memory/4872-189-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/4872-197-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-155-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-156-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-158-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-160-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-162-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-164-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-166-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-168-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-170-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-172-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-174-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-176-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-178-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-180-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-182-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-184-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-186-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/4872-153-0x0000000002CC0000-0x0000000002D0B000-memory.dmp

      Filesize

      300KB

    • memory/4872-190-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-191-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/4872-193-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-187-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-195-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-154-0x0000000007300000-0x00000000078A4000-memory.dmp

      Filesize

      5.6MB

    • memory/4872-199-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-201-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-203-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-205-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-209-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-211-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-207-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-213-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-215-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-217-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-219-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-221-0x00000000078B0000-0x00000000078EE000-memory.dmp

      Filesize

      248KB

    • memory/4872-1064-0x0000000007920000-0x0000000007F38000-memory.dmp

      Filesize

      6.1MB

    • memory/4872-1065-0x0000000007FC0000-0x00000000080CA000-memory.dmp

      Filesize

      1.0MB

    • memory/4872-1066-0x0000000008100000-0x0000000008112000-memory.dmp

      Filesize

      72KB

    • memory/4872-1067-0x0000000008120000-0x000000000815C000-memory.dmp

      Filesize

      240KB

    • memory/4872-1068-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/4872-1069-0x0000000008410000-0x00000000084A2000-memory.dmp

      Filesize

      584KB

    • memory/4872-1070-0x00000000084B0000-0x0000000008516000-memory.dmp

      Filesize

      408KB

    • memory/4872-1072-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/4872-1073-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/4872-1074-0x0000000008CB0000-0x0000000008D26000-memory.dmp

      Filesize

      472KB

    • memory/4872-1075-0x0000000008D40000-0x0000000008D90000-memory.dmp

      Filesize

      320KB

    • memory/4872-1076-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/4872-1077-0x0000000008F10000-0x00000000090D2000-memory.dmp

      Filesize

      1.8MB

    • memory/4872-1078-0x00000000090E0000-0x000000000960C000-memory.dmp

      Filesize

      5.2MB