Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2023, 05:43

General

  • Target

    145bfe003ca5539ec33243be2fe84b2750dad397ebf7d173d5f66e176e605481.exe

  • Size

    549KB

  • MD5

    d9aada7f1b98ae29e104985706300fbc

  • SHA1

    6a7e490aec7775a793bdbeb10d65ce774f878c3a

  • SHA256

    145bfe003ca5539ec33243be2fe84b2750dad397ebf7d173d5f66e176e605481

  • SHA512

    7815039a41539df75e1ed319c6ce9aa76b0b4ca44181bfdf3c15dd5c0d49fc3955d13462ce240147f020c1ea22f96b0466148f91af0ee30fb12c9aed5c283033

  • SSDEEP

    12288:3Mrty90rahimz7AuxqVpWt4Bs9MWmFM7RBZyC:eyGsVAuxYpeKs9rmc5r

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\145bfe003ca5539ec33243be2fe84b2750dad397ebf7d173d5f66e176e605481.exe
    "C:\Users\Admin\AppData\Local\Temp\145bfe003ca5539ec33243be2fe84b2750dad397ebf7d173d5f66e176e605481.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r1171PJ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r1171PJ.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2124
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 1080
        3⤵
        • Program crash
        PID:4808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w14TD96.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w14TD96.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4164
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 1668
        3⤵
        • Program crash
        PID:2700
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2124 -ip 2124
    1⤵
      PID:3472
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4164 -ip 4164
      1⤵
        PID:2564
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:4988

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r1171PJ.exe

        Filesize

        322KB

        MD5

        8141937b23cd1895e561d8e90fdeeff3

        SHA1

        6f810e9e480564f5837461f8ccdd07c951a1bece

        SHA256

        ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

        SHA512

        40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\r1171PJ.exe

        Filesize

        322KB

        MD5

        8141937b23cd1895e561d8e90fdeeff3

        SHA1

        6f810e9e480564f5837461f8ccdd07c951a1bece

        SHA256

        ddda10348c77cf0a1539c3a42ce4f71e2c1895ab9b77348256e0a1f01c0936b6

        SHA512

        40957cd33c4be1dab98ac0c40424c868aa3be6f6265fa28df050e5a4844ac6324acb93770bc6cb7cafedabc93fab9b9179a6e6525f6b3dd6fa9e31b4d5da5bec

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w14TD96.exe

        Filesize

        379KB

        MD5

        e935cb531805420b70cd7602f1284805

        SHA1

        6eaf0dc228800a1bda016f1368ba4673b59e20af

        SHA256

        9d4b73147087b2eb3414050eb9f9de071ce4e6835a336a63696bb1c2efc2b9b7

        SHA512

        645ea4a2dba715da302596975d062c7d4e2ae5de639a1d52324842812e554cd982cbf3cab88e4cdeb1e5e994c4a128a41d175f3748731b5486627d2f4669e529

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w14TD96.exe

        Filesize

        379KB

        MD5

        e935cb531805420b70cd7602f1284805

        SHA1

        6eaf0dc228800a1bda016f1368ba4673b59e20af

        SHA256

        9d4b73147087b2eb3414050eb9f9de071ce4e6835a336a63696bb1c2efc2b9b7

        SHA512

        645ea4a2dba715da302596975d062c7d4e2ae5de639a1d52324842812e554cd982cbf3cab88e4cdeb1e5e994c4a128a41d175f3748731b5486627d2f4669e529

      • memory/2124-141-0x0000000004AA0000-0x0000000005044000-memory.dmp

        Filesize

        5.6MB

      • memory/2124-142-0x00000000005D0000-0x00000000005FD000-memory.dmp

        Filesize

        180KB

      • memory/2124-144-0x0000000002150000-0x0000000002160000-memory.dmp

        Filesize

        64KB

      • memory/2124-145-0x0000000002150000-0x0000000002160000-memory.dmp

        Filesize

        64KB

      • memory/2124-143-0x0000000002150000-0x0000000002160000-memory.dmp

        Filesize

        64KB

      • memory/2124-147-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-146-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-149-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-151-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-153-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-155-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-157-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-159-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-161-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-163-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-165-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-167-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-169-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-171-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-173-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/2124-174-0x0000000000400000-0x00000000004D4000-memory.dmp

        Filesize

        848KB

      • memory/2124-175-0x0000000002150000-0x0000000002160000-memory.dmp

        Filesize

        64KB

      • memory/2124-176-0x0000000002150000-0x0000000002160000-memory.dmp

        Filesize

        64KB

      • memory/2124-177-0x0000000002150000-0x0000000002160000-memory.dmp

        Filesize

        64KB

      • memory/2124-179-0x0000000000400000-0x00000000004D4000-memory.dmp

        Filesize

        848KB

      • memory/4164-184-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-185-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-189-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-187-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-191-0x00000000005C0000-0x000000000060B000-memory.dmp

        Filesize

        300KB

      • memory/4164-192-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-194-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4164-195-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-196-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4164-199-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-198-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4164-201-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-203-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-205-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-207-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-209-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-211-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-213-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-215-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-217-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-219-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-221-0x0000000005050000-0x000000000508E000-memory.dmp

        Filesize

        248KB

      • memory/4164-1094-0x0000000005230000-0x0000000005848000-memory.dmp

        Filesize

        6.1MB

      • memory/4164-1095-0x00000000058D0000-0x00000000059DA000-memory.dmp

        Filesize

        1.0MB

      • memory/4164-1096-0x0000000005A10000-0x0000000005A22000-memory.dmp

        Filesize

        72KB

      • memory/4164-1097-0x0000000005A30000-0x0000000005A6C000-memory.dmp

        Filesize

        240KB

      • memory/4164-1098-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4164-1099-0x0000000005D20000-0x0000000005D86000-memory.dmp

        Filesize

        408KB

      • memory/4164-1100-0x00000000063F0000-0x0000000006482000-memory.dmp

        Filesize

        584KB

      • memory/4164-1102-0x00000000064E0000-0x00000000066A2000-memory.dmp

        Filesize

        1.8MB

      • memory/4164-1103-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4164-1104-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4164-1105-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4164-1106-0x00000000066C0000-0x0000000006BEC000-memory.dmp

        Filesize

        5.2MB

      • memory/4164-1107-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4164-1108-0x00000000070B0000-0x0000000007126000-memory.dmp

        Filesize

        472KB

      • memory/4164-1109-0x0000000007140000-0x0000000007190000-memory.dmp

        Filesize

        320KB