Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2023, 23:10

General

  • Target

    0029b23940e0cbbdacf0604c801d24624e82c96f9fbcf6d403a2c30f1b92deb0.exe

  • Size

    561KB

  • MD5

    83ec8c47401456f0671acc33a021b3d7

  • SHA1

    5edfb84331bd873f5b75fb93ae7025632e92943a

  • SHA256

    0029b23940e0cbbdacf0604c801d24624e82c96f9fbcf6d403a2c30f1b92deb0

  • SHA512

    4123d99bd7f32714bfb9bd8df13d80f5ed2d05239ce20629eb0bf31eb6d15c8db019e9ddfa2f0f58ea6293e5b1664c67aec3da186a9a97db989d7d60316a87ac

  • SSDEEP

    12288:aMrVy90cZlcEMRxq+MKiKgb7QCD4y9b2Su4ebvT3a1fCCpmGYIVq:jyx+7Rxq+MKvgb7QCDL9b2J4urK1fCCe

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0029b23940e0cbbdacf0604c801d24624e82c96f9fbcf6d403a2c30f1b92deb0.exe
    "C:\Users\Admin\AppData\Local\Temp\0029b23940e0cbbdacf0604c801d24624e82c96f9fbcf6d403a2c30f1b92deb0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhYv4270eI.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhYv4270eI.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf26XU18Qi05.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf26XU18Qi05.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf16hJ43Gq51.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf16hJ43Gq51.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhYv4270eI.exe

    Filesize

    417KB

    MD5

    63aa80e434ea0b85f540a8ad03389b3f

    SHA1

    f30f6d362fe8942ffd560aafb380fa6510ac004b

    SHA256

    22a721b379494c2c206830782d419b73049a571d9b6c237810ac6b086c605787

    SHA512

    ba53570d411303c00e9ab2b2bbce1e9d3b0a9e349aa225d90304aa9d0063e7544596e0d53a0ccfcc37fa70f225d1855780e9d17cee2dc417f8f4b285fedc867f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhYv4270eI.exe

    Filesize

    417KB

    MD5

    63aa80e434ea0b85f540a8ad03389b3f

    SHA1

    f30f6d362fe8942ffd560aafb380fa6510ac004b

    SHA256

    22a721b379494c2c206830782d419b73049a571d9b6c237810ac6b086c605787

    SHA512

    ba53570d411303c00e9ab2b2bbce1e9d3b0a9e349aa225d90304aa9d0063e7544596e0d53a0ccfcc37fa70f225d1855780e9d17cee2dc417f8f4b285fedc867f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf26XU18Qi05.exe

    Filesize

    11KB

    MD5

    97ac268fb02ea976d6c4045aa62edfe1

    SHA1

    f0734c5a446d420eccab629a61df860df59cba03

    SHA256

    e53c50f5300972cea9cb13404a80f3fd8f93ae5f01a5624c5541d3c7a34c8ee9

    SHA512

    ff1da3484c14825464c3f57dc07fb404af7a6ec517f86bc79d91fc568811ca8fea8443c451efe6e5fc791c5538c4252f163eae9dfe00f84e4ef1d0d141d97601

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf26XU18Qi05.exe

    Filesize

    11KB

    MD5

    97ac268fb02ea976d6c4045aa62edfe1

    SHA1

    f0734c5a446d420eccab629a61df860df59cba03

    SHA256

    e53c50f5300972cea9cb13404a80f3fd8f93ae5f01a5624c5541d3c7a34c8ee9

    SHA512

    ff1da3484c14825464c3f57dc07fb404af7a6ec517f86bc79d91fc568811ca8fea8443c451efe6e5fc791c5538c4252f163eae9dfe00f84e4ef1d0d141d97601

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf16hJ43Gq51.exe

    Filesize

    416KB

    MD5

    3298bce398b0b8db15538825fc22ec70

    SHA1

    97382a7c1ec70bd6549554c69ae3a8b18daddc9c

    SHA256

    c85fde6aeb312030435d285771cf28b3aaca92431f2a8e4f50227ddbd05d31fd

    SHA512

    4bcae254153697dfc1d54415b5571cece4cc33f0dec3423d89fa6879238d6939a3e4be6992085e1365f9b7150d64c642d36e694541f0e1eabdf212cabab4f737

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf16hJ43Gq51.exe

    Filesize

    416KB

    MD5

    3298bce398b0b8db15538825fc22ec70

    SHA1

    97382a7c1ec70bd6549554c69ae3a8b18daddc9c

    SHA256

    c85fde6aeb312030435d285771cf28b3aaca92431f2a8e4f50227ddbd05d31fd

    SHA512

    4bcae254153697dfc1d54415b5571cece4cc33f0dec3423d89fa6879238d6939a3e4be6992085e1365f9b7150d64c642d36e694541f0e1eabdf212cabab4f737

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf16hJ43Gq51.exe

    Filesize

    416KB

    MD5

    3298bce398b0b8db15538825fc22ec70

    SHA1

    97382a7c1ec70bd6549554c69ae3a8b18daddc9c

    SHA256

    c85fde6aeb312030435d285771cf28b3aaca92431f2a8e4f50227ddbd05d31fd

    SHA512

    4bcae254153697dfc1d54415b5571cece4cc33f0dec3423d89fa6879238d6939a3e4be6992085e1365f9b7150d64c642d36e694541f0e1eabdf212cabab4f737

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vhYv4270eI.exe

    Filesize

    417KB

    MD5

    63aa80e434ea0b85f540a8ad03389b3f

    SHA1

    f30f6d362fe8942ffd560aafb380fa6510ac004b

    SHA256

    22a721b379494c2c206830782d419b73049a571d9b6c237810ac6b086c605787

    SHA512

    ba53570d411303c00e9ab2b2bbce1e9d3b0a9e349aa225d90304aa9d0063e7544596e0d53a0ccfcc37fa70f225d1855780e9d17cee2dc417f8f4b285fedc867f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vhYv4270eI.exe

    Filesize

    417KB

    MD5

    63aa80e434ea0b85f540a8ad03389b3f

    SHA1

    f30f6d362fe8942ffd560aafb380fa6510ac004b

    SHA256

    22a721b379494c2c206830782d419b73049a571d9b6c237810ac6b086c605787

    SHA512

    ba53570d411303c00e9ab2b2bbce1e9d3b0a9e349aa225d90304aa9d0063e7544596e0d53a0ccfcc37fa70f225d1855780e9d17cee2dc417f8f4b285fedc867f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\sf26XU18Qi05.exe

    Filesize

    11KB

    MD5

    97ac268fb02ea976d6c4045aa62edfe1

    SHA1

    f0734c5a446d420eccab629a61df860df59cba03

    SHA256

    e53c50f5300972cea9cb13404a80f3fd8f93ae5f01a5624c5541d3c7a34c8ee9

    SHA512

    ff1da3484c14825464c3f57dc07fb404af7a6ec517f86bc79d91fc568811ca8fea8443c451efe6e5fc791c5538c4252f163eae9dfe00f84e4ef1d0d141d97601

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf16hJ43Gq51.exe

    Filesize

    416KB

    MD5

    3298bce398b0b8db15538825fc22ec70

    SHA1

    97382a7c1ec70bd6549554c69ae3a8b18daddc9c

    SHA256

    c85fde6aeb312030435d285771cf28b3aaca92431f2a8e4f50227ddbd05d31fd

    SHA512

    4bcae254153697dfc1d54415b5571cece4cc33f0dec3423d89fa6879238d6939a3e4be6992085e1365f9b7150d64c642d36e694541f0e1eabdf212cabab4f737

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf16hJ43Gq51.exe

    Filesize

    416KB

    MD5

    3298bce398b0b8db15538825fc22ec70

    SHA1

    97382a7c1ec70bd6549554c69ae3a8b18daddc9c

    SHA256

    c85fde6aeb312030435d285771cf28b3aaca92431f2a8e4f50227ddbd05d31fd

    SHA512

    4bcae254153697dfc1d54415b5571cece4cc33f0dec3423d89fa6879238d6939a3e4be6992085e1365f9b7150d64c642d36e694541f0e1eabdf212cabab4f737

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf16hJ43Gq51.exe

    Filesize

    416KB

    MD5

    3298bce398b0b8db15538825fc22ec70

    SHA1

    97382a7c1ec70bd6549554c69ae3a8b18daddc9c

    SHA256

    c85fde6aeb312030435d285771cf28b3aaca92431f2a8e4f50227ddbd05d31fd

    SHA512

    4bcae254153697dfc1d54415b5571cece4cc33f0dec3423d89fa6879238d6939a3e4be6992085e1365f9b7150d64c642d36e694541f0e1eabdf212cabab4f737

  • memory/1088-104-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-116-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-85-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB

  • memory/1088-86-0x00000000049E0000-0x0000000004A24000-memory.dmp

    Filesize

    272KB

  • memory/1088-87-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-88-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-90-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-92-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-94-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-96-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-98-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-100-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-102-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-83-0x00000000049A0000-0x00000000049E6000-memory.dmp

    Filesize

    280KB

  • memory/1088-106-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-108-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-110-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-112-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-114-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-84-0x0000000000250000-0x000000000029B000-memory.dmp

    Filesize

    300KB

  • memory/1088-118-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-120-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-122-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-124-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-126-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-132-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-130-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-128-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-134-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-136-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-138-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-140-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-142-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-144-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-146-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-148-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-150-0x00000000049E0000-0x0000000004A1E000-memory.dmp

    Filesize

    248KB

  • memory/1088-993-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB

  • memory/1088-996-0x0000000004BF0000-0x0000000004C30000-memory.dmp

    Filesize

    256KB

  • memory/1172-72-0x0000000000FD0000-0x0000000000FDA000-memory.dmp

    Filesize

    40KB