Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    252s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/03/2023, 05:06

General

  • Target

    e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe

  • Size

    810KB

  • MD5

    723cc9cc858c079f624d9ee5ca18d9d6

  • SHA1

    f7b14e53e9a3962fe764e596b9b6d06837e01967

  • SHA256

    e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32

  • SHA512

    6508d5ab2127136e98463b7dcd5f10277cfda7a8591964db65f6bb1d79703712bfccf32ce3ad42c901c11a5d14408e74c71ad35a66c32e66d9d17427e184bd0d

  • SSDEEP

    24576:hybQFaqQMkqfTHbVtyeeUNXd80Mf5jlET:UbQ0qQMk6/Vty0XSFf5jlE

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

dezik

C2

193.56.146.220:4174

Attributes
  • auth_value

    d39f21dca8edc10800b036ab83f4d75e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe
    "C:\Users\Admin\AppData\Local\Temp\e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice0966.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice0966.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice8127.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice8127.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4695dg.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4695dg.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4832
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c24Zz69.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c24Zz69.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbGOa68.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbGOa68.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e51qz98.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e51qz98.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e51qz98.exe

    Filesize

    175KB

    MD5

    92f2a148b8f701e50e2f838f73d4d7b7

    SHA1

    324d8546e35d4f4285cac15b21620299ba5cb023

    SHA256

    9ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04

    SHA512

    3300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e51qz98.exe

    Filesize

    175KB

    MD5

    92f2a148b8f701e50e2f838f73d4d7b7

    SHA1

    324d8546e35d4f4285cac15b21620299ba5cb023

    SHA256

    9ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04

    SHA512

    3300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice0966.exe

    Filesize

    665KB

    MD5

    c48ded0ec8ba752ec96f2b520f7c11d1

    SHA1

    45c2624eaf76ed061c167dfc34bbeeb9a93c3ae9

    SHA256

    e6a6c2954e3568587e47f620489e6f764a161b82882607a8b9bef2a0200f4d03

    SHA512

    437bcbee88a36c44a793ea9f78f77c24cd8ed731f8c9340a487e1849bc406bb13f86c05c3c0fa5369abe9fe108af5e17ee8d85aea8ed4a78ae401320661a2417

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice0966.exe

    Filesize

    665KB

    MD5

    c48ded0ec8ba752ec96f2b520f7c11d1

    SHA1

    45c2624eaf76ed061c167dfc34bbeeb9a93c3ae9

    SHA256

    e6a6c2954e3568587e47f620489e6f764a161b82882607a8b9bef2a0200f4d03

    SHA512

    437bcbee88a36c44a793ea9f78f77c24cd8ed731f8c9340a487e1849bc406bb13f86c05c3c0fa5369abe9fe108af5e17ee8d85aea8ed4a78ae401320661a2417

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbGOa68.exe

    Filesize

    307KB

    MD5

    d764c9c93bae96f4d8e23dd49f49de51

    SHA1

    ccc6262ab495ad1f2cb24a9d8200ec42541b1e96

    SHA256

    60dae267daf039593aeb81b26712937cb39c038201dcb382d425b1614b37464f

    SHA512

    6096a5fb5c00b2d1b8ea9afb30980aa9a1019b74e3a428d70b70370b38d39db89c3e46f55101109936d7abb6d6d910ef8e6f0afdb8c0eea9a254343f2a47b3d5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbGOa68.exe

    Filesize

    307KB

    MD5

    d764c9c93bae96f4d8e23dd49f49de51

    SHA1

    ccc6262ab495ad1f2cb24a9d8200ec42541b1e96

    SHA256

    60dae267daf039593aeb81b26712937cb39c038201dcb382d425b1614b37464f

    SHA512

    6096a5fb5c00b2d1b8ea9afb30980aa9a1019b74e3a428d70b70370b38d39db89c3e46f55101109936d7abb6d6d910ef8e6f0afdb8c0eea9a254343f2a47b3d5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice8127.exe

    Filesize

    333KB

    MD5

    105dfb77e028f1abd5846e11fe9838d9

    SHA1

    e75d0d5e76e79e0492d7b38046fbadc197e4ee01

    SHA256

    b697461eed90f554f2eb73694dd8eddd3d6bda59376eac909b6e2f8c7ddc02c4

    SHA512

    6f68a656f892f2864e330d6c5d773ac4bda4dc2fa83635aa37a02fb645ae2074fb59f5c3e0d36806bb9d14e10348f197947d202f9275f1fa81eb679860c176cb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice8127.exe

    Filesize

    333KB

    MD5

    105dfb77e028f1abd5846e11fe9838d9

    SHA1

    e75d0d5e76e79e0492d7b38046fbadc197e4ee01

    SHA256

    b697461eed90f554f2eb73694dd8eddd3d6bda59376eac909b6e2f8c7ddc02c4

    SHA512

    6f68a656f892f2864e330d6c5d773ac4bda4dc2fa83635aa37a02fb645ae2074fb59f5c3e0d36806bb9d14e10348f197947d202f9275f1fa81eb679860c176cb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4695dg.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4695dg.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c24Zz69.exe

    Filesize

    249KB

    MD5

    dc89903abe8b603537afdce89ef284ea

    SHA1

    5891cdc4f3e47ef9cc9d8ae30592a675fe3346c1

    SHA256

    b7a4a4ce4a28affe108f1151361fad906a96c04a2d86e5a8683847274ebd8463

    SHA512

    42ada0f06045ba0efc0e3570411e6bf81707bdb9f8b3a97cf260df7a28e8d8d1a7a222d80bea987fe27a789cbac6a28330d18ceac5f543ec3865b571f3a6d873

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c24Zz69.exe

    Filesize

    249KB

    MD5

    dc89903abe8b603537afdce89ef284ea

    SHA1

    5891cdc4f3e47ef9cc9d8ae30592a675fe3346c1

    SHA256

    b7a4a4ce4a28affe108f1151361fad906a96c04a2d86e5a8683847274ebd8463

    SHA512

    42ada0f06045ba0efc0e3570411e6bf81707bdb9f8b3a97cf260df7a28e8d8d1a7a222d80bea987fe27a789cbac6a28330d18ceac5f543ec3865b571f3a6d873

  • memory/2124-172-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-156-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-147-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-150-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-162-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-174-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-146-0x0000000002480000-0x0000000002498000-memory.dmp

    Filesize

    96KB

  • memory/2124-170-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-168-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-166-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-164-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-160-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-158-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-145-0x0000000004BF0000-0x00000000050EE000-memory.dmp

    Filesize

    5.0MB

  • memory/2124-154-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-152-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-148-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/2124-177-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/2124-176-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/2124-175-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/2124-178-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2124-179-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2124-181-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2124-144-0x00000000007D0000-0x00000000007EA000-memory.dmp

    Filesize

    104KB

  • memory/2124-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2896-195-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-1099-0x00000000057C0000-0x00000000058CA000-memory.dmp

    Filesize

    1.0MB

  • memory/2896-199-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-189-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-193-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-191-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-203-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-211-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-209-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-217-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-219-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-215-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-221-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-226-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/2896-224-0x0000000000630000-0x000000000067B000-memory.dmp

    Filesize

    300KB

  • memory/2896-228-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/2896-230-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/2896-213-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-207-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-205-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-201-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-188-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-1098-0x00000000051B0000-0x00000000057B6000-memory.dmp

    Filesize

    6.0MB

  • memory/2896-197-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/2896-1100-0x00000000058F0000-0x0000000005902000-memory.dmp

    Filesize

    72KB

  • memory/2896-1101-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/2896-1102-0x0000000005910000-0x000000000594E000-memory.dmp

    Filesize

    248KB

  • memory/2896-1103-0x0000000005A60000-0x0000000005AAB000-memory.dmp

    Filesize

    300KB

  • memory/2896-1104-0x0000000005BF0000-0x0000000005C56000-memory.dmp

    Filesize

    408KB

  • memory/2896-1105-0x00000000062E0000-0x0000000006372000-memory.dmp

    Filesize

    584KB

  • memory/2896-1106-0x0000000006380000-0x00000000063F6000-memory.dmp

    Filesize

    472KB

  • memory/2896-1107-0x0000000006400000-0x0000000006450000-memory.dmp

    Filesize

    320KB

  • memory/2896-1111-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/2896-1110-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/2896-1109-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/2896-1112-0x0000000007980000-0x0000000007B42000-memory.dmp

    Filesize

    1.8MB

  • memory/2896-1113-0x0000000007B50000-0x000000000807C000-memory.dmp

    Filesize

    5.2MB

  • memory/2896-1114-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/2896-187-0x00000000024C0000-0x0000000002504000-memory.dmp

    Filesize

    272KB

  • memory/2896-186-0x00000000023F0000-0x0000000002436000-memory.dmp

    Filesize

    280KB

  • memory/4832-137-0x0000000000480000-0x000000000048A000-memory.dmp

    Filesize

    40KB

  • memory/4876-1120-0x00000000003D0000-0x0000000000402000-memory.dmp

    Filesize

    200KB

  • memory/4876-1121-0x0000000004E10000-0x0000000004E5B000-memory.dmp

    Filesize

    300KB

  • memory/4876-1122-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/4876-1123-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB