Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2023, 16:42

General

  • Target

    0007472c64432eded91d353ac7cfc215964619308acdb6644092b127a29fe26f.exe

  • Size

    526KB

  • MD5

    83dd5cb850e58979d119368cf8631d28

  • SHA1

    1b6ed0f1e80d53fbab66c4fc344f46b0ff49dab2

  • SHA256

    0007472c64432eded91d353ac7cfc215964619308acdb6644092b127a29fe26f

  • SHA512

    2cde12c2870d05c47b5bbf4a699822f6bd081fc2a7837b5dee7eef3f401c676653acd3cc1f721d8f856ff825d418776c03ed3dfc98bad656c00432b920c78a54

  • SSDEEP

    12288:iMrhy90hHHKhd3XL4azRjRuhO16yPYFvfH4Rl:Tymo7zxRhVEnHyl

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 37 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0007472c64432eded91d353ac7cfc215964619308acdb6644092b127a29fe26f.exe
    "C:\Users\Admin\AppData\Local\Temp\0007472c64432eded91d353ac7cfc215964619308acdb6644092b127a29fe26f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhix8855bo.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhix8855bo.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf18xQ12jA67.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf18xQ12jA67.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhix8855bo.exe

    Filesize

    381KB

    MD5

    dcf2d89ee39bdd29d076b683ceb8ce63

    SHA1

    0e4abe67ac8a8384218bc5bafa06b17e961c4f66

    SHA256

    f9766f529cb7dc68acf71ce2678229c01372d3b8456a2bbad30e50761dad958f

    SHA512

    b7b79fcd74dee7d12ec7001f333ea29b6a7d774c15723877625a9fc26e381b6dc247b188580b7e152ac7cb87035e321ce26dd8f92197aff1bf7debfcaf379c9a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhix8855bo.exe

    Filesize

    381KB

    MD5

    dcf2d89ee39bdd29d076b683ceb8ce63

    SHA1

    0e4abe67ac8a8384218bc5bafa06b17e961c4f66

    SHA256

    f9766f529cb7dc68acf71ce2678229c01372d3b8456a2bbad30e50761dad958f

    SHA512

    b7b79fcd74dee7d12ec7001f333ea29b6a7d774c15723877625a9fc26e381b6dc247b188580b7e152ac7cb87035e321ce26dd8f92197aff1bf7debfcaf379c9a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf18xQ12jA67.exe

    Filesize

    11KB

    MD5

    6ba3fe925b93be5858cbb7d010a7aa49

    SHA1

    dac6a8b93dd8a51725bfbd463d7448005a671a3e

    SHA256

    9b35c066b4fbb34794dfec3561196e9ac4fe056cc45753f8bda84b989568abc6

    SHA512

    79d24fc293cdcd5d7b8b58d483de763298060ef822a4e883b9606beb42e068d24710115ddf829804f8320edc87c964bdc097718102fb53b708cb94d0cad2c5ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf18xQ12jA67.exe

    Filesize

    11KB

    MD5

    6ba3fe925b93be5858cbb7d010a7aa49

    SHA1

    dac6a8b93dd8a51725bfbd463d7448005a671a3e

    SHA256

    9b35c066b4fbb34794dfec3561196e9ac4fe056cc45753f8bda84b989568abc6

    SHA512

    79d24fc293cdcd5d7b8b58d483de763298060ef822a4e883b9606beb42e068d24710115ddf829804f8320edc87c964bdc097718102fb53b708cb94d0cad2c5ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe

    Filesize

    292KB

    MD5

    bd407beaed8912f6f9f5b269e5a85686

    SHA1

    f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

    SHA256

    3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

    SHA512

    79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe

    Filesize

    292KB

    MD5

    bd407beaed8912f6f9f5b269e5a85686

    SHA1

    f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

    SHA256

    3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

    SHA512

    79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe

    Filesize

    292KB

    MD5

    bd407beaed8912f6f9f5b269e5a85686

    SHA1

    f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

    SHA256

    3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

    SHA512

    79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vhix8855bo.exe

    Filesize

    381KB

    MD5

    dcf2d89ee39bdd29d076b683ceb8ce63

    SHA1

    0e4abe67ac8a8384218bc5bafa06b17e961c4f66

    SHA256

    f9766f529cb7dc68acf71ce2678229c01372d3b8456a2bbad30e50761dad958f

    SHA512

    b7b79fcd74dee7d12ec7001f333ea29b6a7d774c15723877625a9fc26e381b6dc247b188580b7e152ac7cb87035e321ce26dd8f92197aff1bf7debfcaf379c9a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vhix8855bo.exe

    Filesize

    381KB

    MD5

    dcf2d89ee39bdd29d076b683ceb8ce63

    SHA1

    0e4abe67ac8a8384218bc5bafa06b17e961c4f66

    SHA256

    f9766f529cb7dc68acf71ce2678229c01372d3b8456a2bbad30e50761dad958f

    SHA512

    b7b79fcd74dee7d12ec7001f333ea29b6a7d774c15723877625a9fc26e381b6dc247b188580b7e152ac7cb87035e321ce26dd8f92197aff1bf7debfcaf379c9a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\sf18xQ12jA67.exe

    Filesize

    11KB

    MD5

    6ba3fe925b93be5858cbb7d010a7aa49

    SHA1

    dac6a8b93dd8a51725bfbd463d7448005a671a3e

    SHA256

    9b35c066b4fbb34794dfec3561196e9ac4fe056cc45753f8bda84b989568abc6

    SHA512

    79d24fc293cdcd5d7b8b58d483de763298060ef822a4e883b9606beb42e068d24710115ddf829804f8320edc87c964bdc097718102fb53b708cb94d0cad2c5ae

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe

    Filesize

    292KB

    MD5

    bd407beaed8912f6f9f5b269e5a85686

    SHA1

    f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

    SHA256

    3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

    SHA512

    79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe

    Filesize

    292KB

    MD5

    bd407beaed8912f6f9f5b269e5a85686

    SHA1

    f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

    SHA256

    3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

    SHA512

    79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\tf81rA92iO15.exe

    Filesize

    292KB

    MD5

    bd407beaed8912f6f9f5b269e5a85686

    SHA1

    f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b

    SHA256

    3fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367

    SHA512

    79eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72

  • memory/1292-102-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-114-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-84-0x0000000004B20000-0x0000000004B64000-memory.dmp

    Filesize

    272KB

  • memory/1292-85-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-86-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-88-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-90-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-92-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-93-0x00000000008B0000-0x00000000008FB000-memory.dmp

    Filesize

    300KB

  • memory/1292-96-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-95-0x00000000049A0000-0x00000000049E0000-memory.dmp

    Filesize

    256KB

  • memory/1292-98-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-100-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-996-0x00000000049A0000-0x00000000049E0000-memory.dmp

    Filesize

    256KB

  • memory/1292-104-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-106-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-108-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-110-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-112-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-83-0x0000000004AE0000-0x0000000004B26000-memory.dmp

    Filesize

    280KB

  • memory/1292-116-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-118-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-120-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-122-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-124-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-126-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-128-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-130-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-132-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-134-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-136-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-138-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-140-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-142-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-144-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-146-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-148-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-150-0x0000000004B20000-0x0000000004B5E000-memory.dmp

    Filesize

    248KB

  • memory/1292-993-0x00000000049A0000-0x00000000049E0000-memory.dmp

    Filesize

    256KB

  • memory/1756-72-0x0000000000010000-0x000000000001A000-memory.dmp

    Filesize

    40KB