Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2023, 05:06

General

  • Target

    b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe

  • Size

    790KB

  • MD5

    0c3f8bb5e3c09a5e3b33a7ff6179508a

  • SHA1

    6b8895c84877532dc3da77a5377442dfe1c37754

  • SHA256

    b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d

  • SHA512

    41461201f4fd30c63a3a0d88f2919b3313c1e7f5a93a67119d7a9b88fb98402d5a0d4e2877d32af44745ea6e771bbaed145f6f88c1e5720cb7a7273e6de927e8

  • SSDEEP

    24576:IyZW3weS8yrpXuPloQ2Tnfc3dLuESJnH:PM3FS8y8PlT2TnkNuE8

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

rita

C2

193.233.20.28:4125

Attributes
  • auth_value

    5cf1bcf41b0a2f3710619223451dfd3a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe
    "C:\Users\Admin\AppData\Local\Temp\b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9306.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9306.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5933.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5933.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4736
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1651eX.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1651eX.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3472
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c93zB86.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c93zB86.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4092
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 1088
            5⤵
            • Program crash
            PID:4796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\deRBA55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\deRBA55.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4540
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 1288
          4⤵
          • Program crash
          PID:4776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e40xp49.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e40xp49.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5084
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4092 -ip 4092
    1⤵
      PID:4812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4540 -ip 4540
      1⤵
        PID:1140

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e40xp49.exe

        Filesize

        175KB

        MD5

        8b0ea3120d3d291045b26bcea5ccef54

        SHA1

        07ed9587057ae936ca0610051142a4add4f7b6aa

        SHA256

        6659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690

        SHA512

        6d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e40xp49.exe

        Filesize

        175KB

        MD5

        8b0ea3120d3d291045b26bcea5ccef54

        SHA1

        07ed9587057ae936ca0610051142a4add4f7b6aa

        SHA256

        6659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690

        SHA512

        6d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9306.exe

        Filesize

        645KB

        MD5

        2c584ab03af73d7f5e9af23964c85db7

        SHA1

        b22d07d8b6d2594202c35c07091c31cdf8fdbef5

        SHA256

        a6e3691b1da06386f72d9303a3f76c8fb70b7d829de30cb5ec1ccdbfd25c698d

        SHA512

        e13187685d43e1f594a7dadb370c70781eb45edfe4ae391fd9dca3419b42953aa83c250e3a4f8aafffad55d20ad0f3f549447a556cc096f9d7b971663282d4b0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9306.exe

        Filesize

        645KB

        MD5

        2c584ab03af73d7f5e9af23964c85db7

        SHA1

        b22d07d8b6d2594202c35c07091c31cdf8fdbef5

        SHA256

        a6e3691b1da06386f72d9303a3f76c8fb70b7d829de30cb5ec1ccdbfd25c698d

        SHA512

        e13187685d43e1f594a7dadb370c70781eb45edfe4ae391fd9dca3419b42953aa83c250e3a4f8aafffad55d20ad0f3f549447a556cc096f9d7b971663282d4b0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\deRBA55.exe

        Filesize

        296KB

        MD5

        89cb6a9576c9bbbb94e2eacfdbcaa375

        SHA1

        daa4160d264cdc73cc3747ffa8d228087512a98f

        SHA256

        5b27edb00f5b53cc2701b4dedf2d2315388c3a012ae252196aec5436bc259f08

        SHA512

        1c4982d0bd5953802e4cdf1ed336fe6aa7552d8462e7f31692d9ee5f16eea6b1d09d8fe279391da93d1f7a6eb4dcca2484a96656634c830d711a3a85d9c62e99

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\deRBA55.exe

        Filesize

        296KB

        MD5

        89cb6a9576c9bbbb94e2eacfdbcaa375

        SHA1

        daa4160d264cdc73cc3747ffa8d228087512a98f

        SHA256

        5b27edb00f5b53cc2701b4dedf2d2315388c3a012ae252196aec5436bc259f08

        SHA512

        1c4982d0bd5953802e4cdf1ed336fe6aa7552d8462e7f31692d9ee5f16eea6b1d09d8fe279391da93d1f7a6eb4dcca2484a96656634c830d711a3a85d9c62e99

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5933.exe

        Filesize

        323KB

        MD5

        f78dd41e3ce8a02cf7b2bdba1079c930

        SHA1

        fa8bbe9e5fad14e36e46dec5e0e17dab05fe93cf

        SHA256

        d38aaa7595d30cade01283163d57e21239d5898db9d961763588520294279133

        SHA512

        946d3503a6c0839a048dd672e32f67b9857058243196bfa7893cebc9c8dcfa5440a24e8073cbbe435c95917fc5736a6baef332fed8888c7e5294189e68dae753

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5933.exe

        Filesize

        323KB

        MD5

        f78dd41e3ce8a02cf7b2bdba1079c930

        SHA1

        fa8bbe9e5fad14e36e46dec5e0e17dab05fe93cf

        SHA256

        d38aaa7595d30cade01283163d57e21239d5898db9d961763588520294279133

        SHA512

        946d3503a6c0839a048dd672e32f67b9857058243196bfa7893cebc9c8dcfa5440a24e8073cbbe435c95917fc5736a6baef332fed8888c7e5294189e68dae753

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1651eX.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1651eX.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c93zB86.exe

        Filesize

        239KB

        MD5

        ba9e21cf5f10fd52f6acbf3e5e8eb381

        SHA1

        1923065544ced98ec4a30a4de8a084eb886b3294

        SHA256

        3780a76ff5c50eade05de3ce60ca982017b8d4bdd4c6af0f8fea9d13dfa3bcc6

        SHA512

        490e487f9b8f41378f78a0254b978ea7349d1482fb76a92e38877d6aea3bce2078fb3105c2c13d53990fc993850ad26310448cd2e0a1b4bee8a56529ccdfc01b

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c93zB86.exe

        Filesize

        239KB

        MD5

        ba9e21cf5f10fd52f6acbf3e5e8eb381

        SHA1

        1923065544ced98ec4a30a4de8a084eb886b3294

        SHA256

        3780a76ff5c50eade05de3ce60ca982017b8d4bdd4c6af0f8fea9d13dfa3bcc6

        SHA512

        490e487f9b8f41378f78a0254b978ea7349d1482fb76a92e38877d6aea3bce2078fb3105c2c13d53990fc993850ad26310448cd2e0a1b4bee8a56529ccdfc01b

      • memory/3472-154-0x0000000000060000-0x000000000006A000-memory.dmp

        Filesize

        40KB

      • memory/4092-160-0x0000000004B70000-0x0000000005114000-memory.dmp

        Filesize

        5.6MB

      • memory/4092-161-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/4092-162-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4092-163-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4092-166-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-164-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-165-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4092-168-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-170-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-172-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-174-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-176-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-178-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-180-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-182-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-184-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-188-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-186-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-190-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-192-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/4092-193-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/4092-194-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4092-195-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4092-196-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4092-198-0x0000000000400000-0x00000000004BC000-memory.dmp

        Filesize

        752KB

      • memory/4540-203-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-206-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-204-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-208-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-210-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-212-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-214-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-216-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-218-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-220-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-222-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-224-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-226-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-228-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-230-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-232-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-234-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-236-0x0000000004A90000-0x0000000004ACE000-memory.dmp

        Filesize

        248KB

      • memory/4540-440-0x00000000005B0000-0x00000000005FB000-memory.dmp

        Filesize

        300KB

      • memory/4540-442-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/4540-444-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/4540-446-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/4540-1113-0x0000000005280000-0x0000000005898000-memory.dmp

        Filesize

        6.1MB

      • memory/4540-1114-0x00000000058B0000-0x00000000059BA000-memory.dmp

        Filesize

        1.0MB

      • memory/4540-1115-0x00000000059F0000-0x0000000005A02000-memory.dmp

        Filesize

        72KB

      • memory/4540-1116-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/4540-1117-0x0000000005A10000-0x0000000005A4C000-memory.dmp

        Filesize

        240KB

      • memory/4540-1118-0x0000000005D00000-0x0000000005D66000-memory.dmp

        Filesize

        408KB

      • memory/4540-1120-0x00000000063B0000-0x0000000006442000-memory.dmp

        Filesize

        584KB

      • memory/4540-1121-0x00000000064C0000-0x0000000006682000-memory.dmp

        Filesize

        1.8MB

      • memory/4540-1122-0x0000000006690000-0x0000000006BBC000-memory.dmp

        Filesize

        5.2MB

      • memory/4540-1123-0x0000000006DF0000-0x0000000006E66000-memory.dmp

        Filesize

        472KB

      • memory/4540-1124-0x0000000006E80000-0x0000000006ED0000-memory.dmp

        Filesize

        320KB

      • memory/4540-1125-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/4540-1126-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/4540-1127-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/4540-1128-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

        Filesize

        64KB

      • memory/5084-1134-0x0000000000C90000-0x0000000000CC2000-memory.dmp

        Filesize

        200KB

      • memory/5084-1135-0x00000000058D0000-0x00000000058E0000-memory.dmp

        Filesize

        64KB