Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2023, 09:55

General

  • Target

    44e18d8cff2d3e5f0bdf99c135fd580ae8785a5db9e8c76a6da4b573fe288492.exe

  • Size

    875KB

  • MD5

    c5b94d736d413f7c88347df66bed7810

  • SHA1

    4df0524d1153533b55ae607a773475c13bfe7f7b

  • SHA256

    44e18d8cff2d3e5f0bdf99c135fd580ae8785a5db9e8c76a6da4b573fe288492

  • SHA512

    59faf6bbdaece6f4782c6e4fe1b655018dcb9f656be4913ce2c8a3cc6da5d5dfc63e3c1437eabb4ad35104c4480563becc6e0cef5c6fa96c07d53176160dc582

  • SSDEEP

    24576:+yrEpst/Xgk5RbJcsCGgJZKhscjZuukt2W:NAst35VJcSPpk

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

rita

C2

193.233.20.28:4125

Attributes
  • auth_value

    5cf1bcf41b0a2f3710619223451dfd3a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44e18d8cff2d3e5f0bdf99c135fd580ae8785a5db9e8c76a6da4b573fe288492.exe
    "C:\Users\Admin\AppData\Local\Temp\44e18d8cff2d3e5f0bdf99c135fd580ae8785a5db9e8c76a6da4b573fe288492.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2283.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2283.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3873.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3873.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1492
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5783IS.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5783IS.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3540
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c86iE71.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c86iE71.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2992
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 1084
            5⤵
            • Program crash
            PID:1700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dQdIJ02.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dQdIJ02.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 1348
          4⤵
          • Program crash
          PID:3724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e54lH06.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e54lH06.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1284
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2992 -ip 2992
    1⤵
      PID:4352
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4736 -ip 4736
      1⤵
        PID:4952

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e54lH06.exe

        Filesize

        175KB

        MD5

        8b0ea3120d3d291045b26bcea5ccef54

        SHA1

        07ed9587057ae936ca0610051142a4add4f7b6aa

        SHA256

        6659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690

        SHA512

        6d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e54lH06.exe

        Filesize

        175KB

        MD5

        8b0ea3120d3d291045b26bcea5ccef54

        SHA1

        07ed9587057ae936ca0610051142a4add4f7b6aa

        SHA256

        6659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690

        SHA512

        6d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2283.exe

        Filesize

        730KB

        MD5

        e9b138f87dac40b795a4e3ba638de70a

        SHA1

        4c63143a1ac004f64dc8673c5bd07d05654bd8e6

        SHA256

        fb7b601aa2b018cea5a6b019eaf65fe780cdc7575ceba33fc7a0ba9d187c869e

        SHA512

        05b16439a49bff3246844d3ebe8c61d9b51969de5beba1df431049cde0accd0f7beac1fff171fd115a2f62c93005d95a6942fdadb461010e56e09bd93e856684

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2283.exe

        Filesize

        730KB

        MD5

        e9b138f87dac40b795a4e3ba638de70a

        SHA1

        4c63143a1ac004f64dc8673c5bd07d05654bd8e6

        SHA256

        fb7b601aa2b018cea5a6b019eaf65fe780cdc7575ceba33fc7a0ba9d187c869e

        SHA512

        05b16439a49bff3246844d3ebe8c61d9b51969de5beba1df431049cde0accd0f7beac1fff171fd115a2f62c93005d95a6942fdadb461010e56e09bd93e856684

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dQdIJ02.exe

        Filesize

        408KB

        MD5

        19f06bebdeeb1b2e7a2306bf9af690e4

        SHA1

        5f4d9a094aa8159d9c49319914c3861b70401ee4

        SHA256

        49eaa3539a1e9ac48ba2ffaaaa43b16937d8f6c1ce82005e30b2fcc4198af573

        SHA512

        60d52698dd695fc7d6e82f63d730f65ce9e80cb0441318b218fdf40d6557b54f4fcecc66fc0976ebae9629f16901df238ab0db938a08be639ba37953c1e615ac

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dQdIJ02.exe

        Filesize

        408KB

        MD5

        19f06bebdeeb1b2e7a2306bf9af690e4

        SHA1

        5f4d9a094aa8159d9c49319914c3861b70401ee4

        SHA256

        49eaa3539a1e9ac48ba2ffaaaa43b16937d8f6c1ce82005e30b2fcc4198af573

        SHA512

        60d52698dd695fc7d6e82f63d730f65ce9e80cb0441318b218fdf40d6557b54f4fcecc66fc0976ebae9629f16901df238ab0db938a08be639ba37953c1e615ac

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3873.exe

        Filesize

        365KB

        MD5

        c894df9f6e1e0677655a919ca3779512

        SHA1

        4bc86ce7067c3914e3ff9000fdd031950291b877

        SHA256

        b2ee041858a5db9c8fe39a3075284bbb0a2d7b67fb1989eae20592697067d535

        SHA512

        6a7e3889b2a376949277e8e3f4cf3cab2c30bcde1f22e5e82b494389380f50dc14ee16f50d315c82523dff422248a2153a90d9af5c738c2ff7deafa420978580

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3873.exe

        Filesize

        365KB

        MD5

        c894df9f6e1e0677655a919ca3779512

        SHA1

        4bc86ce7067c3914e3ff9000fdd031950291b877

        SHA256

        b2ee041858a5db9c8fe39a3075284bbb0a2d7b67fb1989eae20592697067d535

        SHA512

        6a7e3889b2a376949277e8e3f4cf3cab2c30bcde1f22e5e82b494389380f50dc14ee16f50d315c82523dff422248a2153a90d9af5c738c2ff7deafa420978580

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5783IS.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5783IS.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c86iE71.exe

        Filesize

        350KB

        MD5

        54b63dfc03146c53c1b0fd7b1cd034d3

        SHA1

        d368cadcb3dfaf6bd8898b132876d7e2dffbd63d

        SHA256

        5bb0886c9db8d825d5a2818ca2e886c592d6a9e4e1c4402426eace62655f20bf

        SHA512

        06cd0b4744e98caf1252c87d966e0696ecbafcd3cf2945dc01e1f9ba4a406bc983196347645fe84ea2be472aa445adec19e907192a271208a7f79c8ec92905fb

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c86iE71.exe

        Filesize

        350KB

        MD5

        54b63dfc03146c53c1b0fd7b1cd034d3

        SHA1

        d368cadcb3dfaf6bd8898b132876d7e2dffbd63d

        SHA256

        5bb0886c9db8d825d5a2818ca2e886c592d6a9e4e1c4402426eace62655f20bf

        SHA512

        06cd0b4744e98caf1252c87d966e0696ecbafcd3cf2945dc01e1f9ba4a406bc983196347645fe84ea2be472aa445adec19e907192a271208a7f79c8ec92905fb

      • memory/1284-1134-0x0000000005310000-0x0000000005320000-memory.dmp

        Filesize

        64KB

      • memory/1284-1133-0x0000000000A40000-0x0000000000A72000-memory.dmp

        Filesize

        200KB

      • memory/2992-170-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-184-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-164-0x0000000007280000-0x0000000007290000-memory.dmp

        Filesize

        64KB

      • memory/2992-165-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-166-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-168-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-162-0x0000000007280000-0x0000000007290000-memory.dmp

        Filesize

        64KB

      • memory/2992-172-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-174-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-176-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-178-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-180-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-182-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-163-0x0000000007280000-0x0000000007290000-memory.dmp

        Filesize

        64KB

      • memory/2992-186-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-188-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-190-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-192-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

        Filesize

        72KB

      • memory/2992-193-0x0000000000400000-0x0000000002B1B000-memory.dmp

        Filesize

        39.1MB

      • memory/2992-194-0x0000000007280000-0x0000000007290000-memory.dmp

        Filesize

        64KB

      • memory/2992-195-0x0000000007280000-0x0000000007290000-memory.dmp

        Filesize

        64KB

      • memory/2992-196-0x0000000007280000-0x0000000007290000-memory.dmp

        Filesize

        64KB

      • memory/2992-198-0x0000000000400000-0x0000000002B1B000-memory.dmp

        Filesize

        39.1MB

      • memory/2992-160-0x0000000004770000-0x000000000479D000-memory.dmp

        Filesize

        180KB

      • memory/2992-161-0x0000000007290000-0x0000000007834000-memory.dmp

        Filesize

        5.6MB

      • memory/3540-154-0x0000000000DB0000-0x0000000000DBA000-memory.dmp

        Filesize

        40KB

      • memory/4736-203-0x0000000002BD0000-0x0000000002C1B000-memory.dmp

        Filesize

        300KB

      • memory/4736-206-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-208-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-210-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-212-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-214-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-216-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-218-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-220-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-222-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-224-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-226-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-228-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-230-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-232-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-234-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/4736-235-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-237-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-239-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-1112-0x0000000007890000-0x0000000007EA8000-memory.dmp

        Filesize

        6.1MB

      • memory/4736-1113-0x0000000007F10000-0x000000000801A000-memory.dmp

        Filesize

        1.0MB

      • memory/4736-1114-0x0000000008050000-0x0000000008062000-memory.dmp

        Filesize

        72KB

      • memory/4736-1115-0x0000000008070000-0x00000000080AC000-memory.dmp

        Filesize

        240KB

      • memory/4736-1116-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/4736-1118-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/4736-1119-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/4736-1120-0x0000000008360000-0x00000000083F2000-memory.dmp

        Filesize

        584KB

      • memory/4736-1121-0x0000000008400000-0x0000000008466000-memory.dmp

        Filesize

        408KB

      • memory/4736-1122-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/4736-1123-0x0000000008D60000-0x0000000008DD6000-memory.dmp

        Filesize

        472KB

      • memory/4736-1124-0x0000000008DF0000-0x0000000008E40000-memory.dmp

        Filesize

        320KB

      • memory/4736-1125-0x0000000008E50000-0x0000000009012000-memory.dmp

        Filesize

        1.8MB

      • memory/4736-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4736-204-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/4736-1126-0x0000000009020000-0x000000000954C000-memory.dmp

        Filesize

        5.2MB

      • memory/4736-1127-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB