Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    56s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/03/2023, 12:55

General

  • Target

    5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe

  • Size

    874KB

  • MD5

    cf017376abd2d1fe4d7d20b0f98e8d09

  • SHA1

    ba5165d6be8250b08b97caef3f9974acda27e013

  • SHA256

    5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c

  • SHA512

    614003915dc82ba9768f6305d82f87444d90042af32ec22f6caa083c4ad0d2d74dc743ff8b69ca6718de9f78c434a6ff532583549b547ae2a7cf45dbc9a43008

  • SSDEEP

    12288:cMrpy904BJsLRE91tuKyCz9cN9rST9ySgmFhl5tUR6am8HbhdnlhGj15SPO5ym0M:FyMLRenxjhlf06d8zlhc5BdzVf9

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe
    "C:\Users\Admin\AppData\Local\Temp\5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3037.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3037.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2106.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2106.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4216
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8597jA.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8597jA.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1080
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c71zH32.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c71zH32.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dtTkN90.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dtTkN90.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e88YC62.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e88YC62.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e88YC62.exe

    Filesize

    175KB

    MD5

    795f3fe5687db9b19853eaf6acdc389a

    SHA1

    cd1ba862909c58a01d3a8e44c29cb71bb6b50630

    SHA256

    448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

    SHA512

    d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e88YC62.exe

    Filesize

    175KB

    MD5

    795f3fe5687db9b19853eaf6acdc389a

    SHA1

    cd1ba862909c58a01d3a8e44c29cb71bb6b50630

    SHA256

    448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56

    SHA512

    d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3037.exe

    Filesize

    729KB

    MD5

    4690e66bf12ff6f4e1008fa73f05e00a

    SHA1

    747225b04df7949d8763905e91cae03349b72a2d

    SHA256

    c038930accf215ccd6131b7779c7138e506e313c170abb6cc20d528e306371be

    SHA512

    5f2db42d03181647fb97c52aa8ab8b0da9bd6e976cb217d7dd8e917b422a86e00fb11d972f3d6b06a9664c27272fa72fcf8153cac670cf2b7c280b4ff6a1c61b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3037.exe

    Filesize

    729KB

    MD5

    4690e66bf12ff6f4e1008fa73f05e00a

    SHA1

    747225b04df7949d8763905e91cae03349b72a2d

    SHA256

    c038930accf215ccd6131b7779c7138e506e313c170abb6cc20d528e306371be

    SHA512

    5f2db42d03181647fb97c52aa8ab8b0da9bd6e976cb217d7dd8e917b422a86e00fb11d972f3d6b06a9664c27272fa72fcf8153cac670cf2b7c280b4ff6a1c61b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dtTkN90.exe

    Filesize

    408KB

    MD5

    acf946990cce268bab83e423eba360f4

    SHA1

    0d3bdccf0182f0807380473466d5b6b60f193904

    SHA256

    17cd8db80e084509a543f7ec21399d4f9cf9c8906d6890a3db4da80854bf8d27

    SHA512

    aed8bd98b0f033d724091419548880c463be734886c8a5e0b8065a66060b350783221049475d0fad4999425d03b8dcc889e7fbff7b9fd3b1575f1745f3e7f4f1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dtTkN90.exe

    Filesize

    408KB

    MD5

    acf946990cce268bab83e423eba360f4

    SHA1

    0d3bdccf0182f0807380473466d5b6b60f193904

    SHA256

    17cd8db80e084509a543f7ec21399d4f9cf9c8906d6890a3db4da80854bf8d27

    SHA512

    aed8bd98b0f033d724091419548880c463be734886c8a5e0b8065a66060b350783221049475d0fad4999425d03b8dcc889e7fbff7b9fd3b1575f1745f3e7f4f1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2106.exe

    Filesize

    365KB

    MD5

    3a5820a8fee9833d5b486e60502677f5

    SHA1

    42bc63f25deae86b694bf607230909bff91f3b2d

    SHA256

    17080a59f7489790629c61c70fde514b70ed5cfed705da159d375e96d3b96b82

    SHA512

    d618d39bf9990e1554eb9876e9c13d82e74122745c88ac63a0fcbe978be8135375dce5a0666b129f057c34884e8a86300e2afa808cb4ef6384a04022a7d833c6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2106.exe

    Filesize

    365KB

    MD5

    3a5820a8fee9833d5b486e60502677f5

    SHA1

    42bc63f25deae86b694bf607230909bff91f3b2d

    SHA256

    17080a59f7489790629c61c70fde514b70ed5cfed705da159d375e96d3b96b82

    SHA512

    d618d39bf9990e1554eb9876e9c13d82e74122745c88ac63a0fcbe978be8135375dce5a0666b129f057c34884e8a86300e2afa808cb4ef6384a04022a7d833c6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8597jA.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8597jA.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c71zH32.exe

    Filesize

    351KB

    MD5

    ff1800b6e8f9a60395425226a5a76d1c

    SHA1

    0872a5e7a2c25b60df6b1ccceb39d472658ad502

    SHA256

    4fe41b77721fb7a0794c189fa93ad03ad938a6085c77914a0f174b5bc4129ee1

    SHA512

    27585f4743067bc1bfc2dfe048f01779fe10595a52545d6b90e60b67a9fbb0aeb97e75941f4ccd705ba58a96cccc4b00af8c1f3d4d4b5fa8591f62560311911a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c71zH32.exe

    Filesize

    351KB

    MD5

    ff1800b6e8f9a60395425226a5a76d1c

    SHA1

    0872a5e7a2c25b60df6b1ccceb39d472658ad502

    SHA256

    4fe41b77721fb7a0794c189fa93ad03ad938a6085c77914a0f174b5bc4129ee1

    SHA512

    27585f4743067bc1bfc2dfe048f01779fe10595a52545d6b90e60b67a9fbb0aeb97e75941f4ccd705ba58a96cccc4b00af8c1f3d4d4b5fa8591f62560311911a

  • memory/1080-142-0x00000000004E0000-0x00000000004EA000-memory.dmp

    Filesize

    40KB

  • memory/2720-1130-0x0000000005310000-0x0000000005320000-memory.dmp

    Filesize

    64KB

  • memory/2720-1129-0x0000000005440000-0x000000000548B000-memory.dmp

    Filesize

    300KB

  • memory/2720-1128-0x0000000000A00000-0x0000000000A32000-memory.dmp

    Filesize

    200KB

  • memory/2948-224-0x0000000004620000-0x0000000004630000-memory.dmp

    Filesize

    64KB

  • memory/2948-1108-0x0000000007E30000-0x0000000007E6E000-memory.dmp

    Filesize

    248KB

  • memory/2948-1121-0x0000000008C80000-0x00000000091AC000-memory.dmp

    Filesize

    5.2MB

  • memory/2948-1120-0x0000000008AB0000-0x0000000008C72000-memory.dmp

    Filesize

    1.8MB

  • memory/2948-1119-0x0000000004620000-0x0000000004630000-memory.dmp

    Filesize

    64KB

  • memory/2948-1118-0x0000000008A20000-0x0000000008A70000-memory.dmp

    Filesize

    320KB

  • memory/2948-1117-0x00000000089A0000-0x0000000008A16000-memory.dmp

    Filesize

    472KB

  • memory/2948-1116-0x00000000081B0000-0x0000000008216000-memory.dmp

    Filesize

    408KB

  • memory/2948-1115-0x0000000008110000-0x00000000081A2000-memory.dmp

    Filesize

    584KB

  • memory/2948-1114-0x0000000004620000-0x0000000004630000-memory.dmp

    Filesize

    64KB

  • memory/2948-1113-0x0000000004620000-0x0000000004630000-memory.dmp

    Filesize

    64KB

  • memory/2948-1112-0x0000000004620000-0x0000000004630000-memory.dmp

    Filesize

    64KB

  • memory/2948-1110-0x0000000007F80000-0x0000000007FCB000-memory.dmp

    Filesize

    300KB

  • memory/2948-1109-0x0000000004620000-0x0000000004630000-memory.dmp

    Filesize

    64KB

  • memory/2948-1107-0x0000000007E10000-0x0000000007E22000-memory.dmp

    Filesize

    72KB

  • memory/2948-1106-0x0000000007CD0000-0x0000000007DDA000-memory.dmp

    Filesize

    1.0MB

  • memory/2948-1105-0x0000000007640000-0x0000000007C46000-memory.dmp

    Filesize

    6.0MB

  • memory/2948-232-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-230-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-227-0x0000000004620000-0x0000000004630000-memory.dmp

    Filesize

    64KB

  • memory/2948-228-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-225-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-193-0x0000000007010000-0x0000000007056000-memory.dmp

    Filesize

    280KB

  • memory/2948-194-0x00000000075A0000-0x00000000075E4000-memory.dmp

    Filesize

    272KB

  • memory/2948-195-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-196-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-198-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-200-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-202-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-204-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-206-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-208-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-210-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-212-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-214-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-218-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-216-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-220-0x0000000004570000-0x00000000045BB000-memory.dmp

    Filesize

    300KB

  • memory/2948-221-0x00000000075A0000-0x00000000075DE000-memory.dmp

    Filesize

    248KB

  • memory/2948-222-0x0000000004620000-0x0000000004630000-memory.dmp

    Filesize

    64KB

  • memory/4316-182-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-150-0x00000000070F0000-0x00000000075EE000-memory.dmp

    Filesize

    5.0MB

  • memory/4316-188-0x0000000000400000-0x0000000002B1C000-memory.dmp

    Filesize

    39.1MB

  • memory/4316-186-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

    Filesize

    64KB

  • memory/4316-153-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

    Filesize

    64KB

  • memory/4316-185-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

    Filesize

    64KB

  • memory/4316-184-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

    Filesize

    64KB

  • memory/4316-183-0x0000000000400000-0x0000000002B1C000-memory.dmp

    Filesize

    39.1MB

  • memory/4316-170-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-156-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-174-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-178-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-155-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-154-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

    Filesize

    64KB

  • memory/4316-180-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-172-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-158-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-166-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-168-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-164-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-162-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-160-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-152-0x0000000002DD0000-0x0000000002DE0000-memory.dmp

    Filesize

    64KB

  • memory/4316-151-0x0000000004850000-0x0000000004868000-memory.dmp

    Filesize

    96KB

  • memory/4316-176-0x0000000004850000-0x0000000004862000-memory.dmp

    Filesize

    72KB

  • memory/4316-149-0x0000000002E00000-0x0000000002E1A000-memory.dmp

    Filesize

    104KB

  • memory/4316-148-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB