Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2023, 22:49

General

  • Target

    c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe

  • Size

    795KB

  • MD5

    d9c90727e4ff06e693d629699e5a21a6

  • SHA1

    c8483ee9f2cacaad80700777bf38acbcdaddc428

  • SHA256

    c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630

  • SHA512

    971c142eb4f736850587da2a28c0200965d793427e9ae3d210891d4f3e787ae29ff8fb1d768172a5529a207957fd00d5fb0a62c9b1a49f0195b4b0b6eded9255

  • SSDEEP

    24576:OyzgVh8JTmnrU80KThA8YjFmkfCSh0PHLc:dzgn8JTOdomih0PHL

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe
    "C:\Users\Admin\AppData\Local\Temp\c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9470.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9470.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4491.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4491.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3480
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7787ut.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7787ut.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2960
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48lI07.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48lI07.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2388
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 1080
            5⤵
            • Program crash
            PID:3184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGPXa90.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGPXa90.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1788
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 1352
          4⤵
          • Program crash
          PID:2256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e97oZ06.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e97oZ06.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3956
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2388 -ip 2388
    1⤵
      PID:2912
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1788 -ip 1788
      1⤵
        PID:4360

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e97oZ06.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e97oZ06.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9470.exe

        Filesize

        650KB

        MD5

        19f15a7a4dccc27b5280dd9d518ee1ba

        SHA1

        2eff10ba91eacc169fe6656f864a094af5fd756b

        SHA256

        de15b012da5430b91f0e2b750fa008b31f1320fa577751eccdd77e9919f01856

        SHA512

        5c16c0e99a60aad89de137fe75821b4bdc6e3f0c6337a4d112e5ccb2866005eece2c8f20368168a790c53b585d5d28b8995cd8b6bd43be643ff8a9848a05f3fa

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9470.exe

        Filesize

        650KB

        MD5

        19f15a7a4dccc27b5280dd9d518ee1ba

        SHA1

        2eff10ba91eacc169fe6656f864a094af5fd756b

        SHA256

        de15b012da5430b91f0e2b750fa008b31f1320fa577751eccdd77e9919f01856

        SHA512

        5c16c0e99a60aad89de137fe75821b4bdc6e3f0c6337a4d112e5ccb2866005eece2c8f20368168a790c53b585d5d28b8995cd8b6bd43be643ff8a9848a05f3fa

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGPXa90.exe

        Filesize

        283KB

        MD5

        5f6cc5753ed77713d9e43b204047b4fd

        SHA1

        52b0621fbed1d04ec4d6bd9f7e61b1e6f5e652f1

        SHA256

        5c804af2ebcd518145486fc0d8f7d81a812303b0af97c3ac896a7548d86eee71

        SHA512

        fdbdd06c3319ebd8e8f8d135792d4cdcc0e936a8303cbfeb01b163d57fd03d410a1e728a99acc1b9a56b7177199931eb43ad37a8274399acf2b713a97e024581

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGPXa90.exe

        Filesize

        283KB

        MD5

        5f6cc5753ed77713d9e43b204047b4fd

        SHA1

        52b0621fbed1d04ec4d6bd9f7e61b1e6f5e652f1

        SHA256

        5c804af2ebcd518145486fc0d8f7d81a812303b0af97c3ac896a7548d86eee71

        SHA512

        fdbdd06c3319ebd8e8f8d135792d4cdcc0e936a8303cbfeb01b163d57fd03d410a1e728a99acc1b9a56b7177199931eb43ad37a8274399acf2b713a97e024581

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4491.exe

        Filesize

        324KB

        MD5

        bee077942e0fb5b4d265310a870f4bfa

        SHA1

        f37a09f159d88182078e802c5833cb1ee3975985

        SHA256

        7e04572abd261d34128c7e74d2f5c9ddd5f719f950853e5dbb31a77d783e38ae

        SHA512

        e87470cb1dd826c8ff656b27abb97f06246732757bf93ead3d0bbe3ec30c7385d4c48a4ef8887b830a5b33570b1472997b54c64c051053ffac1c4a2d53c69a6c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4491.exe

        Filesize

        324KB

        MD5

        bee077942e0fb5b4d265310a870f4bfa

        SHA1

        f37a09f159d88182078e802c5833cb1ee3975985

        SHA256

        7e04572abd261d34128c7e74d2f5c9ddd5f719f950853e5dbb31a77d783e38ae

        SHA512

        e87470cb1dd826c8ff656b27abb97f06246732757bf93ead3d0bbe3ec30c7385d4c48a4ef8887b830a5b33570b1472997b54c64c051053ffac1c4a2d53c69a6c

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7787ut.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7787ut.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48lI07.exe

        Filesize

        225KB

        MD5

        33231815cbd84a724f4c9812e5e61624

        SHA1

        9eb08fcfc4793dae36cfc5e43562e13075146e74

        SHA256

        1582ab7509bfda42191e7aa43bbe8aaff0e5abf9db16c1208e52b5073b3df0a5

        SHA512

        aea04dafd6686a9eb5659a99f398a9ed579557c1406d7d18f79c4fa39e1a600862c1d57c2814c04224a46425a915686288426479f34a60639fa0a739603cba97

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48lI07.exe

        Filesize

        225KB

        MD5

        33231815cbd84a724f4c9812e5e61624

        SHA1

        9eb08fcfc4793dae36cfc5e43562e13075146e74

        SHA256

        1582ab7509bfda42191e7aa43bbe8aaff0e5abf9db16c1208e52b5073b3df0a5

        SHA512

        aea04dafd6686a9eb5659a99f398a9ed579557c1406d7d18f79c4fa39e1a600862c1d57c2814c04224a46425a915686288426479f34a60639fa0a739603cba97

      • memory/1788-498-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1788-1116-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1788-1128-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1788-1127-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1788-1126-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1788-1125-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1788-1124-0x0000000006880000-0x0000000006DAC000-memory.dmp

        Filesize

        5.2MB

      • memory/1788-1122-0x00000000066B0000-0x0000000006872000-memory.dmp

        Filesize

        1.8MB

      • memory/1788-1121-0x0000000006640000-0x0000000006690000-memory.dmp

        Filesize

        320KB

      • memory/1788-1120-0x00000000065C0000-0x0000000006636000-memory.dmp

        Filesize

        472KB

      • memory/1788-1119-0x00000000063C0000-0x0000000006452000-memory.dmp

        Filesize

        584KB

      • memory/1788-1118-0x0000000005D00000-0x0000000005D66000-memory.dmp

        Filesize

        408KB

      • memory/1788-1117-0x0000000005A10000-0x0000000005A4C000-memory.dmp

        Filesize

        240KB

      • memory/1788-1115-0x00000000059F0000-0x0000000005A02000-memory.dmp

        Filesize

        72KB

      • memory/1788-1114-0x00000000058C0000-0x00000000059CA000-memory.dmp

        Filesize

        1.0MB

      • memory/1788-1113-0x00000000052A0000-0x00000000058B8000-memory.dmp

        Filesize

        6.1MB

      • memory/1788-499-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1788-496-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/1788-494-0x0000000000640000-0x000000000068B000-memory.dmp

        Filesize

        300KB

      • memory/1788-236-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-234-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-232-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-230-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-228-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-203-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-204-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-206-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-208-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-210-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-212-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-214-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-216-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-218-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-220-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-222-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-224-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/1788-226-0x0000000002520000-0x000000000255E000-memory.dmp

        Filesize

        248KB

      • memory/2388-182-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-165-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-198-0x0000000000400000-0x00000000004B8000-memory.dmp

        Filesize

        736KB

      • memory/2388-196-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/2388-162-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/2388-194-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/2388-193-0x0000000000400000-0x00000000004B8000-memory.dmp

        Filesize

        736KB

      • memory/2388-192-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-161-0x00000000008F0000-0x000000000091D000-memory.dmp

        Filesize

        180KB

      • memory/2388-190-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-188-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-186-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-164-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/2388-163-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/2388-195-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/2388-180-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-178-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-176-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-174-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-172-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-170-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-168-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-166-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-184-0x00000000024E0000-0x00000000024F2000-memory.dmp

        Filesize

        72KB

      • memory/2388-160-0x0000000004C20000-0x00000000051C4000-memory.dmp

        Filesize

        5.6MB

      • memory/2960-154-0x0000000000E40000-0x0000000000E4A000-memory.dmp

        Filesize

        40KB

      • memory/3956-1134-0x00000000006C0000-0x00000000006F2000-memory.dmp

        Filesize

        200KB

      • memory/3956-1135-0x0000000005310000-0x0000000005320000-memory.dmp

        Filesize

        64KB