Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    78s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2023, 18:26

General

  • Target

    96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe

  • Size

    793KB

  • MD5

    7bf4dd892b8197264acdbb81dc74cff4

  • SHA1

    c64d3d706f95997ee0e0d1be5253aae3338a46a1

  • SHA256

    96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e

  • SHA512

    56dcd8dca12651d46c8e4e1574e2b0f77917631fc3c7780ea4c26404c11a7a80cd49dc62354f1dc29f844de45db98a49aa1cb4c6b2c84505621bdb0fab6d92c1

  • SSDEEP

    24576:kyzDVzK0ZgYeERQKUsJqivlcDl2I2QvsR:zzDfZO2xpvSYIvs

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe
    "C:\Users\Admin\AppData\Local\Temp\96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4506.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4506.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0648.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0648.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2469Fx.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2469Fx.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2784
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c31Dx20.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c31Dx20.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2640
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 1080
            5⤵
            • Program crash
            PID:4724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOsIv82.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOsIv82.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4024
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 1828
          4⤵
          • Program crash
          PID:4780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48oV95.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48oV95.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3844
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2640 -ip 2640
    1⤵
      PID:5088
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4024 -ip 4024
      1⤵
        PID:5036

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48oV95.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48oV95.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4506.exe

        Filesize

        648KB

        MD5

        0c9d50bb2a06798771006ad0963d0a28

        SHA1

        34432045f9997cb2b71e3aa3ec12f50bb6777fee

        SHA256

        f40ec6c5331c3716939310580e502ed4ec780c96f8f5dc51e7a624f0917310f2

        SHA512

        cf4bb040fe71db9eb4283089eba22974433d24632d96b3163f3b8bf84b486c106b3501b9ed95be0e7dce700e11123ff844bce5f5661026df3a31d27b8358e7a3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4506.exe

        Filesize

        648KB

        MD5

        0c9d50bb2a06798771006ad0963d0a28

        SHA1

        34432045f9997cb2b71e3aa3ec12f50bb6777fee

        SHA256

        f40ec6c5331c3716939310580e502ed4ec780c96f8f5dc51e7a624f0917310f2

        SHA512

        cf4bb040fe71db9eb4283089eba22974433d24632d96b3163f3b8bf84b486c106b3501b9ed95be0e7dce700e11123ff844bce5f5661026df3a31d27b8358e7a3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOsIv82.exe

        Filesize

        283KB

        MD5

        62c921f7b7c69930f0a7e8154d7eaa82

        SHA1

        82790acb68075d8b4d68e9fe6f853dbd2430fbdd

        SHA256

        ded792a57fcdb37dd0b00f6bee72a1101555da7febbaa94f6e05f20dc0bcfe1e

        SHA512

        dc700e4a6eaf39054c6024f0c76f6ef1826295325823c04fa3a7db06119ee9505fa0301c633b2ab68f3c8f508dfb6b31468ce3d940e576097e969b185931918b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOsIv82.exe

        Filesize

        283KB

        MD5

        62c921f7b7c69930f0a7e8154d7eaa82

        SHA1

        82790acb68075d8b4d68e9fe6f853dbd2430fbdd

        SHA256

        ded792a57fcdb37dd0b00f6bee72a1101555da7febbaa94f6e05f20dc0bcfe1e

        SHA512

        dc700e4a6eaf39054c6024f0c76f6ef1826295325823c04fa3a7db06119ee9505fa0301c633b2ab68f3c8f508dfb6b31468ce3d940e576097e969b185931918b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0648.exe

        Filesize

        325KB

        MD5

        dc95bb959d880c60feb4602b65330b02

        SHA1

        9ace0aaf6c15f74791fe07104995e7dfbcae5c37

        SHA256

        2e3c68332c98d9d685f80c3df81cd8e938d72e897e505366c08cf1b74dd2be58

        SHA512

        ef08cdc415e89e1f8f0f531c13be5e9dfb4b4662e6cb5e40548a7e5495c3adbd6d7c817b3f7dce808b2524ff6fe86b0dd816663382b1e113ba4d1a152fe5a4a5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0648.exe

        Filesize

        325KB

        MD5

        dc95bb959d880c60feb4602b65330b02

        SHA1

        9ace0aaf6c15f74791fe07104995e7dfbcae5c37

        SHA256

        2e3c68332c98d9d685f80c3df81cd8e938d72e897e505366c08cf1b74dd2be58

        SHA512

        ef08cdc415e89e1f8f0f531c13be5e9dfb4b4662e6cb5e40548a7e5495c3adbd6d7c817b3f7dce808b2524ff6fe86b0dd816663382b1e113ba4d1a152fe5a4a5

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2469Fx.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2469Fx.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c31Dx20.exe

        Filesize

        226KB

        MD5

        a5c55cf53638896d2ca1b18cb70d7645

        SHA1

        f056ace5d54d22c3956e814654500f49ffe6ae45

        SHA256

        c1af6b94005d52666c93322d7d479569bcab9248bcf6e8d5784f7e3d719a5bde

        SHA512

        0f61dded83b7d024e833e4c716f2074cae12f5e33d0056cf2c13160554d6f295db8c2e0719fafaef2d92ba7165404f5dba0fe070335c520cac6c126c5176868a

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c31Dx20.exe

        Filesize

        226KB

        MD5

        a5c55cf53638896d2ca1b18cb70d7645

        SHA1

        f056ace5d54d22c3956e814654500f49ffe6ae45

        SHA256

        c1af6b94005d52666c93322d7d479569bcab9248bcf6e8d5784f7e3d719a5bde

        SHA512

        0f61dded83b7d024e833e4c716f2074cae12f5e33d0056cf2c13160554d6f295db8c2e0719fafaef2d92ba7165404f5dba0fe070335c520cac6c126c5176868a

      • memory/2640-177-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-179-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-166-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-167-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-169-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-171-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-173-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-175-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-165-0x0000000004B80000-0x0000000004B90000-memory.dmp

        Filesize

        64KB

      • memory/2640-185-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-183-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-181-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-187-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-164-0x0000000004B80000-0x0000000004B90000-memory.dmp

        Filesize

        64KB

      • memory/2640-189-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-193-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-191-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/2640-194-0x0000000000400000-0x00000000004B8000-memory.dmp

        Filesize

        736KB

      • memory/2640-195-0x0000000004B80000-0x0000000004B90000-memory.dmp

        Filesize

        64KB

      • memory/2640-196-0x0000000004B80000-0x0000000004B90000-memory.dmp

        Filesize

        64KB

      • memory/2640-198-0x0000000000400000-0x00000000004B8000-memory.dmp

        Filesize

        736KB

      • memory/2640-162-0x0000000004B90000-0x0000000005134000-memory.dmp

        Filesize

        5.6MB

      • memory/2640-163-0x00000000005A0000-0x00000000005CD000-memory.dmp

        Filesize

        180KB

      • memory/2784-157-0x000000001B890000-0x000000001B9DE000-memory.dmp

        Filesize

        1.3MB

      • memory/2784-155-0x000000001B890000-0x000000001B9DE000-memory.dmp

        Filesize

        1.3MB

      • memory/2784-154-0x0000000000CB0000-0x0000000000CBA000-memory.dmp

        Filesize

        40KB

      • memory/3844-1134-0x0000000005600000-0x0000000005610000-memory.dmp

        Filesize

        64KB

      • memory/3844-1133-0x0000000000A50000-0x0000000000A82000-memory.dmp

        Filesize

        200KB

      • memory/4024-203-0x0000000000570000-0x00000000005BB000-memory.dmp

        Filesize

        300KB

      • memory/4024-216-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-214-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-212-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-210-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-218-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-220-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-222-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-224-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-226-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-228-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-230-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-232-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-234-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-236-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-604-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

        Filesize

        64KB

      • memory/4024-1112-0x0000000005190000-0x00000000057A8000-memory.dmp

        Filesize

        6.1MB

      • memory/4024-1113-0x00000000057B0000-0x00000000058BA000-memory.dmp

        Filesize

        1.0MB

      • memory/4024-1114-0x00000000058C0000-0x00000000058D2000-memory.dmp

        Filesize

        72KB

      • memory/4024-1115-0x00000000058E0000-0x000000000591C000-memory.dmp

        Filesize

        240KB

      • memory/4024-1116-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

        Filesize

        64KB

      • memory/4024-1117-0x0000000005BC0000-0x0000000005C52000-memory.dmp

        Filesize

        584KB

      • memory/4024-1118-0x0000000005C60000-0x0000000005CC6000-memory.dmp

        Filesize

        408KB

      • memory/4024-1120-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

        Filesize

        64KB

      • memory/4024-1121-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

        Filesize

        64KB

      • memory/4024-1122-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

        Filesize

        64KB

      • memory/4024-1123-0x0000000006700000-0x00000000068C2000-memory.dmp

        Filesize

        1.8MB

      • memory/4024-1124-0x00000000068E0000-0x0000000006E0C000-memory.dmp

        Filesize

        5.2MB

      • memory/4024-1125-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

        Filesize

        64KB

      • memory/4024-1126-0x0000000006F50000-0x0000000006FC6000-memory.dmp

        Filesize

        472KB

      • memory/4024-1127-0x0000000006FE0000-0x0000000007030000-memory.dmp

        Filesize

        320KB

      • memory/4024-208-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-206-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-205-0x0000000002620000-0x000000000265E000-memory.dmp

        Filesize

        248KB

      • memory/4024-204-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

        Filesize

        64KB