Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    49s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/03/2023, 19:24

General

  • Target

    fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe

  • Size

    794KB

  • MD5

    d5c6ae5d9205ab23c615b5be98cda401

  • SHA1

    3bf03c9cf78f05d8e41d463e4e78dbdae47f04ab

  • SHA256

    fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074

  • SHA512

    8eed582f739dbeed2e5dcd758b89b7e9ade5341cff0462dccab2b356f5ceab6c518450042ae57a1d2dc7f74dc1e9798fbc571fe2a04b51291afd679142bb6d8c

  • SSDEEP

    12288:uMrYy90tLu/1h1fJOL+gK11d0N2U0LsU2xHC0oLpchygSLwpYnt1GCFX4MFs/Z:iyCLu/v1kLJ2U6sUUHC0Mp4BSYoHFsR

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe
    "C:\Users\Admin\AppData\Local\Temp\fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4422.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4422.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0638.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0638.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0347jI.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0347jI.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c35us97.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c35us97.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\duScF80.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\duScF80.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e31LN91.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e31LN91.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4732

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e31LN91.exe

    Filesize

    175KB

    MD5

    478e884952392c14b85cca1a6a4f3e35

    SHA1

    f3475db1427fec3eedf583f1b7b0f839b27f8d74

    SHA256

    bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

    SHA512

    b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e31LN91.exe

    Filesize

    175KB

    MD5

    478e884952392c14b85cca1a6a4f3e35

    SHA1

    f3475db1427fec3eedf583f1b7b0f839b27f8d74

    SHA256

    bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

    SHA512

    b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4422.exe

    Filesize

    648KB

    MD5

    89f6443cbfceb557201412e4fcf3d6a9

    SHA1

    9edff94b19ec785a5f0f64d1c4cbd9431dca3e5a

    SHA256

    b7774b5b184b9ec469add6021b617f250b5c264d7b7e00c86fb8838ee2f89e30

    SHA512

    ad2fc9bb639e4284ab996f89b376aeb7ca2bcbdd1af16ca7faf1aae2664168206435b4aa05a7285ef2fdb1f12d50f1a34e5acfeb3680bf3833ce39e728a21c6a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4422.exe

    Filesize

    648KB

    MD5

    89f6443cbfceb557201412e4fcf3d6a9

    SHA1

    9edff94b19ec785a5f0f64d1c4cbd9431dca3e5a

    SHA256

    b7774b5b184b9ec469add6021b617f250b5c264d7b7e00c86fb8838ee2f89e30

    SHA512

    ad2fc9bb639e4284ab996f89b376aeb7ca2bcbdd1af16ca7faf1aae2664168206435b4aa05a7285ef2fdb1f12d50f1a34e5acfeb3680bf3833ce39e728a21c6a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\duScF80.exe

    Filesize

    284KB

    MD5

    478300072b55b94fd1afc4a304db6c13

    SHA1

    b70a6f91d0262ba3f3506df4600a63771243cac2

    SHA256

    8fe228a88c5f651dd353fe7d857cc17e5a0adb1da9c5a6de204c51daa0a6aa0f

    SHA512

    d3f3848b593ca138ec376c2e84b55a8187b987146d98a85743d7ddbdf753a553d007d098d48fea789abf843eaadf84eafa871c70483fcde2434e66c144dc610d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\duScF80.exe

    Filesize

    284KB

    MD5

    478300072b55b94fd1afc4a304db6c13

    SHA1

    b70a6f91d0262ba3f3506df4600a63771243cac2

    SHA256

    8fe228a88c5f651dd353fe7d857cc17e5a0adb1da9c5a6de204c51daa0a6aa0f

    SHA512

    d3f3848b593ca138ec376c2e84b55a8187b987146d98a85743d7ddbdf753a553d007d098d48fea789abf843eaadf84eafa871c70483fcde2434e66c144dc610d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0638.exe

    Filesize

    324KB

    MD5

    29bb3e6d7a37bb17f9fa47d14aa97a32

    SHA1

    a98ff5fd6f97b40a77e820f207ae0dd7e5aca2f8

    SHA256

    e1f7d3cc0842dbd1e153e26465719de09906774a5e0202b4c3a08f9a06f640a5

    SHA512

    40098e3fa84e9b6eb23f74ad7934684684a6f57a880282429ccb7d6568744446246f80ba5eb26c4db7e088587f6b809c9e546eb4f6eff275880baecce4495d44

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0638.exe

    Filesize

    324KB

    MD5

    29bb3e6d7a37bb17f9fa47d14aa97a32

    SHA1

    a98ff5fd6f97b40a77e820f207ae0dd7e5aca2f8

    SHA256

    e1f7d3cc0842dbd1e153e26465719de09906774a5e0202b4c3a08f9a06f640a5

    SHA512

    40098e3fa84e9b6eb23f74ad7934684684a6f57a880282429ccb7d6568744446246f80ba5eb26c4db7e088587f6b809c9e546eb4f6eff275880baecce4495d44

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0347jI.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0347jI.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c35us97.exe

    Filesize

    226KB

    MD5

    b2e29b7b4c283e4e49c5cb6f685af813

    SHA1

    194009992134a2bc7026844e45d42e390cc16d2e

    SHA256

    d0b4a89e48a8e2e0a7e21188076c5813498dd5efb588134d75376c834f51d3ed

    SHA512

    0ce19bbbbe34ce71500f3552909d2c09ce817e8c0dc6199371ea66f6295689053cc5f032c4804ce44984786315fcc0362a4f66893d15ebb3ee84170a1bb308b8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c35us97.exe

    Filesize

    226KB

    MD5

    b2e29b7b4c283e4e49c5cb6f685af813

    SHA1

    194009992134a2bc7026844e45d42e390cc16d2e

    SHA256

    d0b4a89e48a8e2e0a7e21188076c5813498dd5efb588134d75376c834f51d3ed

    SHA512

    0ce19bbbbe34ce71500f3552909d2c09ce817e8c0dc6199371ea66f6295689053cc5f032c4804ce44984786315fcc0362a4f66893d15ebb3ee84170a1bb308b8

  • memory/2636-142-0x00000000006E0000-0x00000000006EA000-memory.dmp

    Filesize

    40KB

  • memory/3136-154-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-166-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-151-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3136-152-0x00000000025A0000-0x00000000025B0000-memory.dmp

    Filesize

    64KB

  • memory/3136-153-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-149-0x0000000004B50000-0x000000000504E000-memory.dmp

    Filesize

    5.0MB

  • memory/3136-156-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-158-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-160-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-162-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-164-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-150-0x00000000025B0000-0x00000000025C8000-memory.dmp

    Filesize

    96KB

  • memory/3136-168-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-170-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-172-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-174-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-176-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-178-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-180-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/3136-181-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3136-182-0x00000000025A0000-0x00000000025B0000-memory.dmp

    Filesize

    64KB

  • memory/3136-184-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/3136-148-0x00000000006E0000-0x00000000006FA000-memory.dmp

    Filesize

    104KB

  • memory/3576-192-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-226-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-190-0x0000000002610000-0x0000000002654000-memory.dmp

    Filesize

    272KB

  • memory/3576-194-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-196-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-198-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-200-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-202-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-204-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-206-0x00000000004D0000-0x000000000051B000-memory.dmp

    Filesize

    300KB

  • memory/3576-208-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/3576-207-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-211-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-209-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/3576-214-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-212-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/3576-216-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-218-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-220-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-222-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-224-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-191-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-228-0x0000000002610000-0x000000000264E000-memory.dmp

    Filesize

    248KB

  • memory/3576-1101-0x0000000005150000-0x0000000005756000-memory.dmp

    Filesize

    6.0MB

  • memory/3576-1102-0x0000000005760000-0x000000000586A000-memory.dmp

    Filesize

    1.0MB

  • memory/3576-1103-0x0000000004B80000-0x0000000004B92000-memory.dmp

    Filesize

    72KB

  • memory/3576-1104-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

    Filesize

    248KB

  • memory/3576-1105-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/3576-1106-0x0000000004BF0000-0x0000000004C3B000-memory.dmp

    Filesize

    300KB

  • memory/3576-1107-0x0000000005AB0000-0x0000000005B16000-memory.dmp

    Filesize

    408KB

  • memory/3576-1109-0x00000000061A0000-0x0000000006232000-memory.dmp

    Filesize

    584KB

  • memory/3576-1110-0x0000000006240000-0x00000000062B6000-memory.dmp

    Filesize

    472KB

  • memory/3576-1111-0x00000000062C0000-0x0000000006310000-memory.dmp

    Filesize

    320KB

  • memory/3576-1112-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/3576-1113-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/3576-1114-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/3576-1115-0x0000000006450000-0x0000000006612000-memory.dmp

    Filesize

    1.8MB

  • memory/3576-189-0x0000000002240000-0x0000000002286000-memory.dmp

    Filesize

    280KB

  • memory/3576-1116-0x0000000006620000-0x0000000006B4C000-memory.dmp

    Filesize

    5.2MB

  • memory/4732-1122-0x0000000000340000-0x0000000000372000-memory.dmp

    Filesize

    200KB

  • memory/4732-1123-0x0000000004D80000-0x0000000004DCB000-memory.dmp

    Filesize

    300KB

  • memory/4732-1124-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB