Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    77s
  • max time network
    82s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2023, 21:03

General

  • Target

    96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe

  • Size

    792KB

  • MD5

    ec6f94af241a9a9b582872e37202c676

  • SHA1

    4b6c7c17ac8d5e0614388159b315c4a5ce2d7392

  • SHA256

    96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf

  • SHA512

    72f1a2eb3dac4b1485ce7fb21555a36d6b9a7af88efbba50fd9f70ee15fcc7e99f6851dff412f3fed3b65c8916cd00b68a2c91d2a0644b2d2d3b359c4c01f81c

  • SSDEEP

    24576:myQVf0rsoE2bHIA01Uox14Rk44sOYrCyPO:1Q10woEGu1UeORCsOOP

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe
    "C:\Users\Admin\AppData\Local\Temp\96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4160
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1194.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1194.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8161.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8161.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4296
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1040ln.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1040ln.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1628
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c21qu47.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c21qu47.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1820
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 1080
            5⤵
            • Program crash
            PID:764
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDnlk81.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDnlk81.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 1352
          4⤵
          • Program crash
          PID:4568
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e74oe66.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e74oe66.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4644
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1820 -ip 1820
    1⤵
      PID:5024
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 956 -ip 956
      1⤵
        PID:4784

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e74oe66.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e74oe66.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1194.exe

        Filesize

        647KB

        MD5

        c1fceb65ded603312bade8b862ea04c5

        SHA1

        b2a5d433b8c87ccc471d477f690f5466d24a3bda

        SHA256

        83f1c30dc9e6b07edb84a3c235cc5df62c0249cb79975bbfc0d7387a41237524

        SHA512

        944e86763f20ae9ef2b178e70849bc59b952c5e3c3c1995f231daf02dc6c4b89875a69cb642bd726b2b3d5c9158c4748b31bb7555dbf612bcedde4b8b7b98f53

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1194.exe

        Filesize

        647KB

        MD5

        c1fceb65ded603312bade8b862ea04c5

        SHA1

        b2a5d433b8c87ccc471d477f690f5466d24a3bda

        SHA256

        83f1c30dc9e6b07edb84a3c235cc5df62c0249cb79975bbfc0d7387a41237524

        SHA512

        944e86763f20ae9ef2b178e70849bc59b952c5e3c3c1995f231daf02dc6c4b89875a69cb642bd726b2b3d5c9158c4748b31bb7555dbf612bcedde4b8b7b98f53

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDnlk81.exe

        Filesize

        283KB

        MD5

        4aaad586c9f453d13863b9fd4de17bd7

        SHA1

        c480e0f71dd8e59cf9ed619f11a74b4c98546b76

        SHA256

        725e4ebb675a0cf2b6336342bbbe14993bee16bece117474b881028c7860d0bc

        SHA512

        4cf997c8d43490e487a1dca066b5c968ff0fc489a532730e9ef4b85d711537f92f023f59be6717a2c0c5921967682bf0114ea4fb6f3df05cdab94de1d64699af

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDnlk81.exe

        Filesize

        283KB

        MD5

        4aaad586c9f453d13863b9fd4de17bd7

        SHA1

        c480e0f71dd8e59cf9ed619f11a74b4c98546b76

        SHA256

        725e4ebb675a0cf2b6336342bbbe14993bee16bece117474b881028c7860d0bc

        SHA512

        4cf997c8d43490e487a1dca066b5c968ff0fc489a532730e9ef4b85d711537f92f023f59be6717a2c0c5921967682bf0114ea4fb6f3df05cdab94de1d64699af

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8161.exe

        Filesize

        324KB

        MD5

        4fa61b2da0f2f983d8ba1656446e1018

        SHA1

        6a664f266292773c91f7249b291ab9b1a12ffc69

        SHA256

        c56e73bc4d726056e7c6f1547a78b2b0f3976432b10dbe257a459617dba29994

        SHA512

        a03f70fe68279590fcc72482aa3124fccd70cde9c8fa3a5001d8dff52d965f3b53e4374819a7ae1f870cbfb803903aa150a161cd27f669c340e213f7d3e06182

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8161.exe

        Filesize

        324KB

        MD5

        4fa61b2da0f2f983d8ba1656446e1018

        SHA1

        6a664f266292773c91f7249b291ab9b1a12ffc69

        SHA256

        c56e73bc4d726056e7c6f1547a78b2b0f3976432b10dbe257a459617dba29994

        SHA512

        a03f70fe68279590fcc72482aa3124fccd70cde9c8fa3a5001d8dff52d965f3b53e4374819a7ae1f870cbfb803903aa150a161cd27f669c340e213f7d3e06182

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1040ln.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1040ln.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c21qu47.exe

        Filesize

        225KB

        MD5

        9da0a12570523b034c83fbb1fcc95fd2

        SHA1

        f759365da1af90e7c488df24862f81a0e61d3fed

        SHA256

        a8eb55858c0760ef9c0b89f90bff12094babf82d3a193d078fbd4577c83e0785

        SHA512

        b3a9b182c4d3ba0c01fe9e64cac7ae5ced09286c1727592ce0a1ff349bc54f800ead38cdbfc92ffb48cee95ad57cf6f0467fe0c1b9c1d8d15ebd1cbdaf7ff8bd

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c21qu47.exe

        Filesize

        225KB

        MD5

        9da0a12570523b034c83fbb1fcc95fd2

        SHA1

        f759365da1af90e7c488df24862f81a0e61d3fed

        SHA256

        a8eb55858c0760ef9c0b89f90bff12094babf82d3a193d078fbd4577c83e0785

        SHA512

        b3a9b182c4d3ba0c01fe9e64cac7ae5ced09286c1727592ce0a1ff349bc54f800ead38cdbfc92ffb48cee95ad57cf6f0467fe0c1b9c1d8d15ebd1cbdaf7ff8bd

      • memory/956-408-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/956-1113-0x0000000005AF0000-0x0000000005B02000-memory.dmp

        Filesize

        72KB

      • memory/956-1126-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/956-1124-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/956-1125-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/956-1123-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/956-1122-0x0000000006880000-0x0000000006DAC000-memory.dmp

        Filesize

        5.2MB

      • memory/956-1121-0x00000000066B0000-0x0000000006872000-memory.dmp

        Filesize

        1.8MB

      • memory/956-1120-0x0000000006630000-0x0000000006680000-memory.dmp

        Filesize

        320KB

      • memory/956-1119-0x00000000065A0000-0x0000000006616000-memory.dmp

        Filesize

        472KB

      • memory/956-1117-0x0000000005EA0000-0x0000000005F06000-memory.dmp

        Filesize

        408KB

      • memory/956-1116-0x0000000005E00000-0x0000000005E92000-memory.dmp

        Filesize

        584KB

      • memory/956-1115-0x0000000005B10000-0x0000000005B4C000-memory.dmp

        Filesize

        240KB

      • memory/956-1114-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/956-1112-0x00000000059B0000-0x0000000005ABA000-memory.dmp

        Filesize

        1.0MB

      • memory/956-1111-0x0000000005310000-0x0000000005928000-memory.dmp

        Filesize

        6.1MB

      • memory/956-406-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/956-404-0x0000000002580000-0x0000000002590000-memory.dmp

        Filesize

        64KB

      • memory/956-402-0x00000000020F0000-0x000000000213B000-memory.dmp

        Filesize

        300KB

      • memory/956-234-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-232-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-230-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-202-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-201-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-204-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-206-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-208-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-210-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-212-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-214-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-216-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-218-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-220-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-222-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-224-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-226-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/956-228-0x0000000005140000-0x000000000517E000-memory.dmp

        Filesize

        248KB

      • memory/1628-154-0x0000000000110000-0x000000000011A000-memory.dmp

        Filesize

        40KB

      • memory/1820-184-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-160-0x0000000004BC0000-0x0000000005164000-memory.dmp

        Filesize

        5.6MB

      • memory/1820-194-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/1820-193-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/1820-161-0x0000000000590000-0x00000000005BD000-memory.dmp

        Filesize

        180KB

      • memory/1820-192-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/1820-191-0x0000000000400000-0x00000000004B8000-memory.dmp

        Filesize

        736KB

      • memory/1820-190-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-164-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-188-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-186-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-162-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/1820-196-0x0000000000400000-0x00000000004B8000-memory.dmp

        Filesize

        736KB

      • memory/1820-178-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-182-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-176-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-174-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-172-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-170-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-168-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-166-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-180-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/1820-163-0x0000000004A20000-0x0000000004A32000-memory.dmp

        Filesize

        72KB

      • memory/4644-1132-0x0000000000130000-0x0000000000162000-memory.dmp

        Filesize

        200KB

      • memory/4644-1133-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB