Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/03/2023, 09:31

General

  • Target

    978fa66f3410a43a286e648f9c0cb31a114e2b13b449d9b8112046c98d33ea52.exe

  • Size

    861KB

  • MD5

    0fbcc9f746a739cffa711293281d7cd8

  • SHA1

    bf71952cf63103ae86438c4a86852745fd295ccd

  • SHA256

    978fa66f3410a43a286e648f9c0cb31a114e2b13b449d9b8112046c98d33ea52

  • SHA512

    88f17a921c738ec73248f2eec6791fd92915833e02a498bb9a0b6de0cfb01249b0fea85eff042a1e035c3383533a52ad7ad77fb3cd04796ff799cc626121a692

  • SSDEEP

    24576:vypjeVctemQHXq08PTC0C77uJpljnkAa:6pCQemoCPe0CnuPlg

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

laba

C2

193.233.20.28:4125

Attributes
  • auth_value

    2cf01cffff9092a85ca7e106c547190b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\978fa66f3410a43a286e648f9c0cb31a114e2b13b449d9b8112046c98d33ea52.exe
    "C:\Users\Admin\AppData\Local\Temp\978fa66f3410a43a286e648f9c0cb31a114e2b13b449d9b8112046c98d33ea52.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6906.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6906.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0397.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0397.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0322FI.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0322FI.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4896
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c65JZ29.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c65JZ29.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3492
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 1076
            5⤵
            • Program crash
            PID:4752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dquZC63.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dquZC63.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3176
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 1744
          4⤵
          • Program crash
          PID:3132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e39gJ71.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e39gJ71.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:908
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 3492 -ip 3492
    1⤵
      PID:4776
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3176 -ip 3176
      1⤵
        PID:1632
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1684

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e39gJ71.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e39gJ71.exe

        Filesize

        175KB

        MD5

        478e884952392c14b85cca1a6a4f3e35

        SHA1

        f3475db1427fec3eedf583f1b7b0f839b27f8d74

        SHA256

        bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413

        SHA512

        b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6906.exe

        Filesize

        716KB

        MD5

        9508ccfdd19b6909f80ae74ef0fd4409

        SHA1

        1e465a19891232db3d9a56b4ff6ae473e1b0be56

        SHA256

        9a7ed435ca1a90dd01049bd14130a6262b0dee5c21eb7af93e63233432bba85e

        SHA512

        a39dc4948ca79680fc04c6acdcdcebe4b736861db7c451f28a7dad6f38a9528592e8da55a35286f005d3cfa6348e524512d3aa4d57e7a0108116096d0ef8b33d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice6906.exe

        Filesize

        716KB

        MD5

        9508ccfdd19b6909f80ae74ef0fd4409

        SHA1

        1e465a19891232db3d9a56b4ff6ae473e1b0be56

        SHA256

        9a7ed435ca1a90dd01049bd14130a6262b0dee5c21eb7af93e63233432bba85e

        SHA512

        a39dc4948ca79680fc04c6acdcdcebe4b736861db7c451f28a7dad6f38a9528592e8da55a35286f005d3cfa6348e524512d3aa4d57e7a0108116096d0ef8b33d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dquZC63.exe

        Filesize

        399KB

        MD5

        0d2e9218c7b52202da97464ca8822c8c

        SHA1

        89b353fa48e836d2f2124ce9a529a1c3b5ac1278

        SHA256

        78d21a02e6853a37a51ad54f2a80c07a1ec01822df77a90b8f37b6390acdf819

        SHA512

        b5b385ef7f852d4c8ad05f68d01f61c5b4d7b5b70d8fdea006aa56c5b39e75d44425d2fda3d8b72c910074bfc7a329ca266190e15b26933793e71bdae7814787

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dquZC63.exe

        Filesize

        399KB

        MD5

        0d2e9218c7b52202da97464ca8822c8c

        SHA1

        89b353fa48e836d2f2124ce9a529a1c3b5ac1278

        SHA256

        78d21a02e6853a37a51ad54f2a80c07a1ec01822df77a90b8f37b6390acdf819

        SHA512

        b5b385ef7f852d4c8ad05f68d01f61c5b4d7b5b70d8fdea006aa56c5b39e75d44425d2fda3d8b72c910074bfc7a329ca266190e15b26933793e71bdae7814787

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0397.exe

        Filesize

        359KB

        MD5

        550ee7e98a293d36630d69d8373e0774

        SHA1

        f7eda452925024aa9b32761f96a2a5b4c81644fb

        SHA256

        322f9d39d89a44310277d7803c7898723566408321498acfef7235bfe74f5193

        SHA512

        8ec7db7cbb0fb5a4c3e8d64e35840222c81f9b6cbce6b7d4b95232a6fc66a11a6c6111f3364041af05cb990dc1b1d3d82699b1edd3b1e9e081b4fa1a27316278

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0397.exe

        Filesize

        359KB

        MD5

        550ee7e98a293d36630d69d8373e0774

        SHA1

        f7eda452925024aa9b32761f96a2a5b4c81644fb

        SHA256

        322f9d39d89a44310277d7803c7898723566408321498acfef7235bfe74f5193

        SHA512

        8ec7db7cbb0fb5a4c3e8d64e35840222c81f9b6cbce6b7d4b95232a6fc66a11a6c6111f3364041af05cb990dc1b1d3d82699b1edd3b1e9e081b4fa1a27316278

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0322FI.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0322FI.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c65JZ29.exe

        Filesize

        342KB

        MD5

        2c749f917ea323b65ea01706d66c8cca

        SHA1

        4fc5904fc29f352cba246425c113e7691d71ea56

        SHA256

        24bfc55fc197091e395798a54123bb584dbae6caf2ba1f9b9699b58009f55f13

        SHA512

        bfbed2d2951887cce9f7d25b2b71068fd89448a321ac00c21d840566477ea01a81e0ad4be9e52164ac11b94bb5c88c23c0fb58501ce6ba1c3eb297eb056ef5e2

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c65JZ29.exe

        Filesize

        342KB

        MD5

        2c749f917ea323b65ea01706d66c8cca

        SHA1

        4fc5904fc29f352cba246425c113e7691d71ea56

        SHA256

        24bfc55fc197091e395798a54123bb584dbae6caf2ba1f9b9699b58009f55f13

        SHA512

        bfbed2d2951887cce9f7d25b2b71068fd89448a321ac00c21d840566477ea01a81e0ad4be9e52164ac11b94bb5c88c23c0fb58501ce6ba1c3eb297eb056ef5e2

      • memory/908-1135-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/908-1134-0x0000000000320000-0x0000000000352000-memory.dmp

        Filesize

        200KB

      • memory/3176-240-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-1115-0x0000000007350000-0x0000000007362000-memory.dmp

        Filesize

        72KB

      • memory/3176-1128-0x0000000007380000-0x0000000007390000-memory.dmp

        Filesize

        64KB

      • memory/3176-1127-0x0000000009160000-0x000000000968C000-memory.dmp

        Filesize

        5.2MB

      • memory/3176-1126-0x0000000008F80000-0x0000000009142000-memory.dmp

        Filesize

        1.8MB

      • memory/3176-1125-0x0000000008DC0000-0x0000000008E10000-memory.dmp

        Filesize

        320KB

      • memory/3176-1124-0x0000000008D30000-0x0000000008DA6000-memory.dmp

        Filesize

        472KB

      • memory/3176-1123-0x0000000007380000-0x0000000007390000-memory.dmp

        Filesize

        64KB

      • memory/3176-1122-0x0000000007380000-0x0000000007390000-memory.dmp

        Filesize

        64KB

      • memory/3176-1121-0x0000000007380000-0x0000000007390000-memory.dmp

        Filesize

        64KB

      • memory/3176-1120-0x00000000083F0000-0x0000000008456000-memory.dmp

        Filesize

        408KB

      • memory/3176-1119-0x0000000008350000-0x00000000083E2000-memory.dmp

        Filesize

        584KB

      • memory/3176-1117-0x0000000007380000-0x0000000007390000-memory.dmp

        Filesize

        64KB

      • memory/3176-1116-0x0000000008070000-0x00000000080AC000-memory.dmp

        Filesize

        240KB

      • memory/3176-1114-0x0000000007F60000-0x000000000806A000-memory.dmp

        Filesize

        1.0MB

      • memory/3176-1113-0x0000000007940000-0x0000000007F58000-memory.dmp

        Filesize

        6.1MB

      • memory/3176-238-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-236-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-234-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-232-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-230-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-228-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-203-0x0000000002C40000-0x0000000002C8B000-memory.dmp

        Filesize

        300KB

      • memory/3176-206-0x0000000007380000-0x0000000007390000-memory.dmp

        Filesize

        64KB

      • memory/3176-204-0x0000000007380000-0x0000000007390000-memory.dmp

        Filesize

        64KB

      • memory/3176-205-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-207-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-209-0x0000000007380000-0x0000000007390000-memory.dmp

        Filesize

        64KB

      • memory/3176-210-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-212-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-216-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-214-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-218-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-220-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-222-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-224-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3176-226-0x0000000004B70000-0x0000000004BAE000-memory.dmp

        Filesize

        248KB

      • memory/3492-189-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-162-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-198-0x0000000000400000-0x0000000002B05000-memory.dmp

        Filesize

        39.0MB

      • memory/3492-197-0x0000000007420000-0x0000000007430000-memory.dmp

        Filesize

        64KB

      • memory/3492-196-0x0000000007420000-0x0000000007430000-memory.dmp

        Filesize

        64KB

      • memory/3492-195-0x0000000007420000-0x0000000007430000-memory.dmp

        Filesize

        64KB

      • memory/3492-163-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-193-0x0000000000400000-0x0000000002B05000-memory.dmp

        Filesize

        39.0MB

      • memory/3492-192-0x0000000007420000-0x0000000007430000-memory.dmp

        Filesize

        64KB

      • memory/3492-169-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-191-0x0000000007420000-0x0000000007430000-memory.dmp

        Filesize

        64KB

      • memory/3492-190-0x0000000007420000-0x0000000007430000-memory.dmp

        Filesize

        64KB

      • memory/3492-167-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-165-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-177-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-183-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-181-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-179-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-185-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-175-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-173-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-171-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-187-0x0000000004B50000-0x0000000004B62000-memory.dmp

        Filesize

        72KB

      • memory/3492-161-0x0000000007430000-0x00000000079D4000-memory.dmp

        Filesize

        5.6MB

      • memory/3492-160-0x0000000002BE0000-0x0000000002C0D000-memory.dmp

        Filesize

        180KB

      • memory/4896-154-0x0000000000460000-0x000000000046A000-memory.dmp

        Filesize

        40KB