Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2023, 23:13

General

  • Target

    9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe

  • Size

    819KB

  • MD5

    0113de7cd2aad99355e8ce5e471b0a3e

  • SHA1

    a32b726e4fd135fc7b073ef91ec73544cf4d8cc6

  • SHA256

    9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c

  • SHA512

    233631c61025ae126bd9e324047d1f47a8d8be4503b66f978a706f1c466265b676b1736ca07f3abef99b0a14c2c0627b277be8fb6005d0d1d73648d2540392ce

  • SSDEEP

    24576:DyDwHXBqGlhiKdvWGh1dsSw8U8OkzVMl:WDwBqGfbk+e

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

ruka

C2

193.233.20.28:4125

Attributes
  • auth_value

    5d1d0e51ebe1e3f16cca573ff651c43c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe
    "C:\Users\Admin\AppData\Local\Temp\9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3939.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3939.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7399.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7399.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2080
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3951Ru.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3951Ru.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1624
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h96uR51.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h96uR51.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4196
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 1084
            5⤵
            • Program crash
            PID:4936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\icCRk01.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\icCRk01.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4364
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 1360
          4⤵
          • Program crash
          PID:2740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34GR61.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34GR61.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2032
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4196 -ip 4196
    1⤵
      PID:4508
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4364 -ip 4364
      1⤵
        PID:3692

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34GR61.exe

        Filesize

        175KB

        MD5

        6c4c2a56d5dd785adbe4fe60fa3cc1f2

        SHA1

        f8bd4379310258f8e54c47b56f5eec7394adb9a2

        SHA256

        b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2

        SHA512

        f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34GR61.exe

        Filesize

        175KB

        MD5

        6c4c2a56d5dd785adbe4fe60fa3cc1f2

        SHA1

        f8bd4379310258f8e54c47b56f5eec7394adb9a2

        SHA256

        b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2

        SHA512

        f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3939.exe

        Filesize

        676KB

        MD5

        373d2a9db2260341092b7353929241b8

        SHA1

        7dbddc030191a201d0d485097ca0ff06adec95ef

        SHA256

        736d95880aa6061051f065c3506b981965cdeca5676b257f21e6a5439258fa93

        SHA512

        03d5b64c4bf6c3efecc9a8ccf0f87fd14518e38f3d671fdc097aeda702ccd29b642185229e1139c9ad12998749f58131b45b7ca54419cc72a0476a4206a69116

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3939.exe

        Filesize

        676KB

        MD5

        373d2a9db2260341092b7353929241b8

        SHA1

        7dbddc030191a201d0d485097ca0ff06adec95ef

        SHA256

        736d95880aa6061051f065c3506b981965cdeca5676b257f21e6a5439258fa93

        SHA512

        03d5b64c4bf6c3efecc9a8ccf0f87fd14518e38f3d671fdc097aeda702ccd29b642185229e1139c9ad12998749f58131b45b7ca54419cc72a0476a4206a69116

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\icCRk01.exe

        Filesize

        349KB

        MD5

        2d172a3f3badca5e59590286d264448c

        SHA1

        f44bcc7c2c6bf2ee0beb89a1acaa4ea4b553a2d3

        SHA256

        931ef79bca7bb3b58aa049624a26afa501ceeab1d59f199785cccda86656d510

        SHA512

        3410854582b9281fdf482aab55f762fb571035bb74deea699f6a595eb0b2b9422b97f19b6bda9b46cab71c29869b7701325e2d97d0fb45f404fae84eb0aceed3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\icCRk01.exe

        Filesize

        349KB

        MD5

        2d172a3f3badca5e59590286d264448c

        SHA1

        f44bcc7c2c6bf2ee0beb89a1acaa4ea4b553a2d3

        SHA256

        931ef79bca7bb3b58aa049624a26afa501ceeab1d59f199785cccda86656d510

        SHA512

        3410854582b9281fdf482aab55f762fb571035bb74deea699f6a595eb0b2b9422b97f19b6bda9b46cab71c29869b7701325e2d97d0fb45f404fae84eb0aceed3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7399.exe

        Filesize

        334KB

        MD5

        a1745cd5b49c5ca6b5b7f64f3adca526

        SHA1

        2f093fda0006d9f930f6fa99380af929238c6dd1

        SHA256

        199c693d9ad59d5f9c1cccd1e10b3595f6cb10c36eb5df11a0225a6c10470569

        SHA512

        8267ce01db9b310bc673c84dd29dd8a8316ab362d28be6c2bc74be9e6dc81b52f3ecb10a3353671c8c8433bb2b4b167ccfade1feed06b3ad8a3991e84bfc44f3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7399.exe

        Filesize

        334KB

        MD5

        a1745cd5b49c5ca6b5b7f64f3adca526

        SHA1

        2f093fda0006d9f930f6fa99380af929238c6dd1

        SHA256

        199c693d9ad59d5f9c1cccd1e10b3595f6cb10c36eb5df11a0225a6c10470569

        SHA512

        8267ce01db9b310bc673c84dd29dd8a8316ab362d28be6c2bc74be9e6dc81b52f3ecb10a3353671c8c8433bb2b4b167ccfade1feed06b3ad8a3991e84bfc44f3

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3951Ru.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3951Ru.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h96uR51.exe

        Filesize

        290KB

        MD5

        8ed2502d862db8aabae946fc1c99a996

        SHA1

        b28eda7b6537c81116d4e5fe1f6dbb4e39c558bf

        SHA256

        1ecf6213e70210e08019632939cabae1569a160dab78656140fc938d31dbfe1a

        SHA512

        b31a8e4c0297d77e9dc0a68bda4f79642e7fa6c11eff91499991f47b058d051c937b31cdb69f5662a9bd05f808496d06589c9cc441161d43ec642e4739636ab5

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h96uR51.exe

        Filesize

        290KB

        MD5

        8ed2502d862db8aabae946fc1c99a996

        SHA1

        b28eda7b6537c81116d4e5fe1f6dbb4e39c558bf

        SHA256

        1ecf6213e70210e08019632939cabae1569a160dab78656140fc938d31dbfe1a

        SHA512

        b31a8e4c0297d77e9dc0a68bda4f79642e7fa6c11eff91499991f47b058d051c937b31cdb69f5662a9bd05f808496d06589c9cc441161d43ec642e4739636ab5

      • memory/1624-154-0x0000000000260000-0x000000000026A000-memory.dmp

        Filesize

        40KB

      • memory/2032-1135-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/2032-1136-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/2032-1134-0x00000000001F0000-0x0000000000222000-memory.dmp

        Filesize

        200KB

      • memory/4196-168-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-186-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-164-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-166-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-163-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4196-170-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-172-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-174-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-178-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-176-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-180-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-182-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-184-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-165-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4196-188-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-190-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-192-0x0000000004DA0000-0x0000000004DB2000-memory.dmp

        Filesize

        72KB

      • memory/4196-193-0x0000000000400000-0x0000000000830000-memory.dmp

        Filesize

        4.2MB

      • memory/4196-194-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4196-195-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4196-196-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4196-198-0x0000000000400000-0x0000000000830000-memory.dmp

        Filesize

        4.2MB

      • memory/4196-162-0x0000000004E40000-0x0000000004E50000-memory.dmp

        Filesize

        64KB

      • memory/4196-161-0x00000000009B0000-0x00000000009DD000-memory.dmp

        Filesize

        180KB

      • memory/4196-160-0x0000000004E50000-0x00000000053F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4364-203-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-210-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-212-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-214-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-216-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-218-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-220-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-223-0x0000000000990000-0x00000000009DB000-memory.dmp

        Filesize

        300KB

      • memory/4364-222-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-225-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-226-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4364-229-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4364-228-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-230-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4364-232-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-234-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-236-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-238-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-240-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-1113-0x0000000005550000-0x0000000005B68000-memory.dmp

        Filesize

        6.1MB

      • memory/4364-1114-0x0000000005B70000-0x0000000005C7A000-memory.dmp

        Filesize

        1.0MB

      • memory/4364-1115-0x0000000004F30000-0x0000000004F42000-memory.dmp

        Filesize

        72KB

      • memory/4364-1116-0x0000000004F50000-0x0000000004F8C000-memory.dmp

        Filesize

        240KB

      • memory/4364-1117-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4364-1118-0x0000000005F30000-0x0000000005FC2000-memory.dmp

        Filesize

        584KB

      • memory/4364-1119-0x0000000005FD0000-0x0000000006036000-memory.dmp

        Filesize

        408KB

      • memory/4364-1120-0x00000000067D0000-0x0000000006846000-memory.dmp

        Filesize

        472KB

      • memory/4364-1121-0x0000000006860000-0x00000000068B0000-memory.dmp

        Filesize

        320KB

      • memory/4364-1123-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4364-1124-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4364-1125-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4364-1126-0x00000000068D0000-0x0000000006A92000-memory.dmp

        Filesize

        1.8MB

      • memory/4364-208-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-206-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-204-0x0000000002940000-0x000000000297E000-memory.dmp

        Filesize

        248KB

      • memory/4364-1127-0x0000000006AB0000-0x0000000006FDC000-memory.dmp

        Filesize

        5.2MB

      • memory/4364-1128-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB