Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/03/2023, 21:24

General

  • Target

    3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe

  • Size

    836KB

  • MD5

    8ea107ce3343cfc56b8d6f63bf959906

  • SHA1

    f6b802a350a5b994c4ebfd7bcf95896bf89c3c5d

  • SHA256

    3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882

  • SHA512

    ddc4363243c7998929b2be664c68a50fd1dd1e0f3507ef1735d4d834a6cc6535075e9b71e1bed7844834af7a18880cc744af19481a048047504ee3a3f2a940cd

  • SSDEEP

    12288:iMrBy90hjOKdkzAWgu5gZ2iUuGqw0LY8Jk8q5SaVimN35xKfUVc+RixhmX6qaj:byyjxOAu6ZlUFyk8SzLB33KfTMixQAj

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe
    "C:\Users\Admin\AppData\Local\Temp\3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4356.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4356.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio0965.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio0965.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4916
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8240.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8240.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1996
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu2539.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu2539.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rsc10s51.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rsc10s51.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2680
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183746.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183746.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183746.exe

    Filesize

    175KB

    MD5

    6fbff2d7c9ba7f0a71f02a5c70df9dfc

    SHA1

    003da0075734cd2d7f201c5b0e4779b8e1f33621

    SHA256

    cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

    SHA512

    25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183746.exe

    Filesize

    175KB

    MD5

    6fbff2d7c9ba7f0a71f02a5c70df9dfc

    SHA1

    003da0075734cd2d7f201c5b0e4779b8e1f33621

    SHA256

    cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

    SHA512

    25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4356.exe

    Filesize

    694KB

    MD5

    a9166b7f7616573753abef5b45afd56a

    SHA1

    60f1f9add81f77122a858f7792e5e6d89a3fc811

    SHA256

    7ed56b5684a1a715f9cc96e867601c777e12e4e9c1994b2caad4ae502f212956

    SHA512

    d32a5459644958aa5e5455c746e51faebb7529a64292936c4aafca2319c28bd87ac116243d59f8078580b9b79b00bc41a1e8d8aea40e5e1f099d8b8d80ab9b32

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4356.exe

    Filesize

    694KB

    MD5

    a9166b7f7616573753abef5b45afd56a

    SHA1

    60f1f9add81f77122a858f7792e5e6d89a3fc811

    SHA256

    7ed56b5684a1a715f9cc96e867601c777e12e4e9c1994b2caad4ae502f212956

    SHA512

    d32a5459644958aa5e5455c746e51faebb7529a64292936c4aafca2319c28bd87ac116243d59f8078580b9b79b00bc41a1e8d8aea40e5e1f099d8b8d80ab9b32

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rsc10s51.exe

    Filesize

    391KB

    MD5

    387f07e53552f919bbad91a0c347c994

    SHA1

    1d25fe369c5f11b6b6b98d6516361c3e3fc4b9ec

    SHA256

    b9858e182e5a1211dc918f3390123dd4b2d707787ba3c76a1dafbf7cad94d097

    SHA512

    91cbbe79cd36ebb07b996139378d8ffd6e12bcd0a9e77be22c67aaf74ab644c6bc1bf820f8b0a1674761e692f9ba7d76e69e4411f501046f43d6843edd123022

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rsc10s51.exe

    Filesize

    391KB

    MD5

    387f07e53552f919bbad91a0c347c994

    SHA1

    1d25fe369c5f11b6b6b98d6516361c3e3fc4b9ec

    SHA256

    b9858e182e5a1211dc918f3390123dd4b2d707787ba3c76a1dafbf7cad94d097

    SHA512

    91cbbe79cd36ebb07b996139378d8ffd6e12bcd0a9e77be22c67aaf74ab644c6bc1bf820f8b0a1674761e692f9ba7d76e69e4411f501046f43d6843edd123022

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio0965.exe

    Filesize

    344KB

    MD5

    ae55e48f03001f94dee145116e5d3c33

    SHA1

    81d3291ca9ea9d621e1ae2fc89ad33950fc25946

    SHA256

    19fc1ed716dc30053b52e00e6d32452b00df270924f23850bfdfb9a077969238

    SHA512

    89962b584f4b7ccc878327a85f223c40aeb89ae0a5bfd8a203482f84d357870dcbfe00b4abe463e8decdbd978f8329d42aef7fd093cf4cb70f4ade74da742125

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio0965.exe

    Filesize

    344KB

    MD5

    ae55e48f03001f94dee145116e5d3c33

    SHA1

    81d3291ca9ea9d621e1ae2fc89ad33950fc25946

    SHA256

    19fc1ed716dc30053b52e00e6d32452b00df270924f23850bfdfb9a077969238

    SHA512

    89962b584f4b7ccc878327a85f223c40aeb89ae0a5bfd8a203482f84d357870dcbfe00b4abe463e8decdbd978f8329d42aef7fd093cf4cb70f4ade74da742125

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8240.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8240.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu2539.exe

    Filesize

    334KB

    MD5

    f07b1480095d4b9abd084cc984364101

    SHA1

    88de38fdaf725930798beedd8cef8b43a13e2f0f

    SHA256

    64d5ba58e8087788b85f3c1ba76a1ebefe71c1064d40413a0052e2d7b5699437

    SHA512

    43600a5cc99285f0664031d5afeff40a045f4a472d4f6f366d1e6b2977a36a2b04e375bc25cf1e3919ad5df951931c4913660e835510dc740aea12c1ad388bb5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu2539.exe

    Filesize

    334KB

    MD5

    f07b1480095d4b9abd084cc984364101

    SHA1

    88de38fdaf725930798beedd8cef8b43a13e2f0f

    SHA256

    64d5ba58e8087788b85f3c1ba76a1ebefe71c1064d40413a0052e2d7b5699437

    SHA512

    43600a5cc99285f0664031d5afeff40a045f4a472d4f6f366d1e6b2977a36a2b04e375bc25cf1e3919ad5df951931c4913660e835510dc740aea12c1ad388bb5

  • memory/1812-146-0x00000000045E0000-0x00000000045FA000-memory.dmp

    Filesize

    104KB

  • memory/1812-147-0x0000000007050000-0x000000000754E000-memory.dmp

    Filesize

    5.0MB

  • memory/1812-148-0x0000000007550000-0x0000000007568000-memory.dmp

    Filesize

    96KB

  • memory/1812-149-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-150-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-152-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-154-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-156-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-158-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-160-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-162-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-164-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-166-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-168-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-170-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-172-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-174-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-176-0x0000000007550000-0x0000000007562000-memory.dmp

    Filesize

    72KB

  • memory/1812-177-0x0000000002BE0000-0x0000000002C0D000-memory.dmp

    Filesize

    180KB

  • memory/1812-178-0x0000000007040000-0x0000000007050000-memory.dmp

    Filesize

    64KB

  • memory/1812-179-0x0000000007040000-0x0000000007050000-memory.dmp

    Filesize

    64KB

  • memory/1812-180-0x0000000007040000-0x0000000007050000-memory.dmp

    Filesize

    64KB

  • memory/1812-181-0x0000000000400000-0x0000000002B03000-memory.dmp

    Filesize

    39.0MB

  • memory/1812-182-0x0000000007040000-0x0000000007050000-memory.dmp

    Filesize

    64KB

  • memory/1812-183-0x0000000007040000-0x0000000007050000-memory.dmp

    Filesize

    64KB

  • memory/1812-185-0x0000000000400000-0x0000000002B03000-memory.dmp

    Filesize

    39.0MB

  • memory/1996-140-0x0000000000770000-0x000000000077A000-memory.dmp

    Filesize

    40KB

  • memory/2680-190-0x0000000004890000-0x00000000048D6000-memory.dmp

    Filesize

    280KB

  • memory/2680-191-0x00000000075C0000-0x0000000007604000-memory.dmp

    Filesize

    272KB

  • memory/2680-192-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-193-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-195-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-197-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-199-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-202-0x0000000002C10000-0x0000000002C5B000-memory.dmp

    Filesize

    300KB

  • memory/2680-204-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/2680-201-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-206-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/2680-208-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-205-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-210-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-212-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-214-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-216-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-218-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-220-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-222-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-224-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-226-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-228-0x00000000075C0000-0x00000000075FE000-memory.dmp

    Filesize

    248KB

  • memory/2680-1101-0x0000000007770000-0x0000000007D76000-memory.dmp

    Filesize

    6.0MB

  • memory/2680-1102-0x0000000007E00000-0x0000000007F0A000-memory.dmp

    Filesize

    1.0MB

  • memory/2680-1103-0x0000000007F40000-0x0000000007F52000-memory.dmp

    Filesize

    72KB

  • memory/2680-1104-0x0000000007F60000-0x0000000007F9E000-memory.dmp

    Filesize

    248KB

  • memory/2680-1105-0x00000000080B0000-0x00000000080FB000-memory.dmp

    Filesize

    300KB

  • memory/2680-1106-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/2680-1108-0x0000000008240000-0x00000000082A6000-memory.dmp

    Filesize

    408KB

  • memory/2680-1109-0x0000000008930000-0x00000000089C2000-memory.dmp

    Filesize

    584KB

  • memory/2680-1110-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/2680-1111-0x0000000008C30000-0x0000000008DF2000-memory.dmp

    Filesize

    1.8MB

  • memory/2680-1112-0x0000000008E10000-0x000000000933C000-memory.dmp

    Filesize

    5.2MB

  • memory/2680-1113-0x0000000009460000-0x00000000094D6000-memory.dmp

    Filesize

    472KB

  • memory/2680-1114-0x00000000094F0000-0x0000000009540000-memory.dmp

    Filesize

    320KB

  • memory/2680-1117-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/4316-1121-0x00000000001B0000-0x00000000001E2000-memory.dmp

    Filesize

    200KB

  • memory/4316-1122-0x0000000004BF0000-0x0000000004C3B000-memory.dmp

    Filesize

    300KB

  • memory/4316-1123-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB