Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    53s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/03/2023, 01:04

General

  • Target

    fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe

  • Size

    779KB

  • MD5

    896961f0853f5a1d777492e9ba4f5ebb

  • SHA1

    45592c0f5dbcef8daa464b6379d0f86357dc3415

  • SHA256

    fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9

  • SHA512

    92b96a8459031c695a5730efb0848f01b7f190c63b34fe195dbf6ae0468a943f3c91b03b4b394b62af7c1f00ac745d14c14fc14113b3c2f610fc7e136f5312d0

  • SSDEEP

    12288:+Mrfy903IcFPAsMsLPv4tRd+2xuhDe+k/94FSbZD9gzKXn4d5pccrgz4YeE7fp8:hyQHItRd+2xuhCV+SJCO+5V89fp8

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe
    "C:\Users\Admin\AppData\Local\Temp\fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2317.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2317.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5420.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5420.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1084.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1084.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2592
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8663.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8663.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rSK92s86.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rSK92s86.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si059522.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si059522.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1256

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si059522.exe

    Filesize

    175KB

    MD5

    6fbff2d7c9ba7f0a71f02a5c70df9dfc

    SHA1

    003da0075734cd2d7f201c5b0e4779b8e1f33621

    SHA256

    cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

    SHA512

    25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si059522.exe

    Filesize

    175KB

    MD5

    6fbff2d7c9ba7f0a71f02a5c70df9dfc

    SHA1

    003da0075734cd2d7f201c5b0e4779b8e1f33621

    SHA256

    cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3

    SHA512

    25842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2317.exe

    Filesize

    636KB

    MD5

    bf80dc55a51abcf8d88fb23f7038b732

    SHA1

    35f238f371940cd05d75e7ff132726eea1fd0f4c

    SHA256

    78cf7e45af9b3be834b2867462d6d60b21567c976eaf8fa0cb4e6795e7ec1611

    SHA512

    fc620e43a7b463426087a8f0da8efae120e3adf919cbf53fecd9ab7ecaea6f08be86eb364baba9a6f90815c87681b9516b3f3c72d69cfe06a9f02b55a5c91aa8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2317.exe

    Filesize

    636KB

    MD5

    bf80dc55a51abcf8d88fb23f7038b732

    SHA1

    35f238f371940cd05d75e7ff132726eea1fd0f4c

    SHA256

    78cf7e45af9b3be834b2867462d6d60b21567c976eaf8fa0cb4e6795e7ec1611

    SHA512

    fc620e43a7b463426087a8f0da8efae120e3adf919cbf53fecd9ab7ecaea6f08be86eb364baba9a6f90815c87681b9516b3f3c72d69cfe06a9f02b55a5c91aa8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rSK92s86.exe

    Filesize

    290KB

    MD5

    8b013cbe0ee1ae9cba6d32f878472a56

    SHA1

    adf44317e61a18070b70daadb70b200e8bcb4ad7

    SHA256

    3ee7755f8d43deca6902ef204a634976f60cb9ba917b95f5ea56a2d043143864

    SHA512

    7edc7cdb8502a8d53b30b29fecf9a7810bc936d6c84295d40dfa4485a1ef4d99ab549c9b4bec008a70d92a9a4c08a8447ad105423c9a9f514cf3fac1d19ed40b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rSK92s86.exe

    Filesize

    290KB

    MD5

    8b013cbe0ee1ae9cba6d32f878472a56

    SHA1

    adf44317e61a18070b70daadb70b200e8bcb4ad7

    SHA256

    3ee7755f8d43deca6902ef204a634976f60cb9ba917b95f5ea56a2d043143864

    SHA512

    7edc7cdb8502a8d53b30b29fecf9a7810bc936d6c84295d40dfa4485a1ef4d99ab549c9b4bec008a70d92a9a4c08a8447ad105423c9a9f514cf3fac1d19ed40b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5420.exe

    Filesize

    315KB

    MD5

    c7498d0a771f14094051bb80e6c5e238

    SHA1

    2c1a408027b7249ec6bb4bfef4533fddc4e373dd

    SHA256

    354859b64f4ef25a6ea1bbfeed442b81e423683a20401b871693f829739c950b

    SHA512

    1e977005dd90f6b4d0e206dcac5f40f404dcbd28d9bf8d7cb05427d7b217a954156b718888afe8f5565381e56c621320cdd8ec79337b314e6ad5f5fc1f2468a5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5420.exe

    Filesize

    315KB

    MD5

    c7498d0a771f14094051bb80e6c5e238

    SHA1

    2c1a408027b7249ec6bb4bfef4533fddc4e373dd

    SHA256

    354859b64f4ef25a6ea1bbfeed442b81e423683a20401b871693f829739c950b

    SHA512

    1e977005dd90f6b4d0e206dcac5f40f404dcbd28d9bf8d7cb05427d7b217a954156b718888afe8f5565381e56c621320cdd8ec79337b314e6ad5f5fc1f2468a5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1084.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1084.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8663.exe

    Filesize

    232KB

    MD5

    c20bc0f8dec7043aa379fd11bdf8d314

    SHA1

    1df8d4bb9086b1f39fdc9767648fee9747ca8805

    SHA256

    49d90a571bccfde5e3451e576c9c3b2e71465121e3220f56f9dc236c0c1a0adb

    SHA512

    6e306a65776d001571cd42c88d3536114870a0b8ecd43660a0872737e15d6b543dcbe13d9115e3bb632f4995cd908a106492d857e850a2fde1b42331a941f83b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8663.exe

    Filesize

    232KB

    MD5

    c20bc0f8dec7043aa379fd11bdf8d314

    SHA1

    1df8d4bb9086b1f39fdc9767648fee9747ca8805

    SHA256

    49d90a571bccfde5e3451e576c9c3b2e71465121e3220f56f9dc236c0c1a0adb

    SHA512

    6e306a65776d001571cd42c88d3536114870a0b8ecd43660a0872737e15d6b543dcbe13d9115e3bb632f4995cd908a106492d857e850a2fde1b42331a941f83b

  • memory/1256-1129-0x00000000058B0000-0x00000000058C0000-memory.dmp

    Filesize

    64KB

  • memory/1256-1127-0x0000000000CC0000-0x0000000000CF2000-memory.dmp

    Filesize

    200KB

  • memory/1256-1128-0x0000000005700000-0x000000000574B000-memory.dmp

    Filesize

    300KB

  • memory/1428-304-0x00000000006F0000-0x0000000000700000-memory.dmp

    Filesize

    64KB

  • memory/1428-1107-0x00000000051A0000-0x00000000051B2000-memory.dmp

    Filesize

    72KB

  • memory/1428-1121-0x00000000006F0000-0x0000000000700000-memory.dmp

    Filesize

    64KB

  • memory/1428-1120-0x0000000006C10000-0x0000000006C60000-memory.dmp

    Filesize

    320KB

  • memory/1428-1119-0x0000000006B80000-0x0000000006BF6000-memory.dmp

    Filesize

    472KB

  • memory/1428-1118-0x0000000006420000-0x000000000694C000-memory.dmp

    Filesize

    5.2MB

  • memory/1428-1117-0x0000000006250000-0x0000000006412000-memory.dmp

    Filesize

    1.8MB

  • memory/1428-1116-0x0000000005540000-0x00000000055A6000-memory.dmp

    Filesize

    408KB

  • memory/1428-1115-0x00000000054A0000-0x0000000005532000-memory.dmp

    Filesize

    584KB

  • memory/1428-1114-0x00000000006F0000-0x0000000000700000-memory.dmp

    Filesize

    64KB

  • memory/1428-1113-0x00000000006F0000-0x0000000000700000-memory.dmp

    Filesize

    64KB

  • memory/1428-1112-0x00000000006F0000-0x0000000000700000-memory.dmp

    Filesize

    64KB

  • memory/1428-1110-0x00000000006F0000-0x0000000000700000-memory.dmp

    Filesize

    64KB

  • memory/1428-1109-0x0000000005310000-0x000000000535B000-memory.dmp

    Filesize

    300KB

  • memory/1428-1108-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1428-1106-0x0000000005060000-0x000000000516A000-memory.dmp

    Filesize

    1.0MB

  • memory/1428-1105-0x0000000005600000-0x0000000005C06000-memory.dmp

    Filesize

    6.0MB

  • memory/1428-306-0x00000000006F0000-0x0000000000700000-memory.dmp

    Filesize

    64KB

  • memory/1428-302-0x00000000006F0000-0x0000000000700000-memory.dmp

    Filesize

    64KB

  • memory/1428-300-0x00000000005A0000-0x00000000005EB000-memory.dmp

    Filesize

    300KB

  • memory/1428-228-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-226-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-224-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-193-0x0000000002350000-0x0000000002396000-memory.dmp

    Filesize

    280KB

  • memory/1428-194-0x00000000023F0000-0x0000000002434000-memory.dmp

    Filesize

    272KB

  • memory/1428-195-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-196-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-198-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-200-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-202-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-204-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-206-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-208-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-210-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-212-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-214-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-216-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-218-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-220-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/1428-222-0x00000000023F0000-0x000000000242E000-memory.dmp

    Filesize

    248KB

  • memory/2592-142-0x0000000000640000-0x000000000064A000-memory.dmp

    Filesize

    40KB

  • memory/3172-172-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-149-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/3172-186-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/3172-185-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/3172-152-0x0000000004F00000-0x0000000004F18000-memory.dmp

    Filesize

    96KB

  • memory/3172-184-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/3172-183-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/3172-182-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-155-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-180-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-178-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-170-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-188-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/3172-174-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-176-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-168-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-166-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-164-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-162-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-160-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-158-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-156-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3172-151-0x0000000004A00000-0x0000000004EFE000-memory.dmp

    Filesize

    5.0MB

  • memory/3172-150-0x00000000021C0000-0x00000000021DA000-memory.dmp

    Filesize

    104KB

  • memory/3172-153-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB

  • memory/3172-148-0x0000000000590000-0x00000000005BD000-memory.dmp

    Filesize

    180KB

  • memory/3172-154-0x00000000049F0000-0x0000000004A00000-memory.dmp

    Filesize

    64KB