Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2023, 23:32

General

  • Target

    6e656513ae0ce82b8360827b5c526d0c4b60c0ff98edcf6eb58860f5fa40c8cf.exe

  • Size

    551KB

  • MD5

    aa6b2bbd2284969f7d18833af560b787

  • SHA1

    fc118507203b9186cd389ed038d709df9defd5b1

  • SHA256

    6e656513ae0ce82b8360827b5c526d0c4b60c0ff98edcf6eb58860f5fa40c8cf

  • SHA512

    2afef125241c1d281f4e5c9fc843f682d2aabf5a1dbeaaeebcf1e0aa26bad63897544f2ed9aac1ca0ea6d1ee397299bd75500a610a4e73bcbd8e066b29d9f749

  • SSDEEP

    12288:DMr0y90HfqjpXkL14CP4rcc5k64AawzozA:7ykw9CP4rxk6NVoE

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e656513ae0ce82b8360827b5c526d0c4b60c0ff98edcf6eb58860f5fa40c8cf.exe
    "C:\Users\Admin\AppData\Local\Temp\6e656513ae0ce82b8360827b5c526d0c4b60c0ff98edcf6eb58860f5fa40c8cf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0317.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0317.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3602.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3602.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1764
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6619.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6619.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4300
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 2016
          4⤵
          • Program crash
          PID:4644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726766.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726766.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4892
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4300 -ip 4300
    1⤵
      PID:4188
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:3592

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726766.exe

      Filesize

      175KB

      MD5

      41707338e1e2d868aa699ac0dd2e77b0

      SHA1

      36e0dfba09f9fb409faf0f9a99217d0d0c524b82

      SHA256

      8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

      SHA512

      80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726766.exe

      Filesize

      175KB

      MD5

      41707338e1e2d868aa699ac0dd2e77b0

      SHA1

      36e0dfba09f9fb409faf0f9a99217d0d0c524b82

      SHA256

      8d2a5ba6ae16aa5ee13382edb585c480b6bf2db098427ffe5f8d55323ded7557

      SHA512

      80c66cbf19f6b2cc2e979b1fd1769cf45957761fa3f94b33fc194f88379b57ec9327a86ce374c6dc25334b44e4e8aa518a5d0d03ddb4f4eddfdfe8ddfc9fb6f2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0317.exe

      Filesize

      409KB

      MD5

      b4b539d542d9d90ae0703c1cb7601452

      SHA1

      c23505e5ec74dcbfc43e0c18306b8e71863f75c4

      SHA256

      4574f43c20f5e2bb72ce33916eda0b276bcd2aa80a154e84407466f056861413

      SHA512

      70508ad3f7acfe1334d183d4105b4e2eb577632e17f02ace4850c226047d53253d28d657e8c46bab4ccf8572eff408a99df2b28d2804f067c2e54717e686216e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0317.exe

      Filesize

      409KB

      MD5

      b4b539d542d9d90ae0703c1cb7601452

      SHA1

      c23505e5ec74dcbfc43e0c18306b8e71863f75c4

      SHA256

      4574f43c20f5e2bb72ce33916eda0b276bcd2aa80a154e84407466f056861413

      SHA512

      70508ad3f7acfe1334d183d4105b4e2eb577632e17f02ace4850c226047d53253d28d657e8c46bab4ccf8572eff408a99df2b28d2804f067c2e54717e686216e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3602.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3602.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6619.exe

      Filesize

      497KB

      MD5

      67c0dede7d2befd9805b076a744a8a6b

      SHA1

      7dc77a21777f4e8e19c16611a80f0e76e7763ef7

      SHA256

      404ce8eaf3859f6034d23a258d334bb647dd248d6a8a6d26b4cc738152b92c40

      SHA512

      58fc574118d63fb2b6818802ee569ba6f3fc6009ce071ed455abc85bdc81079f8c72329776e689b99cc49dcea7dbad094ca6852870c48359f606374e08ee145b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6619.exe

      Filesize

      497KB

      MD5

      67c0dede7d2befd9805b076a744a8a6b

      SHA1

      7dc77a21777f4e8e19c16611a80f0e76e7763ef7

      SHA256

      404ce8eaf3859f6034d23a258d334bb647dd248d6a8a6d26b4cc738152b92c40

      SHA512

      58fc574118d63fb2b6818802ee569ba6f3fc6009ce071ed455abc85bdc81079f8c72329776e689b99cc49dcea7dbad094ca6852870c48359f606374e08ee145b

    • memory/1764-147-0x0000000000C20000-0x0000000000C2A000-memory.dmp

      Filesize

      40KB

    • memory/4300-153-0x0000000004DA0000-0x0000000005344000-memory.dmp

      Filesize

      5.6MB

    • memory/4300-154-0x00000000005D0000-0x000000000061B000-memory.dmp

      Filesize

      300KB

    • memory/4300-155-0x0000000004D90000-0x0000000004DA0000-memory.dmp

      Filesize

      64KB

    • memory/4300-156-0x0000000004D90000-0x0000000004DA0000-memory.dmp

      Filesize

      64KB

    • memory/4300-157-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-160-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-158-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-162-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-164-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-166-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-168-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-170-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-172-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-174-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-178-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-176-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-180-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-182-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-184-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-186-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-188-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-190-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-192-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-194-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-196-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-198-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-200-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-202-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-204-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-206-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-208-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-210-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-212-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-214-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-216-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-218-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-220-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/4300-1063-0x0000000005350000-0x0000000005968000-memory.dmp

      Filesize

      6.1MB

    • memory/4300-1064-0x0000000005970000-0x0000000005A7A000-memory.dmp

      Filesize

      1.0MB

    • memory/4300-1065-0x0000000004D30000-0x0000000004D42000-memory.dmp

      Filesize

      72KB

    • memory/4300-1066-0x0000000004D50000-0x0000000004D8C000-memory.dmp

      Filesize

      240KB

    • memory/4300-1067-0x0000000004D90000-0x0000000004DA0000-memory.dmp

      Filesize

      64KB

    • memory/4300-1069-0x0000000005D30000-0x0000000005DC2000-memory.dmp

      Filesize

      584KB

    • memory/4300-1070-0x0000000005DD0000-0x0000000005E36000-memory.dmp

      Filesize

      408KB

    • memory/4300-1071-0x0000000004D90000-0x0000000004DA0000-memory.dmp

      Filesize

      64KB

    • memory/4300-1072-0x0000000004D90000-0x0000000004DA0000-memory.dmp

      Filesize

      64KB

    • memory/4300-1073-0x0000000004D90000-0x0000000004DA0000-memory.dmp

      Filesize

      64KB

    • memory/4300-1074-0x0000000007990000-0x0000000007A06000-memory.dmp

      Filesize

      472KB

    • memory/4300-1075-0x00000000025D0000-0x0000000002620000-memory.dmp

      Filesize

      320KB

    • memory/4300-1076-0x0000000007A20000-0x0000000007BE2000-memory.dmp

      Filesize

      1.8MB

    • memory/4300-1077-0x0000000007C00000-0x000000000812C000-memory.dmp

      Filesize

      5.2MB

    • memory/4300-1078-0x0000000004D90000-0x0000000004DA0000-memory.dmp

      Filesize

      64KB

    • memory/4892-1084-0x0000000000BD0000-0x0000000000C02000-memory.dmp

      Filesize

      200KB

    • memory/4892-1085-0x00000000054E0000-0x00000000054F0000-memory.dmp

      Filesize

      64KB