Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    76s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2023, 18:01 UTC

General

  • Target

    3572c9b19e8c36dd9d0307b08511c0b1.exe

  • Size

    538KB

  • MD5

    3572c9b19e8c36dd9d0307b08511c0b1

  • SHA1

    af40874ddfe51ca33ad35ee32a84908ede90dcf1

  • SHA256

    e27f343d59451541202e9e87a12b98b7a6d8ff1f2031a014198b6312e6e8c5ac

  • SHA512

    5777bf077cb0a01e955627e1be8ba5c077d955b121002bcc16fde13a9a1a63d12f8d420a6a033879ad8a507833560d366d748bf95956f00d27fc2c176dbc5fce

  • SSDEEP

    12288:BMrsy90vu8UorljsOp35Dd/D4pHK+AwYt1M9wdiJyO09RWMUFK:FyChl11r/Drdnt1QwdJTUo

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

sint

C2

193.233.20.31:4125

Attributes
  • auth_value

    9d9b763b4dcfbff1c06ef4743cc0399e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3572c9b19e8c36dd9d0307b08511c0b1.exe
    "C:\Users\Admin\AppData\Local\Temp\3572c9b19e8c36dd9d0307b08511c0b1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba0550.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba0550.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:788
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h13Dw68.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h13Dw68.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2732
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iYIoK56.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iYIoK56.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 1536
          4⤵
          • Program crash
          PID:2860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l90Kg54.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l90Kg54.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1620
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 940 -ip 940
    1⤵
      PID:840

    Network

    • flag-us
      DNS
      240.232.18.117.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      240.232.18.117.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      228.249.119.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      228.249.119.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      28.143.109.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      28.143.109.104.in-addr.arpa
      IN PTR
      Response
      28.143.109.104.in-addr.arpa
      IN PTR
      a104-109-143-28deploystaticakamaitechnologiescom
    • flag-us
      DNS
      58.104.205.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      58.104.205.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      161.252.72.23.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      161.252.72.23.in-addr.arpa
      IN PTR
      Response
      161.252.72.23.in-addr.arpa
      IN PTR
      a23-72-252-161deploystaticakamaitechnologiescom
    • flag-us
      DNS
      123.108.74.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      123.108.74.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      31.20.233.193.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      31.20.233.193.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      76.38.195.152.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      76.38.195.152.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      160.252.72.23.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      160.252.72.23.in-addr.arpa
      IN PTR
      Response
      160.252.72.23.in-addr.arpa
      IN PTR
      a23-72-252-160deploystaticakamaitechnologiescom
    • flag-us
      DNS
      44.8.109.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      44.8.109.52.in-addr.arpa
      IN PTR
      Response
    • 93.184.220.29:80
      260 B
      5
    • 193.233.20.31:4125
      iYIoK56.exe
      385.2kB
      11.1kB
      307
      124
    • 193.233.20.31:4125
      l90Kg54.exe
      369.3kB
      11.7kB
      295
      140
    • 8.247.210.254:80
      322 B
      7
    • 173.223.113.164:443
      322 B
      7
    • 8.8.8.8:53
      240.232.18.117.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      240.232.18.117.in-addr.arpa

    • 8.8.8.8:53
      228.249.119.40.in-addr.arpa
      dns
      73 B
      159 B
      1
      1

      DNS Request

      228.249.119.40.in-addr.arpa

    • 8.8.8.8:53
      28.143.109.104.in-addr.arpa
      dns
      73 B
      139 B
      1
      1

      DNS Request

      28.143.109.104.in-addr.arpa

    • 8.8.8.8:53
      58.104.205.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      58.104.205.20.in-addr.arpa

    • 8.8.8.8:53
      161.252.72.23.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      161.252.72.23.in-addr.arpa

    • 8.8.8.8:53
      123.108.74.40.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      123.108.74.40.in-addr.arpa

    • 8.8.8.8:53
      31.20.233.193.in-addr.arpa
      dns
      72 B
      127 B
      1
      1

      DNS Request

      31.20.233.193.in-addr.arpa

    • 8.8.8.8:53
      76.38.195.152.in-addr.arpa
      dns
      72 B
      143 B
      1
      1

      DNS Request

      76.38.195.152.in-addr.arpa

    • 8.8.8.8:53
      160.252.72.23.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      160.252.72.23.in-addr.arpa

    • 8.8.8.8:53
      44.8.109.52.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      44.8.109.52.in-addr.arpa

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l90Kg54.exe

      Filesize

      175KB

      MD5

      87d8308e8cda648f980eaded98c6dd64

      SHA1

      8e1213fea55c704c3d133c4b8675b99a66c08fc1

      SHA256

      dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246

      SHA512

      04add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l90Kg54.exe

      Filesize

      175KB

      MD5

      87d8308e8cda648f980eaded98c6dd64

      SHA1

      8e1213fea55c704c3d133c4b8675b99a66c08fc1

      SHA256

      dfb2378d9e691c98c02a4ebd3196a313185549e72cd0d770972ea47888889246

      SHA512

      04add36bd3e21f02b1fa836caddfbc0a0adfa480f18a369a5974bf98e093f17f36ab68251d5acdda4d8a94458451953b1fcf6ab7706b5e7125fc852c5dc71200

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba0550.exe

      Filesize

      396KB

      MD5

      909068e613de7596881a4665f931dada

      SHA1

      746f75b2f32a24f2089b83c2595fde6f6c6050c8

      SHA256

      59640cf9968c81779a6aa14c085e5129a5b33210f555d7040de3d14b606bd9ff

      SHA512

      7039be723d6066efbbbb572a740e4d40754a09b2d478b7f69c6024912619934bb1e7c08677890698914c3a0a42ad70c3c2a690d81b488b52a6d49463ed2880f7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba0550.exe

      Filesize

      396KB

      MD5

      909068e613de7596881a4665f931dada

      SHA1

      746f75b2f32a24f2089b83c2595fde6f6c6050c8

      SHA256

      59640cf9968c81779a6aa14c085e5129a5b33210f555d7040de3d14b606bd9ff

      SHA512

      7039be723d6066efbbbb572a740e4d40754a09b2d478b7f69c6024912619934bb1e7c08677890698914c3a0a42ad70c3c2a690d81b488b52a6d49463ed2880f7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h13Dw68.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h13Dw68.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iYIoK56.exe

      Filesize

      469KB

      MD5

      9c650f00776c29170a9fa99b1b48ee82

      SHA1

      01342a684ea86f28df2d20000ab69cffdca69dd8

      SHA256

      a0f12b7ea69a1d353d158172a195898d8bc5b86023ea4997af0dc05da79178f2

      SHA512

      0c223f54059a344eadd6a72aedadcc29874e7d6f2e8432bd14a9adc68520866fbb2eed25fcf880f2e5906b272ee032c5ca8afe7cf3dda0546371e9e4d5f988c0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iYIoK56.exe

      Filesize

      469KB

      MD5

      9c650f00776c29170a9fa99b1b48ee82

      SHA1

      01342a684ea86f28df2d20000ab69cffdca69dd8

      SHA256

      a0f12b7ea69a1d353d158172a195898d8bc5b86023ea4997af0dc05da79178f2

      SHA512

      0c223f54059a344eadd6a72aedadcc29874e7d6f2e8432bd14a9adc68520866fbb2eed25fcf880f2e5906b272ee032c5ca8afe7cf3dda0546371e9e4d5f988c0

    • memory/940-153-0x0000000000500000-0x000000000054B000-memory.dmp

      Filesize

      300KB

    • memory/940-154-0x0000000004D20000-0x00000000052C4000-memory.dmp

      Filesize

      5.6MB

    • memory/940-155-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-156-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-158-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-160-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-162-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-164-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-166-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-168-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-170-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-172-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-177-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-174-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-176-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-175-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-179-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-181-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-183-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-185-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-187-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-189-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-191-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-193-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-195-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-197-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-199-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-201-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-203-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-205-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-207-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-209-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-211-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-213-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-215-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-219-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-221-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-217-0x0000000004C20000-0x0000000004C5E000-memory.dmp

      Filesize

      248KB

    • memory/940-1064-0x00000000052D0000-0x00000000058E8000-memory.dmp

      Filesize

      6.1MB

    • memory/940-1065-0x00000000058F0000-0x00000000059FA000-memory.dmp

      Filesize

      1.0MB

    • memory/940-1066-0x0000000005A20000-0x0000000005A32000-memory.dmp

      Filesize

      72KB

    • memory/940-1067-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-1068-0x0000000005A40000-0x0000000005A7C000-memory.dmp

      Filesize

      240KB

    • memory/940-1070-0x0000000005D30000-0x0000000005D96000-memory.dmp

      Filesize

      408KB

    • memory/940-1071-0x00000000063F0000-0x0000000006482000-memory.dmp

      Filesize

      584KB

    • memory/940-1072-0x00000000064F0000-0x00000000066B2000-memory.dmp

      Filesize

      1.8MB

    • memory/940-1073-0x00000000066C0000-0x0000000006BEC000-memory.dmp

      Filesize

      5.2MB

    • memory/940-1074-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-1075-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-1076-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-1077-0x0000000007180000-0x00000000071F6000-memory.dmp

      Filesize

      472KB

    • memory/940-1078-0x0000000007200000-0x0000000007250000-memory.dmp

      Filesize

      320KB

    • memory/940-1079-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/1620-1085-0x0000000000130000-0x0000000000162000-memory.dmp

      Filesize

      200KB

    • memory/1620-1086-0x0000000004A00000-0x0000000004A10000-memory.dmp

      Filesize

      64KB

    • memory/2732-147-0x0000000000670000-0x000000000067A000-memory.dmp

      Filesize

      40KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.