Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    57s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/03/2023, 09:21

General

  • Target

    8f838f9e6f5cb123a94b0487a0f9621391d5caa669e5f49a2057d69431e9e4d6.exe

  • Size

    545KB

  • MD5

    80493e9915c50d7e9641bcdd9afd654e

  • SHA1

    84c0290d343c046d795a429dabc781f96d5666f1

  • SHA256

    8f838f9e6f5cb123a94b0487a0f9621391d5caa669e5f49a2057d69431e9e4d6

  • SHA512

    8d693e7d3a8a86ce00f1e6dded1909c1341d49db7fad9e4cffc09bc649b5afb1b57063d65e530f363f5b27b41ae181f5d74a28572a7e4462ed90349cc42744ab

  • SSDEEP

    12288:uMrWy90hEfrUBtMkxIyqOM99zIStppMGqvnbmOCKQHX1dwRfI:Uy/gtMawXnRtppbgniOC/HX/wpI

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

lown

C2

193.233.20.31:4125

Attributes
  • auth_value

    4cf836e062bcdc2a4fdbf410f5747ec7

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f838f9e6f5cb123a94b0487a0f9621391d5caa669e5f49a2057d69431e9e4d6.exe
    "C:\Users\Admin\AppData\Local\Temp\8f838f9e6f5cb123a94b0487a0f9621391d5caa669e5f49a2057d69431e9e4d6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7481.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7481.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h11oR12.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h11oR12.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ipYva56.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ipYva56.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l06UU99.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l06UU99.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l06UU99.exe

    Filesize

    175KB

    MD5

    50809fe16d7c482c1f4a2ea19fdcbc0a

    SHA1

    11b6f69c06a724da15183b16039c5cbc86016158

    SHA256

    09917b67829de37b5d6be8115c8f8321f436554f426a24e079257a8368051cb1

    SHA512

    c35170e5eb6dabda9fd2d289153df829957ca8e9665178529a1ba36395155bb34f489372993ec694d10bea490c86cef2ae152e2df480288aca8e796ba135261f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l06UU99.exe

    Filesize

    175KB

    MD5

    50809fe16d7c482c1f4a2ea19fdcbc0a

    SHA1

    11b6f69c06a724da15183b16039c5cbc86016158

    SHA256

    09917b67829de37b5d6be8115c8f8321f436554f426a24e079257a8368051cb1

    SHA512

    c35170e5eb6dabda9fd2d289153df829957ca8e9665178529a1ba36395155bb34f489372993ec694d10bea490c86cef2ae152e2df480288aca8e796ba135261f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7481.exe

    Filesize

    403KB

    MD5

    d62c75b0382535532feb51650d969d98

    SHA1

    b723b62fe006d252e58fa9c01f449b024b32b1f9

    SHA256

    ff085ab7461739d2f461ede6bb39aef18984a2aadf24086eb67c194f5878346b

    SHA512

    dd0cc919132dcc132d9ede0f7bbae50813c74f61345cde39cbfdede44a1e44110eaa45c7e557854950bf63511dd4cb1e135f05d2ad6dd57e359871b139ee63a7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba7481.exe

    Filesize

    403KB

    MD5

    d62c75b0382535532feb51650d969d98

    SHA1

    b723b62fe006d252e58fa9c01f449b024b32b1f9

    SHA256

    ff085ab7461739d2f461ede6bb39aef18984a2aadf24086eb67c194f5878346b

    SHA512

    dd0cc919132dcc132d9ede0f7bbae50813c74f61345cde39cbfdede44a1e44110eaa45c7e557854950bf63511dd4cb1e135f05d2ad6dd57e359871b139ee63a7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h11oR12.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h11oR12.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ipYva56.exe

    Filesize

    351KB

    MD5

    e3911b33e69a43a06da81180a07ac1ec

    SHA1

    828fac94fd7d238d0e339e23a1a6efd59d1097f2

    SHA256

    110070afe631048e3ca71d76fc4a5efec6ffa57e8129ec7d928ec399ccbca5ef

    SHA512

    4e04376496d5099f636aaf992160c35a062efa36fab9193cfd5a17e4914f8cd52b54327afebccdf0b20cf135d6c3db589eee73e69a852701f4498f4e5558ae68

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ipYva56.exe

    Filesize

    351KB

    MD5

    e3911b33e69a43a06da81180a07ac1ec

    SHA1

    828fac94fd7d238d0e339e23a1a6efd59d1097f2

    SHA256

    110070afe631048e3ca71d76fc4a5efec6ffa57e8129ec7d928ec399ccbca5ef

    SHA512

    4e04376496d5099f636aaf992160c35a062efa36fab9193cfd5a17e4914f8cd52b54327afebccdf0b20cf135d6c3db589eee73e69a852701f4498f4e5558ae68

  • memory/3080-1077-0x0000000000770000-0x00000000007A2000-memory.dmp

    Filesize

    200KB

  • memory/3080-1078-0x00000000051B0000-0x00000000051FB000-memory.dmp

    Filesize

    300KB

  • memory/3080-1079-0x00000000052D0000-0x00000000052E0000-memory.dmp

    Filesize

    64KB

  • memory/4268-135-0x0000000000A80000-0x0000000000A8A000-memory.dmp

    Filesize

    40KB

  • memory/4668-177-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-197-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-144-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4668-145-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4668-146-0x0000000004EE0000-0x00000000053DE000-memory.dmp

    Filesize

    5.0MB

  • memory/4668-147-0x0000000002730000-0x0000000002774000-memory.dmp

    Filesize

    272KB

  • memory/4668-148-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-149-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-151-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-153-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-155-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-157-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-159-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-163-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-161-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-167-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-169-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-165-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-173-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-171-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-179-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-181-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-142-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/4668-175-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-183-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-189-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-191-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-143-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4668-201-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-203-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-199-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-207-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-209-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-211-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-205-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-195-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-193-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-187-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-185-0x0000000002730000-0x000000000276E000-memory.dmp

    Filesize

    248KB

  • memory/4668-1054-0x00000000059F0000-0x0000000005FF6000-memory.dmp

    Filesize

    6.0MB

  • memory/4668-1055-0x0000000004DA0000-0x0000000004EAA000-memory.dmp

    Filesize

    1.0MB

  • memory/4668-1056-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/4668-1057-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4668-1058-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/4668-1059-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/4668-1061-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4668-1062-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4668-1063-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4668-1064-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/4668-1065-0x00000000063F0000-0x0000000006482000-memory.dmp

    Filesize

    584KB

  • memory/4668-1066-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4668-141-0x0000000002690000-0x00000000026D6000-memory.dmp

    Filesize

    280KB

  • memory/4668-1067-0x00000000064B0000-0x0000000006672000-memory.dmp

    Filesize

    1.8MB

  • memory/4668-1068-0x0000000006680000-0x0000000006BAC000-memory.dmp

    Filesize

    5.2MB

  • memory/4668-1070-0x0000000006E20000-0x0000000006E96000-memory.dmp

    Filesize

    472KB

  • memory/4668-1071-0x0000000006EA0000-0x0000000006EF0000-memory.dmp

    Filesize

    320KB