Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    53s
  • max time network
    57s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/03/2023, 23:45

General

  • Target

    8529b92831f9a84ed47c88509a494eac945cb3a16ccf163908ff443bff9fa37e.exe

  • Size

    728KB

  • MD5

    636c8f792dc7e99aa3c1c3bf908a217c

  • SHA1

    8de6b5677390d07743854243a6597059b2ffe57f

  • SHA256

    8529b92831f9a84ed47c88509a494eac945cb3a16ccf163908ff443bff9fa37e

  • SHA512

    c24ed351b9b0109ca950606bb7b9a083d18785ccc0a2d0bef85872f7b5bdb2a3dcdd6a0c11fd37a7746bfa9d2fd522ccc9caf6abc18d60513122ae930fa00de9

  • SSDEEP

    12288:/M7HjeztCIzGcv+qAPARIv+kUdTPIdCdyTiAtba1JGDn4rRU2hdxs:/5ztCi27vRwTPJdyTdteG0LS

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

gena

C2

193.233.20.32:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8529b92831f9a84ed47c88509a494eac945cb3a16ccf163908ff443bff9fa37e.exe
    "C:\Users\Admin\AppData\Local\Temp\8529b92831f9a84ed47c88509a494eac945cb3a16ccf163908ff443bff9fa37e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTI3530.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTI3530.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr274675.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr274675.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku113040.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku113040.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr235837.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr235837.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr235837.exe

    Filesize

    175KB

    MD5

    f50023c2c4bad1bbf51efde95c575b28

    SHA1

    9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

    SHA256

    a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

    SHA512

    d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr235837.exe

    Filesize

    175KB

    MD5

    f50023c2c4bad1bbf51efde95c575b28

    SHA1

    9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

    SHA256

    a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

    SHA512

    d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTI3530.exe

    Filesize

    414KB

    MD5

    14781f1440a44bf65d4ce7d116fa4c68

    SHA1

    89a8a052e62a2a6c0dbef7dacbba4e21ba13b579

    SHA256

    e6b1723483d29272c84633ecb30fc537c7970818a2b5b09ba43e7fdbb1e84ad2

    SHA512

    b3cd073cb6530760d78f837fb697546dd9a573386cabe7df3487e1439da8d3ec21f4cd461393fe1bc1b04521be85fc5f53dbcfaadb7ed2af39eaf8a17a1f70bf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTI3530.exe

    Filesize

    414KB

    MD5

    14781f1440a44bf65d4ce7d116fa4c68

    SHA1

    89a8a052e62a2a6c0dbef7dacbba4e21ba13b579

    SHA256

    e6b1723483d29272c84633ecb30fc537c7970818a2b5b09ba43e7fdbb1e84ad2

    SHA512

    b3cd073cb6530760d78f837fb697546dd9a573386cabe7df3487e1439da8d3ec21f4cd461393fe1bc1b04521be85fc5f53dbcfaadb7ed2af39eaf8a17a1f70bf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr274675.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr274675.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku113040.exe

    Filesize

    387KB

    MD5

    c94d79a744d968ae1c80dab3d15947b4

    SHA1

    9153bbb7965551ecf7f4fafa88d97bfbd1080d0d

    SHA256

    782b835506a84eb51b9f20eedbbf0296cf50cd3656f4709ab9b151a94688e483

    SHA512

    0c546daae052bf4d3f5d973f64effd8bb8d0e04e726a2f838c31d01d2f8b6fa74b9d0aacf88a717bff3d78e0278e93d8c9dcd12d54eedb0838abd4215a4f49f6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku113040.exe

    Filesize

    387KB

    MD5

    c94d79a744d968ae1c80dab3d15947b4

    SHA1

    9153bbb7965551ecf7f4fafa88d97bfbd1080d0d

    SHA256

    782b835506a84eb51b9f20eedbbf0296cf50cd3656f4709ab9b151a94688e483

    SHA512

    0c546daae052bf4d3f5d973f64effd8bb8d0e04e726a2f838c31d01d2f8b6fa74b9d0aacf88a717bff3d78e0278e93d8c9dcd12d54eedb0838abd4215a4f49f6

  • memory/2672-139-0x0000000000E90000-0x0000000000E9A000-memory.dmp

    Filesize

    40KB

  • memory/4044-128-0x00000000068E0000-0x000000000696D000-memory.dmp

    Filesize

    564KB

  • memory/4044-140-0x0000000000400000-0x0000000002BE4000-memory.dmp

    Filesize

    39.9MB

  • memory/4100-184-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-196-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-148-0x00000000072B0000-0x00000000077AE000-memory.dmp

    Filesize

    5.0MB

  • memory/4100-149-0x00000000070F0000-0x0000000007134000-memory.dmp

    Filesize

    272KB

  • memory/4100-150-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4100-151-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4100-152-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4100-153-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-154-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-156-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-158-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-160-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-162-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-164-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-166-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-168-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-170-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-172-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-174-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-176-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-178-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-180-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-182-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-146-0x0000000002C60000-0x0000000002CAB000-memory.dmp

    Filesize

    300KB

  • memory/4100-186-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-188-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-190-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-192-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-194-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-147-0x0000000004BE0000-0x0000000004C26000-memory.dmp

    Filesize

    280KB

  • memory/4100-198-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-200-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-202-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-204-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-206-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-208-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-210-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-212-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-214-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4100-1060-0x0000000007DC0000-0x00000000083C6000-memory.dmp

    Filesize

    6.0MB

  • memory/4100-1061-0x00000000077B0000-0x00000000078BA000-memory.dmp

    Filesize

    1.0MB

  • memory/4100-1062-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/4100-1063-0x0000000007260000-0x000000000729E000-memory.dmp

    Filesize

    248KB

  • memory/4100-1064-0x00000000079D0000-0x0000000007A1B000-memory.dmp

    Filesize

    300KB

  • memory/4100-1065-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4100-1067-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4100-1068-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4100-1069-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4100-1070-0x0000000007B60000-0x0000000007BC6000-memory.dmp

    Filesize

    408KB

  • memory/4100-1071-0x0000000008850000-0x00000000088E2000-memory.dmp

    Filesize

    584KB

  • memory/4100-1073-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4100-1074-0x0000000008B50000-0x0000000008BC6000-memory.dmp

    Filesize

    472KB

  • memory/4100-1075-0x0000000008BE0000-0x0000000008C30000-memory.dmp

    Filesize

    320KB

  • memory/4100-1076-0x0000000008C50000-0x0000000008E12000-memory.dmp

    Filesize

    1.8MB

  • memory/4100-1077-0x0000000008E20000-0x000000000934C000-memory.dmp

    Filesize

    5.2MB

  • memory/4844-1083-0x00000000002F0000-0x0000000000322000-memory.dmp

    Filesize

    200KB

  • memory/4844-1084-0x0000000004D20000-0x0000000004D6B000-memory.dmp

    Filesize

    300KB

  • memory/4844-1085-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB