Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    54s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/03/2023, 12:59

General

  • Target

    68f759efe40a5bbc069942cb5d22c4296941b7760d438723cbd6b9cfc4d19b90.exe

  • Size

    540KB

  • MD5

    40ce9a82daa89bdeab467a10a281c383

  • SHA1

    e8da910bde364b36f589126d0828e7aafcab781c

  • SHA256

    68f759efe40a5bbc069942cb5d22c4296941b7760d438723cbd6b9cfc4d19b90

  • SHA512

    8ee3a7658b6f9bfd7e837c50a4a91ebfa0eab13e820db74e77962541431744515e11031b6c91683cbf8800d5f7509aefc1414c114db809408ceb3e49f5745df7

  • SSDEEP

    12288:kMr6y90B8MFFPoV+WKeH+DoE/xtdXh2MxshDyh:+yQrFd/WDHEoEZtdXh2Mxyyh

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

gena

C2

193.233.20.32:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68f759efe40a5bbc069942cb5d22c4296941b7760d438723cbd6b9cfc4d19b90.exe
    "C:\Users\Admin\AppData\Local\Temp\68f759efe40a5bbc069942cb5d22c4296941b7760d438723cbd6b9cfc4d19b90.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9584.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9584.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6870.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6870.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9971.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9971.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si356336.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si356336.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si356336.exe

    Filesize

    175KB

    MD5

    f50023c2c4bad1bbf51efde95c575b28

    SHA1

    9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

    SHA256

    a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

    SHA512

    d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si356336.exe

    Filesize

    175KB

    MD5

    f50023c2c4bad1bbf51efde95c575b28

    SHA1

    9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

    SHA256

    a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

    SHA512

    d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9584.exe

    Filesize

    398KB

    MD5

    1528e1facf0ff6c7821bf09f6d6d1eef

    SHA1

    7e5e98d9dbe11c5c42c3d1fa7ed7aa94a81dabd6

    SHA256

    eedfd40dd45864b902ce8a706888b4ae4642df2a3741ae94e6799c3896ff539b

    SHA512

    25412a124563dab626c1a725b7cdd0d2035bc66f609ba4bcb658118f22d7521ed8caef8b364efefe82ae0b7d1c244b1be266173585704436c46b3fd76ccd498e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9584.exe

    Filesize

    398KB

    MD5

    1528e1facf0ff6c7821bf09f6d6d1eef

    SHA1

    7e5e98d9dbe11c5c42c3d1fa7ed7aa94a81dabd6

    SHA256

    eedfd40dd45864b902ce8a706888b4ae4642df2a3741ae94e6799c3896ff539b

    SHA512

    25412a124563dab626c1a725b7cdd0d2035bc66f609ba4bcb658118f22d7521ed8caef8b364efefe82ae0b7d1c244b1be266173585704436c46b3fd76ccd498e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6870.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6870.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9971.exe

    Filesize

    356KB

    MD5

    8b711d8f1b481f2b973272617a5c8076

    SHA1

    6f299b60e80fff16a0e0626627b29104636599f6

    SHA256

    52f05cfef92f504cb3647f8d4f7a4bcdea2aa087d78630925086252f9ee503e7

    SHA512

    0a3dc95847c3c7ac6d2482542b5c3ed15a0754d038f939037f4683a6a4d10c55410d68775e9d039b7490550a0ebabce6289ad33a7197093e39cb396cd22f4b05

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9971.exe

    Filesize

    356KB

    MD5

    8b711d8f1b481f2b973272617a5c8076

    SHA1

    6f299b60e80fff16a0e0626627b29104636599f6

    SHA256

    52f05cfef92f504cb3647f8d4f7a4bcdea2aa087d78630925086252f9ee503e7

    SHA512

    0a3dc95847c3c7ac6d2482542b5c3ed15a0754d038f939037f4683a6a4d10c55410d68775e9d039b7490550a0ebabce6289ad33a7197093e39cb396cd22f4b05

  • memory/1416-1071-0x0000000000980000-0x00000000009B2000-memory.dmp

    Filesize

    200KB

  • memory/1416-1072-0x00000000053C0000-0x000000000540B000-memory.dmp

    Filesize

    300KB

  • memory/1416-1073-0x00000000055B0000-0x00000000055C0000-memory.dmp

    Filesize

    64KB

  • memory/4440-176-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-188-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-139-0x0000000004BD0000-0x0000000004C14000-memory.dmp

    Filesize

    272KB

  • memory/4440-140-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-141-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-143-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-145-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-148-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/4440-150-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/4440-151-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/4440-147-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-154-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-156-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-152-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-158-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-160-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-162-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-164-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-166-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-168-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-170-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-172-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-174-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-137-0x0000000004A00000-0x0000000004A46000-memory.dmp

    Filesize

    280KB

  • memory/4440-178-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-180-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-182-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-184-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-186-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-138-0x00000000071F0000-0x00000000076EE000-memory.dmp

    Filesize

    5.0MB

  • memory/4440-190-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4440-1049-0x0000000007E00000-0x0000000008406000-memory.dmp

    Filesize

    6.0MB

  • memory/4440-1050-0x0000000007860000-0x000000000796A000-memory.dmp

    Filesize

    1.0MB

  • memory/4440-1051-0x00000000079A0000-0x00000000079B2000-memory.dmp

    Filesize

    72KB

  • memory/4440-1052-0x00000000079C0000-0x00000000079FE000-memory.dmp

    Filesize

    248KB

  • memory/4440-1053-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/4440-1054-0x0000000007B10000-0x0000000007B5B000-memory.dmp

    Filesize

    300KB

  • memory/4440-1056-0x0000000007CA0000-0x0000000007D32000-memory.dmp

    Filesize

    584KB

  • memory/4440-1057-0x0000000007D40000-0x0000000007DA6000-memory.dmp

    Filesize

    408KB

  • memory/4440-1058-0x0000000008B50000-0x0000000008D12000-memory.dmp

    Filesize

    1.8MB

  • memory/4440-1059-0x0000000008D30000-0x000000000925C000-memory.dmp

    Filesize

    5.2MB

  • memory/4440-1060-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/4440-1061-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/4440-136-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/4440-1062-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/4440-1063-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/4440-1064-0x00000000094D0000-0x0000000009546000-memory.dmp

    Filesize

    472KB

  • memory/4440-1065-0x0000000009560000-0x00000000095B0000-memory.dmp

    Filesize

    320KB

  • memory/4652-130-0x0000000000BA0000-0x0000000000BAA000-memory.dmp

    Filesize

    40KB