Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    50s
  • max time network
    69s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24/03/2023, 14:22

General

  • Target

    b4ba168df7c77cb04b923e0e21095bc4c496f7c2916911b925a49245bcb58591.exe

  • Size

    684KB

  • MD5

    c70f0639cb3661eb7bcd2b865a719259

  • SHA1

    f6577b23fecd42fc06b219af9a80329936bcfcf7

  • SHA256

    b4ba168df7c77cb04b923e0e21095bc4c496f7c2916911b925a49245bcb58591

  • SHA512

    9e74430ccf19799b4f28c891474c78a93dfdee64704038a944718c6114580401748a0127670c3d0d0158a288802370829cd5692a08011e57e001fe40f3ef2af3

  • SSDEEP

    12288:32p6IH/YF4pPp9BkMNVxauA6aFKm941l3qrKaPG4Lk2faSKVJ8ekcxAe:32zpPpnkOVxa/68KZl3UKaPG4Lk2/KVf

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

gena

C2

193.233.20.32:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4ba168df7c77cb04b923e0e21095bc4c496f7c2916911b925a49245bcb58591.exe
    "C:\Users\Admin\AppData\Local\Temp\b4ba168df7c77cb04b923e0e21095bc4c496f7c2916911b925a49245bcb58591.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinN6544.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinN6544.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr529169.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr529169.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku522736.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku522736.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr961330.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr961330.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr961330.exe

    Filesize

    175KB

    MD5

    f50023c2c4bad1bbf51efde95c575b28

    SHA1

    9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

    SHA256

    a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

    SHA512

    d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr961330.exe

    Filesize

    175KB

    MD5

    f50023c2c4bad1bbf51efde95c575b28

    SHA1

    9e02fe5ecc82f471d8c078a0d4b9ce02fdf69ce1

    SHA256

    a491d4a9a89a7103f18f402d20df34f1ae56d18bc779ff8a4681f52a3e65cbdb

    SHA512

    d869c3c475811fdce251a700556018d98c639c28ec838f31e0fb3a9f91743843393d77735f14b992a7407356d109b680e2b9687385bae2ed7ffaef88b7c9fa57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinN6544.exe

    Filesize

    398KB

    MD5

    cfb2eb242bb0e63df5142c30521388d6

    SHA1

    c793082cd9502cd7b1131a74dddc28bcb38adf8d

    SHA256

    50f0911b2b148deca7239749036458e857bc742d9cd3166d6d6596d0577403c3

    SHA512

    715303f6c1017b872d7966210f03e281563414a88897584d7576c26d18bce7ade495cc5735a1eac02fabbcefd6cbc6da94a19d6f80b5d216b036ba47aa6d9528

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinN6544.exe

    Filesize

    398KB

    MD5

    cfb2eb242bb0e63df5142c30521388d6

    SHA1

    c793082cd9502cd7b1131a74dddc28bcb38adf8d

    SHA256

    50f0911b2b148deca7239749036458e857bc742d9cd3166d6d6596d0577403c3

    SHA512

    715303f6c1017b872d7966210f03e281563414a88897584d7576c26d18bce7ade495cc5735a1eac02fabbcefd6cbc6da94a19d6f80b5d216b036ba47aa6d9528

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr529169.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr529169.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku522736.exe

    Filesize

    357KB

    MD5

    f7b1f3086ead97c7fcd8eae485eec5a1

    SHA1

    4b41edab1ef531e7a5e983e193d50fbde97b7c98

    SHA256

    ffc243f5025ef8fd5a181ab1447fafb33153aba4a963dcb66a80f1624c2e23ad

    SHA512

    f6d265946280be35fb4899ccb3f8089f8524f8b69636285dcf2868452a6922df9c769f7bc73def6262dacdbcab90afeeab3d99e030932bee136ba9dfcb9eca62

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku522736.exe

    Filesize

    357KB

    MD5

    f7b1f3086ead97c7fcd8eae485eec5a1

    SHA1

    4b41edab1ef531e7a5e983e193d50fbde97b7c98

    SHA256

    ffc243f5025ef8fd5a181ab1447fafb33153aba4a963dcb66a80f1624c2e23ad

    SHA512

    f6d265946280be35fb4899ccb3f8089f8524f8b69636285dcf2868452a6922df9c769f7bc73def6262dacdbcab90afeeab3d99e030932bee136ba9dfcb9eca62

  • memory/1916-139-0x0000000006880000-0x0000000006909000-memory.dmp

    Filesize

    548KB

  • memory/1916-140-0x0000000000400000-0x0000000002BD9000-memory.dmp

    Filesize

    39.8MB

  • memory/2316-138-0x0000000000B40000-0x0000000000B4A000-memory.dmp

    Filesize

    40KB

  • memory/2504-1081-0x00000000056A0000-0x00000000056B0000-memory.dmp

    Filesize

    64KB

  • memory/2504-1079-0x0000000005630000-0x000000000567B000-memory.dmp

    Filesize

    300KB

  • memory/2504-1078-0x0000000000DC0000-0x0000000000DF2000-memory.dmp

    Filesize

    200KB

  • memory/4924-183-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-195-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-151-0x00000000049B0000-0x00000000049F4000-memory.dmp

    Filesize

    272KB

  • memory/4924-152-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-153-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-155-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-157-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-159-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-161-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-163-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-165-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-167-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-169-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-171-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-173-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-175-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-177-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-179-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-148-0x0000000007300000-0x0000000007310000-memory.dmp

    Filesize

    64KB

  • memory/4924-181-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-185-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-187-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-189-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-191-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-193-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-150-0x0000000007310000-0x000000000780E000-memory.dmp

    Filesize

    5.0MB

  • memory/4924-197-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-199-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-201-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-203-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-205-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-207-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-209-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-211-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-213-0x00000000049B0000-0x00000000049EF000-memory.dmp

    Filesize

    252KB

  • memory/4924-1058-0x0000000007E20000-0x0000000008426000-memory.dmp

    Filesize

    6.0MB

  • memory/4924-1059-0x0000000007810000-0x000000000791A000-memory.dmp

    Filesize

    1.0MB

  • memory/4924-1060-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/4924-1061-0x0000000007260000-0x000000000729E000-memory.dmp

    Filesize

    248KB

  • memory/4924-1062-0x00000000072B0000-0x00000000072FB000-memory.dmp

    Filesize

    300KB

  • memory/4924-1063-0x0000000007300000-0x0000000007310000-memory.dmp

    Filesize

    64KB

  • memory/4924-1066-0x0000000007300000-0x0000000007310000-memory.dmp

    Filesize

    64KB

  • memory/4924-1067-0x0000000007B60000-0x0000000007BF2000-memory.dmp

    Filesize

    584KB

  • memory/4924-1068-0x0000000007C00000-0x0000000007C66000-memory.dmp

    Filesize

    408KB

  • memory/4924-1069-0x0000000008B30000-0x0000000008BA6000-memory.dmp

    Filesize

    472KB

  • memory/4924-1070-0x0000000008BC0000-0x0000000008C10000-memory.dmp

    Filesize

    320KB

  • memory/4924-149-0x0000000007300000-0x0000000007310000-memory.dmp

    Filesize

    64KB

  • memory/4924-147-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/4924-146-0x0000000004900000-0x0000000004946000-memory.dmp

    Filesize

    280KB

  • memory/4924-1071-0x0000000009F00000-0x000000000A0C2000-memory.dmp

    Filesize

    1.8MB

  • memory/4924-1072-0x000000000A0D0000-0x000000000A5FC000-memory.dmp

    Filesize

    5.2MB