Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    56s
  • max time network
    145s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/03/2023, 02:58

General

  • Target

    920467052ef04f22c3b0219c7cf93b4384ae6eb7cbf833cb327816b0f99ab976.exe

  • Size

    726KB

  • MD5

    0e3ac54ec0bdedb8efdda8420a6fb9de

  • SHA1

    314c712b182c6bbaee981d4426553399b5e2f61c

  • SHA256

    920467052ef04f22c3b0219c7cf93b4384ae6eb7cbf833cb327816b0f99ab976

  • SHA512

    f09c77ef8c15f4fa75c4a520506af1d3106cfe757a11bdb155afd5cae1def29cc13e06c5db74c001ac16d21361ed3425b1db1697859e18d3b9e2a0c9f99c4f68

  • SSDEEP

    12288:Ap3JDQAu5fdU6AdozuoTnsSu07dIIaYwKFd9iGWOCKjEWf8XgtpsDUdIQEm7ZxS:Ap5u1G6AWK/C7dnap89b98Xmm/m72

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

firmu

C2

193.233.20.32:4125

Attributes
  • auth_value

    9f3e5e35e4a3a38fc36c5a851728aa33

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\920467052ef04f22c3b0219c7cf93b4384ae6eb7cbf833cb327816b0f99ab976.exe
    "C:\Users\Admin\AppData\Local\Temp\920467052ef04f22c3b0219c7cf93b4384ae6eb7cbf833cb327816b0f99ab976.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCk5496.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCk5496.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr505958.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr505958.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku263187.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku263187.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr123065.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr123065.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr123065.exe

    Filesize

    175KB

    MD5

    6b780eb9c71d7b15142e05f33765678b

    SHA1

    1b853b28e715a7c7a8e4a39567e7b22697265741

    SHA256

    2067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76

    SHA512

    a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr123065.exe

    Filesize

    175KB

    MD5

    6b780eb9c71d7b15142e05f33765678b

    SHA1

    1b853b28e715a7c7a8e4a39567e7b22697265741

    SHA256

    2067ab13d0198979bf52e0b0e37bc9187cb178517620826424fc3c9f41c06d76

    SHA512

    a149005b933b4a7739cf723ee1fec219e8eb2019fbe5300a807383aae83c46e60d0fcd8f3b1f5cb8d85556ade4567db91ecdaa4fdbbc87350d5cb7b1f4274314

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCk5496.exe

    Filesize

    412KB

    MD5

    5e85e64ac515869d4ad6ed02a8cfc673

    SHA1

    14700a0bcf29120620834603e11ad39c5cf32fab

    SHA256

    94151cd5f9339099cd717ab2c55876538ac92734957a6e9a47c45df05625d20c

    SHA512

    6df00a3e6372cdc0ef117c7f7b28b23aa4e987f68bb35c68f602268e09152e7fca544016c8bb1019143f85189954a80191b500393c5efaaada574f1c72cbb9c1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCk5496.exe

    Filesize

    412KB

    MD5

    5e85e64ac515869d4ad6ed02a8cfc673

    SHA1

    14700a0bcf29120620834603e11ad39c5cf32fab

    SHA256

    94151cd5f9339099cd717ab2c55876538ac92734957a6e9a47c45df05625d20c

    SHA512

    6df00a3e6372cdc0ef117c7f7b28b23aa4e987f68bb35c68f602268e09152e7fca544016c8bb1019143f85189954a80191b500393c5efaaada574f1c72cbb9c1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr505958.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr505958.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku263187.exe

    Filesize

    386KB

    MD5

    2d63694bed0b33521a73e074464c9e19

    SHA1

    cc9e47042bf5f1565fca829eb2757e1422660d73

    SHA256

    edff9775ae77b1f2d83649d79b0f31b0e23a85e1e679537f29912c17ec9bc87e

    SHA512

    72540be162f742087aa8a6916ffcd29cc147024ca6e2e3fcd3b996a04cfaecb3a0644ab9e36938f4755966a86309b7e3e779648532f9f14760ecd11910050fdb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku263187.exe

    Filesize

    386KB

    MD5

    2d63694bed0b33521a73e074464c9e19

    SHA1

    cc9e47042bf5f1565fca829eb2757e1422660d73

    SHA256

    edff9775ae77b1f2d83649d79b0f31b0e23a85e1e679537f29912c17ec9bc87e

    SHA512

    72540be162f742087aa8a6916ffcd29cc147024ca6e2e3fcd3b996a04cfaecb3a0644ab9e36938f4755966a86309b7e3e779648532f9f14760ecd11910050fdb

  • memory/4052-136-0x0000000006AB0000-0x0000000006B3C000-memory.dmp

    Filesize

    560KB

  • memory/4052-138-0x0000000000400000-0x0000000002BE3000-memory.dmp

    Filesize

    39.9MB

  • memory/4248-137-0x0000000000290000-0x000000000029A000-memory.dmp

    Filesize

    40KB

  • memory/4284-182-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-194-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-146-0x0000000007140000-0x0000000007184000-memory.dmp

    Filesize

    272KB

  • memory/4284-147-0x0000000002C60000-0x0000000002CAB000-memory.dmp

    Filesize

    300KB

  • memory/4284-148-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4284-149-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4284-150-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4284-151-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-152-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-154-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-158-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-156-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-160-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-162-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-164-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-166-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-168-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-170-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-172-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-174-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-176-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-178-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-180-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-144-0x0000000004960000-0x00000000049A6000-memory.dmp

    Filesize

    280KB

  • memory/4284-184-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-186-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-188-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-190-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-192-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-145-0x00000000071D0000-0x00000000076CE000-memory.dmp

    Filesize

    5.0MB

  • memory/4284-196-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-198-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-200-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-202-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-204-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-206-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-208-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-210-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-212-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4284-1057-0x00000000077E0000-0x0000000007DE6000-memory.dmp

    Filesize

    6.0MB

  • memory/4284-1058-0x0000000007E70000-0x0000000007F7A000-memory.dmp

    Filesize

    1.0MB

  • memory/4284-1059-0x0000000007FB0000-0x0000000007FC2000-memory.dmp

    Filesize

    72KB

  • memory/4284-1060-0x0000000007FD0000-0x000000000800E000-memory.dmp

    Filesize

    248KB

  • memory/4284-1061-0x0000000008120000-0x000000000816B000-memory.dmp

    Filesize

    300KB

  • memory/4284-1062-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4284-1065-0x00000000082B0000-0x0000000008316000-memory.dmp

    Filesize

    408KB

  • memory/4284-1066-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/4284-1067-0x0000000008A60000-0x0000000008C22000-memory.dmp

    Filesize

    1.8MB

  • memory/4284-1068-0x0000000008C30000-0x000000000915C000-memory.dmp

    Filesize

    5.2MB

  • memory/4284-1070-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4284-1069-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4284-1071-0x00000000071C0000-0x00000000071D0000-memory.dmp

    Filesize

    64KB

  • memory/4284-1072-0x0000000009280000-0x00000000092F6000-memory.dmp

    Filesize

    472KB

  • memory/4284-1073-0x0000000009310000-0x0000000009360000-memory.dmp

    Filesize

    320KB

  • memory/4532-1079-0x0000000000460000-0x0000000000492000-memory.dmp

    Filesize

    200KB

  • memory/4532-1080-0x0000000004E90000-0x0000000004EDB000-memory.dmp

    Filesize

    300KB

  • memory/4532-1081-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB