Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    86s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2023, 17:54 UTC

General

  • Target

    acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe

  • Size

    686KB

  • MD5

    0099ac6370d58d91cfa2a355b0fb07ed

  • SHA1

    e2035f72f4131d8e51bb9504e19368bc18222919

  • SHA256

    acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e

  • SHA512

    f36086f80c61d13d1ac36d3166884fb457f9730b183e6f67c924be006a1242526533b7ce6fea07100944a9413c3130f2b5f02eb005797388e97a5c4466e45d0c

  • SSDEEP

    12288:1Mr4y90aCHY7IuklSoEAXGR4iNdaygaQq8K/B1Ih/GQxyy2zDQms5nyWBhyL:VyAnLStmRiNdayRQz55yy2fQhyrL

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

viza

C2

193.233.20.32:4125

Attributes
  • auth_value

    153a106a89fae7251f2dc17be2eb5720

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe
    "C:\Users\Admin\AppData\Local\Temp\acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355272.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355272.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6720.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6720.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:584
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 1080
          4⤵
          • Program crash
          PID:1160
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8719.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8719.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1992
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 1176
          4⤵
          • Program crash
          PID:2592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si271549.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si271549.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4560
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 584 -ip 584
    1⤵
      PID:2768
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1992 -ip 1992
      1⤵
        PID:4908

      Network

      • flag-us
        DNS
        196.249.167.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        196.249.167.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        32.20.233.193.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        32.20.233.193.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        56.126.166.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        56.126.166.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        154.239.44.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        154.239.44.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        45.8.109.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        45.8.109.52.in-addr.arpa
        IN PTR
        Response
      • 93.184.220.29:80
        322 B
        7
      • 93.184.220.29:80
        322 B
        7
      • 193.233.20.32:4125
        qu8719.exe
        878.6kB
        18.9kB
        653
        318
      • 20.189.173.5:443
        322 B
        7
      • 193.233.20.32:4125
        si271549.exe
        260 B
        200 B
        5
        5
      • 173.223.113.164:443
        322 B
        7
      • 173.223.113.131:80
        322 B
        7
      • 193.233.20.32:4125
        si271549.exe
        878.8kB
        18.5kB
        656
        305
      • 8.238.177.126:80
        322 B
        7
      • 8.8.8.8:53
        196.249.167.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        196.249.167.52.in-addr.arpa

      • 8.8.8.8:53
        32.20.233.193.in-addr.arpa
        dns
        72 B
        127 B
        1
        1

        DNS Request

        32.20.233.193.in-addr.arpa

      • 8.8.8.8:53
        56.126.166.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        56.126.166.20.in-addr.arpa

      • 8.8.8.8:53
        154.239.44.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        154.239.44.20.in-addr.arpa

      • 8.8.8.8:53
        45.8.109.52.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        45.8.109.52.in-addr.arpa

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si271549.exe

        Filesize

        175KB

        MD5

        ee59ed8d569a7ffd44c985c447f60e1f

        SHA1

        7ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f

        SHA256

        6e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d

        SHA512

        0cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si271549.exe

        Filesize

        175KB

        MD5

        ee59ed8d569a7ffd44c985c447f60e1f

        SHA1

        7ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f

        SHA256

        6e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d

        SHA512

        0cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355272.exe

        Filesize

        544KB

        MD5

        13049a996858ef85e3bb1460e000cc96

        SHA1

        ff01b59c655f9916f9d4ece5487740c6823826ff

        SHA256

        057100315cb9cd80798da0404cc01f20ff3b1f385fb78301bd8d8aeee81278f0

        SHA512

        eb68e4283236c7f3593587a3d824f5cae0e04e68e11b24cee5c647514ec30c31b081288f643450667f2f45ae0469499b6c52e512cebd9d373165f5df3148ca9d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355272.exe

        Filesize

        544KB

        MD5

        13049a996858ef85e3bb1460e000cc96

        SHA1

        ff01b59c655f9916f9d4ece5487740c6823826ff

        SHA256

        057100315cb9cd80798da0404cc01f20ff3b1f385fb78301bd8d8aeee81278f0

        SHA512

        eb68e4283236c7f3593587a3d824f5cae0e04e68e11b24cee5c647514ec30c31b081288f643450667f2f45ae0469499b6c52e512cebd9d373165f5df3148ca9d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6720.exe

        Filesize

        325KB

        MD5

        d0a268e348e5e5eace72e7cdef579b50

        SHA1

        0521551d74260c25ac62858357d9a3455f4a3088

        SHA256

        ee340a08842cab8ff1fc1549993292e61ba477fdd8c596919a826d7070689556

        SHA512

        b37dee345972bf464ca641fd0a5694b6149736521662db2642001dbe34ac4b0db7e0604211a2d3ab6e52c067eb0d9ea6763a9c433e75190cfbd8a8c39703e3e7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6720.exe

        Filesize

        325KB

        MD5

        d0a268e348e5e5eace72e7cdef579b50

        SHA1

        0521551d74260c25ac62858357d9a3455f4a3088

        SHA256

        ee340a08842cab8ff1fc1549993292e61ba477fdd8c596919a826d7070689556

        SHA512

        b37dee345972bf464ca641fd0a5694b6149736521662db2642001dbe34ac4b0db7e0604211a2d3ab6e52c067eb0d9ea6763a9c433e75190cfbd8a8c39703e3e7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8719.exe

        Filesize

        383KB

        MD5

        0f9ef34536d2a1de9949355f4868862f

        SHA1

        85bf49f9a0ee6d5860b2cc15f7fdc184b121cdff

        SHA256

        56fc656116b9866985824bd6f89a325e76a43e213e17e02a922aebc2cfaaa660

        SHA512

        1b95176c7e638fda1ea06e02754493f83fdd44e8ba465f412b9e2a47c0c1bf5fd5c65ef4d0666b0891f3020124f4c083dc4d04b6edeba6eed9dbfcbb228dd2f1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8719.exe

        Filesize

        383KB

        MD5

        0f9ef34536d2a1de9949355f4868862f

        SHA1

        85bf49f9a0ee6d5860b2cc15f7fdc184b121cdff

        SHA256

        56fc656116b9866985824bd6f89a325e76a43e213e17e02a922aebc2cfaaa660

        SHA512

        1b95176c7e638fda1ea06e02754493f83fdd44e8ba465f412b9e2a47c0c1bf5fd5c65ef4d0666b0891f3020124f4c083dc4d04b6edeba6eed9dbfcbb228dd2f1

      • memory/584-148-0x0000000002B80000-0x0000000002BAD000-memory.dmp

        Filesize

        180KB

      • memory/584-149-0x0000000007190000-0x0000000007734000-memory.dmp

        Filesize

        5.6MB

      • memory/584-151-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-150-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-153-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-155-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-157-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-159-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-161-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-163-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-165-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-167-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-169-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-171-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-173-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-175-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-177-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/584-178-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/584-179-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/584-180-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/584-181-0x0000000000400000-0x0000000002B7E000-memory.dmp

        Filesize

        39.5MB

      • memory/584-183-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/584-184-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/584-185-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/584-186-0x0000000000400000-0x0000000002B7E000-memory.dmp

        Filesize

        39.5MB

      • memory/1992-191-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-192-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-194-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-196-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-198-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-200-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-202-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-204-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-206-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-209-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-210-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/1992-212-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/1992-214-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-213-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/1992-208-0x0000000002CC0000-0x0000000002D0B000-memory.dmp

        Filesize

        300KB

      • memory/1992-216-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-218-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-220-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-222-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-224-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-226-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-228-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/1992-1101-0x0000000007910000-0x0000000007F28000-memory.dmp

        Filesize

        6.1MB

      • memory/1992-1102-0x0000000007F30000-0x000000000803A000-memory.dmp

        Filesize

        1.0MB

      • memory/1992-1103-0x0000000007280000-0x0000000007292000-memory.dmp

        Filesize

        72KB

      • memory/1992-1104-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/1992-1105-0x00000000072A0000-0x00000000072DC000-memory.dmp

        Filesize

        240KB

      • memory/1992-1107-0x0000000008280000-0x00000000082E6000-memory.dmp

        Filesize

        408KB

      • memory/1992-1108-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/1992-1110-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/1992-1109-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/1992-1111-0x0000000008A40000-0x0000000008AD2000-memory.dmp

        Filesize

        584KB

      • memory/1992-1112-0x0000000008B40000-0x0000000008D02000-memory.dmp

        Filesize

        1.8MB

      • memory/1992-1113-0x0000000008D20000-0x000000000924C000-memory.dmp

        Filesize

        5.2MB

      • memory/1992-1114-0x0000000009380000-0x00000000093F6000-memory.dmp

        Filesize

        472KB

      • memory/1992-1115-0x0000000009410000-0x0000000009460000-memory.dmp

        Filesize

        320KB

      • memory/1992-1116-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/4560-1122-0x00000000000B0000-0x00000000000E2000-memory.dmp

        Filesize

        200KB

      • memory/4560-1123-0x0000000004940000-0x0000000004950000-memory.dmp

        Filesize

        64KB

      • memory/4560-1124-0x0000000004940000-0x0000000004950000-memory.dmp

        Filesize

        64KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.