Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    57s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/03/2023, 12:43

General

  • Target

    29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe

  • Size

    686KB

  • MD5

    4615b944298d2196a74af4a3c9bb64ba

  • SHA1

    67f96a57b78ba50cbf2241bcd13e3c204543cb55

  • SHA256

    29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8

  • SHA512

    6cedb084cb1f43b72a6f4b15e05ec58e464bdbb818264877706f37fd8300df068ae78ea8741147a978ec99d2456c940025ada85c6f4d1ce42360feb79ebafd05

  • SSDEEP

    12288:IMrKy90Ie00QXKMcHcMJmwim+FXOSyMK496PuSjaAxKCbFv:iywEKMcHLcwim+FXOie/jz

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe
    "C:\Users\Admin\AppData\Local\Temp\29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un880772.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un880772.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8687.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8687.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5986.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5986.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si044994.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si044994.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si044994.exe

    Filesize

    175KB

    MD5

    b5fa188104a5c46a03c30d62995ad646

    SHA1

    0ed123ce7c6fcd71d29d7e4108bb46ccb8483ec6

    SHA256

    ca7b9d933b9201c09b367dfc7ec4e5075b01e6f42fa18857a4a883a1b86b16cf

    SHA512

    4689247d1f4d98fcfe840b4fe1b5ca4794b67cb34141d9cd8573c0fefb66f66bf1f887fa080cfce5cf904966f8361beaeca57b26282be6ea97f5287296d73117

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si044994.exe

    Filesize

    175KB

    MD5

    b5fa188104a5c46a03c30d62995ad646

    SHA1

    0ed123ce7c6fcd71d29d7e4108bb46ccb8483ec6

    SHA256

    ca7b9d933b9201c09b367dfc7ec4e5075b01e6f42fa18857a4a883a1b86b16cf

    SHA512

    4689247d1f4d98fcfe840b4fe1b5ca4794b67cb34141d9cd8573c0fefb66f66bf1f887fa080cfce5cf904966f8361beaeca57b26282be6ea97f5287296d73117

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un880772.exe

    Filesize

    544KB

    MD5

    59d44a9b17c3bcf525e76610d6f822fb

    SHA1

    c27081b69492876901f9d0f4f36f74405ab8d336

    SHA256

    c4ffe4357c282ec07b7855127195ba33af6ae1add0cd108cb3b136183e012e4a

    SHA512

    00ffce1f3fb4860c9403d1ef08dad77ab36adda59c585297240b26fa78411ed552a8421d92fa32616648f94238a265b796c6cf58ac0669f56d69c8ae2bbc92bb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un880772.exe

    Filesize

    544KB

    MD5

    59d44a9b17c3bcf525e76610d6f822fb

    SHA1

    c27081b69492876901f9d0f4f36f74405ab8d336

    SHA256

    c4ffe4357c282ec07b7855127195ba33af6ae1add0cd108cb3b136183e012e4a

    SHA512

    00ffce1f3fb4860c9403d1ef08dad77ab36adda59c585297240b26fa78411ed552a8421d92fa32616648f94238a265b796c6cf58ac0669f56d69c8ae2bbc92bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8687.exe

    Filesize

    326KB

    MD5

    58ec779d49c5d8c8751d997500f1511f

    SHA1

    ccd3aca0aee1d83a4460aee92a9a9b3e305be343

    SHA256

    4e7fb8a5c06cf1f6d5a887ca19dcef625712566a55c02f196ffa291a13fff0ec

    SHA512

    325cbad1d7757fbe44396812173a7829976e63d26302a88ebc0c94eb6499e29d28a7a3fff42b5a8a68b41b5a791ffdc4a2f6a0ac30e0372023c31724088e463b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8687.exe

    Filesize

    326KB

    MD5

    58ec779d49c5d8c8751d997500f1511f

    SHA1

    ccd3aca0aee1d83a4460aee92a9a9b3e305be343

    SHA256

    4e7fb8a5c06cf1f6d5a887ca19dcef625712566a55c02f196ffa291a13fff0ec

    SHA512

    325cbad1d7757fbe44396812173a7829976e63d26302a88ebc0c94eb6499e29d28a7a3fff42b5a8a68b41b5a791ffdc4a2f6a0ac30e0372023c31724088e463b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5986.exe

    Filesize

    384KB

    MD5

    17882143beedb39f876e7647a7793280

    SHA1

    1cfa2b1c218044aac3db48bb861d8bd5ad03457b

    SHA256

    49f8f2b63c427ddb5189d38883cacefa2d4f0033e2a7af5f56a36e8dc1a47ce6

    SHA512

    67af88eab2767222f947e9fbbe4614809fcc7c4b2f8aff0258d21f74981ec54503b912c00c688e229feaa3fb926eb9f7b3d3e29564be016cefab3e290cc4e051

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5986.exe

    Filesize

    384KB

    MD5

    17882143beedb39f876e7647a7793280

    SHA1

    1cfa2b1c218044aac3db48bb861d8bd5ad03457b

    SHA256

    49f8f2b63c427ddb5189d38883cacefa2d4f0033e2a7af5f56a36e8dc1a47ce6

    SHA512

    67af88eab2767222f947e9fbbe4614809fcc7c4b2f8aff0258d21f74981ec54503b912c00c688e229feaa3fb926eb9f7b3d3e29564be016cefab3e290cc4e051

  • memory/2800-136-0x0000000002D80000-0x0000000002D9A000-memory.dmp

    Filesize

    104KB

  • memory/2800-137-0x00000000072A0000-0x000000000779E000-memory.dmp

    Filesize

    5.0MB

  • memory/2800-138-0x0000000004A60000-0x0000000004A78000-memory.dmp

    Filesize

    96KB

  • memory/2800-139-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-140-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-142-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-144-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-146-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-148-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-150-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-152-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-154-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-156-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-158-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-160-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-162-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-164-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-166-0x0000000004A60000-0x0000000004A72000-memory.dmp

    Filesize

    72KB

  • memory/2800-167-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2800-168-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2800-169-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2800-170-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2800-171-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/2800-174-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/2800-173-0x0000000000400000-0x0000000002B7F000-memory.dmp

    Filesize

    39.5MB

  • memory/2800-175-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/4428-180-0x00000000070C0000-0x0000000007106000-memory.dmp

    Filesize

    280KB

  • memory/4428-181-0x0000000007140000-0x0000000007184000-memory.dmp

    Filesize

    272KB

  • memory/4428-182-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-183-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-185-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-189-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-197-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-195-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-193-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-191-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-187-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-200-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-202-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/4428-203-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/4428-204-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-206-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/4428-207-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-199-0x0000000002CB0000-0x0000000002CFB000-memory.dmp

    Filesize

    300KB

  • memory/4428-209-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-219-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-217-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-215-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-213-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-211-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/4428-1092-0x0000000007750000-0x0000000007D56000-memory.dmp

    Filesize

    6.0MB

  • memory/4428-1093-0x0000000007D60000-0x0000000007E6A000-memory.dmp

    Filesize

    1.0MB

  • memory/4428-1094-0x0000000007E70000-0x0000000007E82000-memory.dmp

    Filesize

    72KB

  • memory/4428-1095-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/4428-1096-0x0000000007E90000-0x0000000007ECE000-memory.dmp

    Filesize

    248KB

  • memory/4428-1097-0x0000000007FE0000-0x000000000802B000-memory.dmp

    Filesize

    300KB

  • memory/4428-1099-0x0000000008170000-0x0000000008202000-memory.dmp

    Filesize

    584KB

  • memory/4428-1100-0x0000000008210000-0x0000000008276000-memory.dmp

    Filesize

    408KB

  • memory/4428-1101-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/4428-1102-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/4428-1103-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/4428-1104-0x0000000008B50000-0x0000000008D12000-memory.dmp

    Filesize

    1.8MB

  • memory/4428-1105-0x0000000008D40000-0x000000000926C000-memory.dmp

    Filesize

    5.2MB

  • memory/4428-1106-0x00000000093A0000-0x0000000009416000-memory.dmp

    Filesize

    472KB

  • memory/4428-1107-0x0000000009420000-0x0000000009470000-memory.dmp

    Filesize

    320KB

  • memory/5100-1113-0x0000000000BB0000-0x0000000000BE2000-memory.dmp

    Filesize

    200KB

  • memory/5100-1114-0x00000000055F0000-0x000000000563B000-memory.dmp

    Filesize

    300KB

  • memory/5100-1115-0x0000000005710000-0x0000000005720000-memory.dmp

    Filesize

    64KB