Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    87s
  • max time network
    89s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2023, 15:27

General

  • Target

    1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe

  • Size

    686KB

  • MD5

    c79a1916e942898d0dda31ba90adee8f

  • SHA1

    5ee78efec311599cd7ee34e6d5947814a3febda7

  • SHA256

    1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18

  • SHA512

    d5eea834842e81ea9fa20f64c81c5397adf662a3954def5629421b285150c3695feb2fd1f71ffb057a07148357ed6d118e5c56b5774787711b8669d2595353be

  • SSDEEP

    12288:LMrsy90I+SF50QFbJLc51xzlma17VTIkfiGk9Sofwi7:nyASEsbJmwaIUiGk9S+w8

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe
    "C:\Users\Admin\AppData\Local\Temp\1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136228.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136228.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1619.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1619.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 1084
          4⤵
          • Program crash
          PID:3388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1616.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1616.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3316
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 1632
          4⤵
          • Program crash
          PID:4652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612709.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612709.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4452
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5060 -ip 5060
    1⤵
      PID:2320
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3316 -ip 3316
      1⤵
        PID:1424

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612709.exe

        Filesize

        175KB

        MD5

        21a40192bd6ec337fb31d6686a7b4304

        SHA1

        60ff3327a3ab63cefb1a22d2ab1ae19cf60af89f

        SHA256

        814da5574066b721e1a31de53f8d9c3b85265285da7f9f5280482b0aab9be54c

        SHA512

        c692162e5665c03f449bf762e1c4bd49cbc5fa856460920dadc30e08b7b849032afd8f6755ad5b3469535e93ebf658e1a85c40e0e2c8dcb4821009a38bf44263

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612709.exe

        Filesize

        175KB

        MD5

        21a40192bd6ec337fb31d6686a7b4304

        SHA1

        60ff3327a3ab63cefb1a22d2ab1ae19cf60af89f

        SHA256

        814da5574066b721e1a31de53f8d9c3b85265285da7f9f5280482b0aab9be54c

        SHA512

        c692162e5665c03f449bf762e1c4bd49cbc5fa856460920dadc30e08b7b849032afd8f6755ad5b3469535e93ebf658e1a85c40e0e2c8dcb4821009a38bf44263

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136228.exe

        Filesize

        544KB

        MD5

        323ec0601e501486032d15145d5a9baa

        SHA1

        2a8744bd002ce28c9b44b5e1f0e6b6c799002b02

        SHA256

        f83773d5eb873b055b0168ef0f00bddb540762e1a3e4c420f5e4dc09e2a46356

        SHA512

        18b840beb0d3fbca192f1279187a695a5f9e9f546e27f3752f6fd2bac73886c35d4bc62ae5d25ce30136ada94cecb94075f8f9277bc4e2a03cc89af910edc1bb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136228.exe

        Filesize

        544KB

        MD5

        323ec0601e501486032d15145d5a9baa

        SHA1

        2a8744bd002ce28c9b44b5e1f0e6b6c799002b02

        SHA256

        f83773d5eb873b055b0168ef0f00bddb540762e1a3e4c420f5e4dc09e2a46356

        SHA512

        18b840beb0d3fbca192f1279187a695a5f9e9f546e27f3752f6fd2bac73886c35d4bc62ae5d25ce30136ada94cecb94075f8f9277bc4e2a03cc89af910edc1bb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1619.exe

        Filesize

        326KB

        MD5

        c8f734dcbbd646ff228ee85cb7818ae8

        SHA1

        39c5844f5454f2e75e1839c9c58a876b1fcba74a

        SHA256

        df75e4d07d79c806647c491312bb97668ae7be990c74761fef015c5195fa6d44

        SHA512

        1e88dfd741286a4e102f3f6deaf29bbe9792242aceb521b0eb2ecd77ed49219755f8e3f58b56739b69a04c95e9816c0c5dcad7afdbaa3e8085fa612694072dc1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1619.exe

        Filesize

        326KB

        MD5

        c8f734dcbbd646ff228ee85cb7818ae8

        SHA1

        39c5844f5454f2e75e1839c9c58a876b1fcba74a

        SHA256

        df75e4d07d79c806647c491312bb97668ae7be990c74761fef015c5195fa6d44

        SHA512

        1e88dfd741286a4e102f3f6deaf29bbe9792242aceb521b0eb2ecd77ed49219755f8e3f58b56739b69a04c95e9816c0c5dcad7afdbaa3e8085fa612694072dc1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1616.exe

        Filesize

        384KB

        MD5

        6c9105b5bf070c9e6f2bbd553b4409dc

        SHA1

        7e3c59e906d1aa6f8e24c50d4d8c0c3e9b3a8878

        SHA256

        10d5e4fc8d615e7883d15ba4777931e797696bad1736e5cf32a99180f7715d90

        SHA512

        20dcd9603ced1dd1e42f1bf8c0a1dbed13f9070d255831395b0db7495caf6524c18911c9bc5bd3ea9a5441c774dda70e3a79a2362e9d0ddd22569aa15def1bdc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1616.exe

        Filesize

        384KB

        MD5

        6c9105b5bf070c9e6f2bbd553b4409dc

        SHA1

        7e3c59e906d1aa6f8e24c50d4d8c0c3e9b3a8878

        SHA256

        10d5e4fc8d615e7883d15ba4777931e797696bad1736e5cf32a99180f7715d90

        SHA512

        20dcd9603ced1dd1e42f1bf8c0a1dbed13f9070d255831395b0db7495caf6524c18911c9bc5bd3ea9a5441c774dda70e3a79a2362e9d0ddd22569aa15def1bdc

      • memory/3316-1102-0x0000000007F70000-0x000000000807A000-memory.dmp

        Filesize

        1.0MB

      • memory/3316-1103-0x00000000080B0000-0x00000000080C2000-memory.dmp

        Filesize

        72KB

      • memory/3316-1116-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/3316-1115-0x0000000009550000-0x00000000095A0000-memory.dmp

        Filesize

        320KB

      • memory/3316-1114-0x00000000094D0000-0x0000000009546000-memory.dmp

        Filesize

        472KB

      • memory/3316-1113-0x0000000008D60000-0x000000000928C000-memory.dmp

        Filesize

        5.2MB

      • memory/3316-1112-0x0000000008B80000-0x0000000008D42000-memory.dmp

        Filesize

        1.8MB

      • memory/3316-1111-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/3316-1110-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/3316-1109-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/3316-1108-0x0000000008460000-0x00000000084C6000-memory.dmp

        Filesize

        408KB

      • memory/3316-1107-0x00000000083C0000-0x0000000008452000-memory.dmp

        Filesize

        584KB

      • memory/3316-1105-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/3316-1104-0x00000000080D0000-0x000000000810C000-memory.dmp

        Filesize

        240KB

      • memory/3316-200-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-1101-0x0000000007950000-0x0000000007F68000-memory.dmp

        Filesize

        6.1MB

      • memory/3316-228-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-226-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-224-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-222-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-204-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-220-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-216-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-191-0x0000000002C60000-0x0000000002CAB000-memory.dmp

        Filesize

        300KB

      • memory/3316-193-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/3316-192-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/3316-194-0x0000000007290000-0x00000000072A0000-memory.dmp

        Filesize

        64KB

      • memory/3316-195-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-196-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-198-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-214-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-206-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-218-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-202-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-208-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-210-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/3316-212-0x0000000004B30000-0x0000000004B6F000-memory.dmp

        Filesize

        252KB

      • memory/4452-1122-0x0000000000410000-0x0000000000442000-memory.dmp

        Filesize

        200KB

      • memory/4452-1123-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/5060-157-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-149-0x00000000072E0000-0x0000000007884000-memory.dmp

        Filesize

        5.6MB

      • memory/5060-185-0x00000000072D0000-0x00000000072E0000-memory.dmp

        Filesize

        64KB

      • memory/5060-184-0x00000000072D0000-0x00000000072E0000-memory.dmp

        Filesize

        64KB

      • memory/5060-183-0x00000000072D0000-0x00000000072E0000-memory.dmp

        Filesize

        64KB

      • memory/5060-181-0x0000000000400000-0x0000000002B7F000-memory.dmp

        Filesize

        39.5MB

      • memory/5060-180-0x00000000072D0000-0x00000000072E0000-memory.dmp

        Filesize

        64KB

      • memory/5060-150-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-179-0x00000000072D0000-0x00000000072E0000-memory.dmp

        Filesize

        64KB

      • memory/5060-155-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-178-0x00000000072D0000-0x00000000072E0000-memory.dmp

        Filesize

        64KB

      • memory/5060-186-0x0000000000400000-0x0000000002B7F000-memory.dmp

        Filesize

        39.5MB

      • memory/5060-175-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-169-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-173-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-167-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-165-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-163-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-161-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-159-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-177-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-171-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-148-0x0000000002C50000-0x0000000002C7D000-memory.dmp

        Filesize

        180KB

      • memory/5060-153-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB

      • memory/5060-151-0x0000000007220000-0x0000000007232000-memory.dmp

        Filesize

        72KB