Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    87s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2023, 16:01

General

  • Target

    baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe

  • Size

    689KB

  • MD5

    bcc8b0328c4e48cce575b4f0643a53d2

  • SHA1

    dd4e71c9e20f85b62a3e43056882ab327472c342

  • SHA256

    baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a

  • SHA512

    1245aaa6476a2697e88a23c97cecbca4a09c8588c46646fbf1b5418061e318b9f77353cf28bfa7b30a4fd0ddec48fbf1bd43fab59ce0e52bd0540d5321f3bcbb

  • SSDEEP

    12288:eMruy90qwHJuMLw4cTfelJBfFmlS+4SQsY7VTIRNiMQJ11/+r:EyD8NHcEBfFigc/Di51Wr

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe
    "C:\Users\Admin\AppData\Local\Temp\baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un839685.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un839685.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4944.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4944.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 1084
          4⤵
          • Program crash
          PID:4828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5935.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5935.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 1512
          4⤵
          • Program crash
          PID:2724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si081788.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si081788.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:540
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2120 -ip 2120
    1⤵
      PID:5060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1008 -ip 1008
      1⤵
        PID:2148

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si081788.exe

        Filesize

        175KB

        MD5

        2b57eb3935b2d7e3aaabdacd2a5720d3

        SHA1

        a06712fab5008c17520894d962e588e2470d3475

        SHA256

        a94d2a7c2a1662cfaaea112915660747e1d2b02edad5dcb5db133e97a7c16966

        SHA512

        def524d4ec450f075f1bc6e44b4977a09a8a1d3b4b8ca9ef18d5eee3f6ef85b837b49e50fafbb84212f94de1ae1a12808a2fd8b44b4bb6792ba3dd291432c7ad

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si081788.exe

        Filesize

        175KB

        MD5

        2b57eb3935b2d7e3aaabdacd2a5720d3

        SHA1

        a06712fab5008c17520894d962e588e2470d3475

        SHA256

        a94d2a7c2a1662cfaaea112915660747e1d2b02edad5dcb5db133e97a7c16966

        SHA512

        def524d4ec450f075f1bc6e44b4977a09a8a1d3b4b8ca9ef18d5eee3f6ef85b837b49e50fafbb84212f94de1ae1a12808a2fd8b44b4bb6792ba3dd291432c7ad

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un839685.exe

        Filesize

        547KB

        MD5

        6b2c2a899dd812be101f353c4e90700d

        SHA1

        6419fd580ed9560a2cf4ac8c562c7dac5508a659

        SHA256

        eca0c52383cc408e8b994f77196f7998a70392a1f535b9e2537f2ef6673246d6

        SHA512

        2df748919d94f1c71f9824da5b982489f3b5e7bd1f60957391b48daa8ceeb77b787e981541ed640f386e791b5e93b3a743bf991ba363529e759c64d35fbd807d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un839685.exe

        Filesize

        547KB

        MD5

        6b2c2a899dd812be101f353c4e90700d

        SHA1

        6419fd580ed9560a2cf4ac8c562c7dac5508a659

        SHA256

        eca0c52383cc408e8b994f77196f7998a70392a1f535b9e2537f2ef6673246d6

        SHA512

        2df748919d94f1c71f9824da5b982489f3b5e7bd1f60957391b48daa8ceeb77b787e981541ed640f386e791b5e93b3a743bf991ba363529e759c64d35fbd807d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4944.exe

        Filesize

        326KB

        MD5

        4efb26a1b9dce552c4b3e80113785893

        SHA1

        38a2c4a59be6210ae01a7f946cbad8f46d4cae95

        SHA256

        ec69ac553c1cfe29535726b7bd0e22427d8667c9913e319c129af3bea197a2f8

        SHA512

        03111e3e1799ba338627acdedbb56dea6b1a5c1609eaeb0e2ced61cebf131e9a7cf0195551064b3d5f04e6f41df8931406ae8b655756984a1a6adad1cdac157a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4944.exe

        Filesize

        326KB

        MD5

        4efb26a1b9dce552c4b3e80113785893

        SHA1

        38a2c4a59be6210ae01a7f946cbad8f46d4cae95

        SHA256

        ec69ac553c1cfe29535726b7bd0e22427d8667c9913e319c129af3bea197a2f8

        SHA512

        03111e3e1799ba338627acdedbb56dea6b1a5c1609eaeb0e2ced61cebf131e9a7cf0195551064b3d5f04e6f41df8931406ae8b655756984a1a6adad1cdac157a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5935.exe

        Filesize

        384KB

        MD5

        c3123b6272329a10e02b9c08f64d3c9f

        SHA1

        53bc445e3b20483a5d9cf7e8902d41f7290701ef

        SHA256

        01507a8311b22451924c011130545fa373acdf46982bdbb7aea4b3a3325d6456

        SHA512

        832b4b62c1e713cdd8ae0af47d0cc050260105a3c10aff1fb3aeb20ca9de7c5dd010273b472ae9a9a3bce1355457e3024993dc39067e43ce563e3826f0e97fd7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5935.exe

        Filesize

        384KB

        MD5

        c3123b6272329a10e02b9c08f64d3c9f

        SHA1

        53bc445e3b20483a5d9cf7e8902d41f7290701ef

        SHA256

        01507a8311b22451924c011130545fa373acdf46982bdbb7aea4b3a3325d6456

        SHA512

        832b4b62c1e713cdd8ae0af47d0cc050260105a3c10aff1fb3aeb20ca9de7c5dd010273b472ae9a9a3bce1355457e3024993dc39067e43ce563e3826f0e97fd7

      • memory/540-1122-0x00000000059C0000-0x00000000059D0000-memory.dmp

        Filesize

        64KB

      • memory/540-1121-0x0000000000D80000-0x0000000000DB2000-memory.dmp

        Filesize

        200KB

      • memory/1008-227-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-1104-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/1008-1115-0x000000000A0E0000-0x000000000A60C000-memory.dmp

        Filesize

        5.2MB

      • memory/1008-1114-0x0000000009F10000-0x000000000A0D2000-memory.dmp

        Filesize

        1.8MB

      • memory/1008-1113-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/1008-1112-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/1008-1111-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/1008-1110-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/1008-1109-0x0000000008BB0000-0x0000000008C00000-memory.dmp

        Filesize

        320KB

      • memory/1008-1108-0x0000000008B20000-0x0000000008B96000-memory.dmp

        Filesize

        472KB

      • memory/1008-1107-0x0000000008420000-0x0000000008486000-memory.dmp

        Filesize

        408KB

      • memory/1008-1106-0x0000000008380000-0x0000000008412000-memory.dmp

        Filesize

        584KB

      • memory/1008-1103-0x0000000008090000-0x00000000080CC000-memory.dmp

        Filesize

        240KB

      • memory/1008-1102-0x0000000008070000-0x0000000008082000-memory.dmp

        Filesize

        72KB

      • memory/1008-1101-0x0000000007F30000-0x000000000803A000-memory.dmp

        Filesize

        1.0MB

      • memory/1008-1100-0x00000000078D0000-0x0000000007EE8000-memory.dmp

        Filesize

        6.1MB

      • memory/1008-225-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-223-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-221-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-219-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-192-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-191-0x0000000002CA0000-0x0000000002CEB000-memory.dmp

        Filesize

        300KB

      • memory/1008-190-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-193-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/1008-194-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/1008-196-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/1008-197-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-199-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-201-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-203-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-205-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-207-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-209-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-211-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-213-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-215-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/1008-217-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/2120-173-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-181-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

        Filesize

        64KB

      • memory/2120-185-0x0000000000400000-0x0000000002B7F000-memory.dmp

        Filesize

        39.5MB

      • memory/2120-183-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

        Filesize

        64KB

      • memory/2120-152-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-182-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

        Filesize

        64KB

      • memory/2120-175-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-180-0x0000000000400000-0x0000000002B7F000-memory.dmp

        Filesize

        39.5MB

      • memory/2120-179-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-157-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-155-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-177-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-165-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-171-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-169-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-167-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-153-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-163-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-161-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-159-0x0000000004CA0000-0x0000000004CB2000-memory.dmp

        Filesize

        72KB

      • memory/2120-150-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

        Filesize

        64KB

      • memory/2120-151-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

        Filesize

        64KB

      • memory/2120-149-0x0000000002C70000-0x0000000002C9D000-memory.dmp

        Filesize

        180KB

      • memory/2120-148-0x0000000007210000-0x00000000077B4000-memory.dmp

        Filesize

        5.6MB