Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/03/2023, 19:56

General

  • Target

    9fe60a5b42fb2d02c4ad87145fb18dc7aa93f85008476c8e652c46a12af472ff.exe

  • Size

    720KB

  • MD5

    eef94eb752218dc311125930e28b58ea

  • SHA1

    24b8614e450da9aa96c595249d6ac502ed59b26f

  • SHA256

    9fe60a5b42fb2d02c4ad87145fb18dc7aa93f85008476c8e652c46a12af472ff

  • SHA512

    2be7ef4230d937449505e6e14911358b7fa1fd4045e02f4c03e3e456fa5919be8e6b237ed31f116f56c0f90577d525ef7fb1bd82429e547d4e10b620eb586985

  • SSDEEP

    12288:x47VVImS6LMfuycuXDJ88G0c8PMLJo85dJIctUL7x773+Z52fK6bbNVB:gS60uyXN8xGYu8pUp7K6fpbnB

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fe60a5b42fb2d02c4ad87145fb18dc7aa93f85008476c8e652c46a12af472ff.exe
    "C:\Users\Admin\AppData\Local\Temp\9fe60a5b42fb2d02c4ad87145fb18dc7aa93f85008476c8e652c46a12af472ff.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPm6414.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPm6414.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr272708.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr272708.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku276777.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku276777.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr074812.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr074812.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr074812.exe

    Filesize

    175KB

    MD5

    2476904404b3c7f26ceccbd572b4acfc

    SHA1

    faa5f8a8a3688c8ef4f40e7d555e35f8408d4561

    SHA256

    d6f452246dc8d80dfb73f4292c8eeec4033c59348b2f479d36a42e893eb0e881

    SHA512

    a3ccdc0887fd541e4fffa29a90af00baeedc30311e6dd4e0a786e5681c51a21c617dfc803e15341aca6a13bfbdd94c4d7916ab2aee164f7f15fc8ef4234a2a6b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr074812.exe

    Filesize

    175KB

    MD5

    2476904404b3c7f26ceccbd572b4acfc

    SHA1

    faa5f8a8a3688c8ef4f40e7d555e35f8408d4561

    SHA256

    d6f452246dc8d80dfb73f4292c8eeec4033c59348b2f479d36a42e893eb0e881

    SHA512

    a3ccdc0887fd541e4fffa29a90af00baeedc30311e6dd4e0a786e5681c51a21c617dfc803e15341aca6a13bfbdd94c4d7916ab2aee164f7f15fc8ef4234a2a6b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPm6414.exe

    Filesize

    410KB

    MD5

    3970651981a9788c3ecdc24db14b2364

    SHA1

    40ae2ba256685b16cff9b24a4a6e5475f8a969fa

    SHA256

    56f7aef1bafdcaa06cc234464589f623976236888178d6949ce71d4a7b9ead98

    SHA512

    dd0fca4f3f817ed67ffbcae035fa57ee513995a558d1170361e67c7669e505753d268702bd154fb58987fa06db1ad4ca019bcc79f8b8260281b5df1a096c66f2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPm6414.exe

    Filesize

    410KB

    MD5

    3970651981a9788c3ecdc24db14b2364

    SHA1

    40ae2ba256685b16cff9b24a4a6e5475f8a969fa

    SHA256

    56f7aef1bafdcaa06cc234464589f623976236888178d6949ce71d4a7b9ead98

    SHA512

    dd0fca4f3f817ed67ffbcae035fa57ee513995a558d1170361e67c7669e505753d268702bd154fb58987fa06db1ad4ca019bcc79f8b8260281b5df1a096c66f2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr272708.exe

    Filesize

    11KB

    MD5

    d0ca53edd2573f99ec6b54e391860a7e

    SHA1

    3f0dd462e293e2bb7bf12c79b1ac32ec00c774e7

    SHA256

    3939112be72ceafe74305a47754cb2e48b3ebce12068a8fa6d549180ab234f19

    SHA512

    74d07cdd3c95de593c15e925a6cf38be06b6b14dc47feeedb207b3a0fc69d563f4e5c046c05679331e3d9762197c32432b15f859e4e9ad795c0e3d4c6726b6d0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr272708.exe

    Filesize

    11KB

    MD5

    d0ca53edd2573f99ec6b54e391860a7e

    SHA1

    3f0dd462e293e2bb7bf12c79b1ac32ec00c774e7

    SHA256

    3939112be72ceafe74305a47754cb2e48b3ebce12068a8fa6d549180ab234f19

    SHA512

    74d07cdd3c95de593c15e925a6cf38be06b6b14dc47feeedb207b3a0fc69d563f4e5c046c05679331e3d9762197c32432b15f859e4e9ad795c0e3d4c6726b6d0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku276777.exe

    Filesize

    384KB

    MD5

    add093808a353d03ac106dc6937b7593

    SHA1

    bf8c91a4048025e5de2e79b14ef9e97d621ee106

    SHA256

    ce3800aec86f37c2b6273e673b8d89ecff4d8280a3d5e01642142f3f26470b07

    SHA512

    0afeb5e928fd03fce3fe97493c6b35555f87dcd0a81d43f65f423722abcb7d179128d66e96a61c1582c4701b164b1a3d05cd98b56fdc9fb4b9f62f728ffe9ca5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku276777.exe

    Filesize

    384KB

    MD5

    add093808a353d03ac106dc6937b7593

    SHA1

    bf8c91a4048025e5de2e79b14ef9e97d621ee106

    SHA256

    ce3800aec86f37c2b6273e673b8d89ecff4d8280a3d5e01642142f3f26470b07

    SHA512

    0afeb5e928fd03fce3fe97493c6b35555f87dcd0a81d43f65f423722abcb7d179128d66e96a61c1582c4701b164b1a3d05cd98b56fdc9fb4b9f62f728ffe9ca5

  • memory/3268-139-0x0000000006A40000-0x0000000006ACC000-memory.dmp

    Filesize

    560KB

  • memory/3268-140-0x0000000000400000-0x0000000002BE1000-memory.dmp

    Filesize

    39.9MB

  • memory/3700-138-0x0000000000260000-0x000000000026A000-memory.dmp

    Filesize

    40KB

  • memory/4296-1084-0x0000000004940000-0x0000000004950000-memory.dmp

    Filesize

    64KB

  • memory/4296-1083-0x0000000004AC0000-0x0000000004B0B000-memory.dmp

    Filesize

    300KB

  • memory/4296-1082-0x0000000000090000-0x00000000000C2000-memory.dmp

    Filesize

    200KB

  • memory/4860-184-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-198-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-151-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4860-152-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4860-153-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-154-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-156-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-158-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-160-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-162-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-164-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-166-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-168-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-170-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-172-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-174-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-176-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-178-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-180-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-182-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-149-0x0000000007190000-0x00000000071D4000-memory.dmp

    Filesize

    272KB

  • memory/4860-186-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-188-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-190-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-192-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-194-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-196-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-150-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4860-200-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-202-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-204-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-206-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-208-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-210-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-212-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-214-0x0000000007190000-0x00000000071CF000-memory.dmp

    Filesize

    252KB

  • memory/4860-1059-0x0000000007720000-0x0000000007D26000-memory.dmp

    Filesize

    6.0MB

  • memory/4860-1060-0x0000000007D30000-0x0000000007E3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4860-1061-0x0000000007E70000-0x0000000007E82000-memory.dmp

    Filesize

    72KB

  • memory/4860-1062-0x0000000007E90000-0x0000000007ECE000-memory.dmp

    Filesize

    248KB

  • memory/4860-1063-0x0000000007FE0000-0x000000000802B000-memory.dmp

    Filesize

    300KB

  • memory/4860-1065-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4860-1067-0x0000000008170000-0x00000000081D6000-memory.dmp

    Filesize

    408KB

  • memory/4860-1068-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4860-1069-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4860-1070-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/4860-1071-0x0000000008830000-0x00000000088C2000-memory.dmp

    Filesize

    584KB

  • memory/4860-1072-0x00000000088F0000-0x0000000008966000-memory.dmp

    Filesize

    472KB

  • memory/4860-1073-0x0000000008980000-0x00000000089D0000-memory.dmp

    Filesize

    320KB

  • memory/4860-148-0x0000000007220000-0x000000000771E000-memory.dmp

    Filesize

    5.0MB

  • memory/4860-147-0x0000000004A70000-0x0000000004AB6000-memory.dmp

    Filesize

    280KB

  • memory/4860-146-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/4860-1074-0x0000000008A00000-0x0000000008BC2000-memory.dmp

    Filesize

    1.8MB

  • memory/4860-1075-0x0000000008BE0000-0x000000000910C000-memory.dmp

    Filesize

    5.2MB