Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 22:11

General

  • Target

    dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe

  • Size

    699KB

  • MD5

    35e770f4009c1ae601474088fd8628b3

  • SHA1

    ee18e66c234001327ac4cfda8bbfcf1aeb076123

  • SHA256

    dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de

  • SHA512

    8eecd8d86f9d10378c1aa4651ab5ea00f5b29c41f20a01607b5ecd4282df63a1401614cb938e6e98d94cbe91ee645a717cea1ac091b375d39d618c3342509934

  • SSDEEP

    12288:GMrxy90yww0ZiwZjpoBLFBSqgNULCN39j7qFQgM4Dh+xeRlO:HyU7ohNGNHqFQgM4Dh+slO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe
    "C:\Users\Admin\AppData\Local\Temp\dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114202.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114202.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1444.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1444.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 1076
          4⤵
          • Program crash
          PID:1856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0442.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0442.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1232
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 1348
          4⤵
          • Program crash
          PID:1912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280982.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280982.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4724 -ip 4724
    1⤵
      PID:4904
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1232 -ip 1232
      1⤵
        PID:660

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280982.exe

        Filesize

        175KB

        MD5

        01d1c2fc57c33fdef8cd9b9d39ca5b18

        SHA1

        2429ef09a8188a2c12b6912d821553e53344ac6f

        SHA256

        03d57ad6383d4e1ab48799987c2518b6fde7706407b6f8496b942050a8eda646

        SHA512

        d2a51cdd155fba0958268e52d095c988e7170ac7f9bbb0869b1f8d7a376f82f372a691ff0d66a03ad60cb2e04f58af92b02b0ecda54e9cb1f2e51f988b78966b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280982.exe

        Filesize

        175KB

        MD5

        01d1c2fc57c33fdef8cd9b9d39ca5b18

        SHA1

        2429ef09a8188a2c12b6912d821553e53344ac6f

        SHA256

        03d57ad6383d4e1ab48799987c2518b6fde7706407b6f8496b942050a8eda646

        SHA512

        d2a51cdd155fba0958268e52d095c988e7170ac7f9bbb0869b1f8d7a376f82f372a691ff0d66a03ad60cb2e04f58af92b02b0ecda54e9cb1f2e51f988b78966b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114202.exe

        Filesize

        557KB

        MD5

        ee2dcbdd922f93b8f81c0316070acfea

        SHA1

        62e7b7bc19d835b60f6035ac176d8f7c9dd5e440

        SHA256

        574ac5861ef3db7bccb1e46f4daff92176f602a8419839b501bdb382a697923e

        SHA512

        975e74bb5d711e88d5d73e93c80fb678a2586fedde11bac9ecf0475edc1c3f3e6c8c0257bd903365f1d76d6a0ac67ce9853d4fcebd209ddeea77fdfefd5ae9e0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114202.exe

        Filesize

        557KB

        MD5

        ee2dcbdd922f93b8f81c0316070acfea

        SHA1

        62e7b7bc19d835b60f6035ac176d8f7c9dd5e440

        SHA256

        574ac5861ef3db7bccb1e46f4daff92176f602a8419839b501bdb382a697923e

        SHA512

        975e74bb5d711e88d5d73e93c80fb678a2586fedde11bac9ecf0475edc1c3f3e6c8c0257bd903365f1d76d6a0ac67ce9853d4fcebd209ddeea77fdfefd5ae9e0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1444.exe

        Filesize

        307KB

        MD5

        505b1e60079e250c220e1f26b375799c

        SHA1

        e222c436d5df59e88ae530f2cfac140304dace34

        SHA256

        52d2fba146cbcecc41a0a0f12b3807b5b45739a9d3e3cc8dd255f6495f7d86e7

        SHA512

        2c33e68203529d4965e4fdabe50df73354f993adf17e9e7d39057f0da443ad0ea1d1c7e0798632be98b328f30e8b8f0c8edc4ff3087429423091a386ceca2649

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1444.exe

        Filesize

        307KB

        MD5

        505b1e60079e250c220e1f26b375799c

        SHA1

        e222c436d5df59e88ae530f2cfac140304dace34

        SHA256

        52d2fba146cbcecc41a0a0f12b3807b5b45739a9d3e3cc8dd255f6495f7d86e7

        SHA512

        2c33e68203529d4965e4fdabe50df73354f993adf17e9e7d39057f0da443ad0ea1d1c7e0798632be98b328f30e8b8f0c8edc4ff3087429423091a386ceca2649

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0442.exe

        Filesize

        365KB

        MD5

        56ad4dac9d28322dbf841999cd8a318d

        SHA1

        e29b94acd99558cff5eff66ab9a6bdecbfa5da79

        SHA256

        4ed10e756d0839650abed7f208cd0fa09c436801443b5aaa2346c17ec18ea492

        SHA512

        a17d57504664dd1be3a760e684b960966313901b75df80f95680866f09c6e57e672e7cbd9522ca672e13716019a7c9eed9a473bb0282919c913a34998dbfcd2e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0442.exe

        Filesize

        365KB

        MD5

        56ad4dac9d28322dbf841999cd8a318d

        SHA1

        e29b94acd99558cff5eff66ab9a6bdecbfa5da79

        SHA256

        4ed10e756d0839650abed7f208cd0fa09c436801443b5aaa2346c17ec18ea492

        SHA512

        a17d57504664dd1be3a760e684b960966313901b75df80f95680866f09c6e57e672e7cbd9522ca672e13716019a7c9eed9a473bb0282919c913a34998dbfcd2e

      • memory/1232-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1232-1103-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/1232-1115-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/1232-1114-0x00000000071A0000-0x0000000007216000-memory.dmp

        Filesize

        472KB

      • memory/1232-1113-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/1232-1110-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/1232-1112-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/1232-1111-0x00000000069F0000-0x0000000006F1C000-memory.dmp

        Filesize

        5.2MB

      • memory/1232-1109-0x0000000006810000-0x00000000069D2000-memory.dmp

        Filesize

        1.8MB

      • memory/1232-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/1232-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/1232-1105-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1232-1104-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1232-204-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-1101-0x0000000005470000-0x0000000005A88000-memory.dmp

        Filesize

        6.1MB

      • memory/1232-419-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/1232-423-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/1232-421-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/1232-417-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/1232-208-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-222-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-220-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-218-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-191-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-192-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-194-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-196-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-198-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-200-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-202-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-216-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-210-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-224-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-206-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-212-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/1232-214-0x0000000004D00000-0x0000000004D3F000-memory.dmp

        Filesize

        252KB

      • memory/4116-1121-0x00000000009B0000-0x00000000009E2000-memory.dmp

        Filesize

        200KB

      • memory/4116-1123-0x00000000052C0000-0x00000000052D0000-memory.dmp

        Filesize

        64KB

      • memory/4116-1122-0x00000000052C0000-0x00000000052D0000-memory.dmp

        Filesize

        64KB

      • memory/4724-162-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-166-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-182-0x0000000002610000-0x0000000002620000-memory.dmp

        Filesize

        64KB

      • memory/4724-183-0x0000000002610000-0x0000000002620000-memory.dmp

        Filesize

        64KB

      • memory/4724-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4724-180-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-178-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-150-0x0000000002610000-0x0000000002620000-memory.dmp

        Filesize

        64KB

      • memory/4724-176-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-174-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-153-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-168-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-172-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-184-0x0000000002610000-0x0000000002620000-memory.dmp

        Filesize

        64KB

      • memory/4724-164-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-170-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-160-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-158-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-154-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-156-0x0000000002620000-0x0000000002632000-memory.dmp

        Filesize

        72KB

      • memory/4724-149-0x0000000002610000-0x0000000002620000-memory.dmp

        Filesize

        64KB

      • memory/4724-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/4724-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4724-152-0x0000000004D70000-0x0000000005314000-memory.dmp

        Filesize

        5.6MB

      • memory/4724-151-0x0000000002610000-0x0000000002620000-memory.dmp

        Filesize

        64KB