Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    50s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/03/2023, 22:27

General

  • Target

    ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe

  • Size

    700KB

  • MD5

    a949f037cb29e0b2d934dbd6b1f380ac

  • SHA1

    77b2f3d3d8f4557020dbfe5446aa211e8c4ad243

  • SHA256

    ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf

  • SHA512

    1673e51bcf020887c47572e9655ce9e5106bdc34507fac082176a35731c937f85f41f66ef20cd9aeac7ffb7a63e9318891dc8d74f91857039cc7aa647d1cf96b

  • SSDEEP

    12288:XMrly9073lIrvuRHMUo9D7FcAfDdiWYs/qWofjyLDRs/NT+KGYU:OyGATxhH/gOPRs/Nw

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe
    "C:\Users\Admin\AppData\Local\Temp\ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384265.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384265.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2181.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2181.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4017.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4017.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si366662.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si366662.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si366662.exe

    Filesize

    175KB

    MD5

    d04ef6d9765653b790fa59b2a4ba43dc

    SHA1

    bd87e68e7a075869eed99097c822119499510a33

    SHA256

    3896fd0d5cd6fe5d7556b8afb399c68436bf9e02fcb82ab19e2a67ce0548fa4f

    SHA512

    2b4f209628231f610df4579d4dc491ffe6918e4c83cd63b0b1d37c2c8d60bb4309114c2844c0901e86665bd754fdfc5904945b5089ee8cabc0cd2752423e622a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si366662.exe

    Filesize

    175KB

    MD5

    d04ef6d9765653b790fa59b2a4ba43dc

    SHA1

    bd87e68e7a075869eed99097c822119499510a33

    SHA256

    3896fd0d5cd6fe5d7556b8afb399c68436bf9e02fcb82ab19e2a67ce0548fa4f

    SHA512

    2b4f209628231f610df4579d4dc491ffe6918e4c83cd63b0b1d37c2c8d60bb4309114c2844c0901e86665bd754fdfc5904945b5089ee8cabc0cd2752423e622a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384265.exe

    Filesize

    558KB

    MD5

    140291d5c33afaced365080fcb3fd8b4

    SHA1

    ee1406fa91ac72c7284004904c71f560f13ee436

    SHA256

    6db6d72ddf31d948982de4872f4e07fd4949b66ad518b720a6ef99003613c33d

    SHA512

    d82487c4e7bd32da600a54fd1fd6316c1fdd06359ed66d4e0537334fbeb3b718b9e1b917715c658d4a1cfb937ea53f2a0c75eeb0939ad174df7d62f71b6d943e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384265.exe

    Filesize

    558KB

    MD5

    140291d5c33afaced365080fcb3fd8b4

    SHA1

    ee1406fa91ac72c7284004904c71f560f13ee436

    SHA256

    6db6d72ddf31d948982de4872f4e07fd4949b66ad518b720a6ef99003613c33d

    SHA512

    d82487c4e7bd32da600a54fd1fd6316c1fdd06359ed66d4e0537334fbeb3b718b9e1b917715c658d4a1cfb937ea53f2a0c75eeb0939ad174df7d62f71b6d943e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2181.exe

    Filesize

    307KB

    MD5

    a47121bc3791d827c0fecc5473639b4c

    SHA1

    6960349e99dbd445feebfb36fc1cf989a74e3bf1

    SHA256

    a535d7e96d86edd081ac37dc759e541e60a13d14b17dcc995065e6bda48eb03f

    SHA512

    81de82433bc23e2b8c4b7d6d224adece713ef68ff148b0fcdfeeae301d0ec86355a57d751edc27a39ef45f1f07365cee8fda3218430bac0df475c9c75e3e9f81

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2181.exe

    Filesize

    307KB

    MD5

    a47121bc3791d827c0fecc5473639b4c

    SHA1

    6960349e99dbd445feebfb36fc1cf989a74e3bf1

    SHA256

    a535d7e96d86edd081ac37dc759e541e60a13d14b17dcc995065e6bda48eb03f

    SHA512

    81de82433bc23e2b8c4b7d6d224adece713ef68ff148b0fcdfeeae301d0ec86355a57d751edc27a39ef45f1f07365cee8fda3218430bac0df475c9c75e3e9f81

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4017.exe

    Filesize

    365KB

    MD5

    6b516fe1627cc0f4bdcd429bcf26c573

    SHA1

    9a49c9c2baf04d71f15067c83d02f09de69bca1a

    SHA256

    6f5a70744563cb37e9ceda36fc7c0d2f4fb3b13fd692931ef6327b71cc292006

    SHA512

    4265e85c97888689afa3eb90a9325f387c2c4df8cb20f63f1bedfcd7b3ec88e781b6d368972c53bd6a201c73a1967071608e4203766df8e344a2fe784731be2a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4017.exe

    Filesize

    365KB

    MD5

    6b516fe1627cc0f4bdcd429bcf26c573

    SHA1

    9a49c9c2baf04d71f15067c83d02f09de69bca1a

    SHA256

    6f5a70744563cb37e9ceda36fc7c0d2f4fb3b13fd692931ef6327b71cc292006

    SHA512

    4265e85c97888689afa3eb90a9325f387c2c4df8cb20f63f1bedfcd7b3ec88e781b6d368972c53bd6a201c73a1967071608e4203766df8e344a2fe784731be2a

  • memory/3480-1090-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/3480-1091-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/3480-1104-0x0000000006870000-0x0000000006D9C000-memory.dmp

    Filesize

    5.2MB

  • memory/3480-1103-0x00000000066A0000-0x0000000006862000-memory.dmp

    Filesize

    1.8MB

  • memory/3480-190-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-1102-0x0000000006500000-0x0000000006550000-memory.dmp

    Filesize

    320KB

  • memory/3480-1101-0x0000000006460000-0x00000000064D6000-memory.dmp

    Filesize

    472KB

  • memory/3480-1100-0x00000000063C0000-0x0000000006452000-memory.dmp

    Filesize

    584KB

  • memory/3480-194-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-1098-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/3480-1097-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/3480-1096-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/3480-1094-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/3480-1093-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/3480-1092-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/3480-1089-0x0000000005230000-0x0000000005836000-memory.dmp

    Filesize

    6.0MB

  • memory/3480-245-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/3480-248-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/3480-244-0x0000000000A50000-0x0000000000A60000-memory.dmp

    Filesize

    64KB

  • memory/3480-242-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/3480-212-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-210-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-208-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-206-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-177-0x0000000002600000-0x0000000002646000-memory.dmp

    Filesize

    280KB

  • memory/3480-178-0x00000000051D0000-0x0000000005214000-memory.dmp

    Filesize

    272KB

  • memory/3480-179-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-180-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-182-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-184-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-186-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-188-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-204-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-196-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-1099-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/3480-192-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-198-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-200-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3480-202-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4136-147-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-157-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-137-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4136-172-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4136-170-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4136-169-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4136-168-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4136-167-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-165-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-163-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-135-0x0000000004E60000-0x000000000535E000-memory.dmp

    Filesize

    5.0MB

  • memory/4136-138-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4136-161-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-141-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-136-0x00000000025D0000-0x00000000025E8000-memory.dmp

    Filesize

    96KB

  • memory/4136-153-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-159-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-151-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-149-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-143-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-145-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-155-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-140-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/4136-139-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4136-134-0x00000000021D0000-0x00000000021EA000-memory.dmp

    Filesize

    104KB

  • memory/4136-133-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/4848-1110-0x0000000000190000-0x00000000001C2000-memory.dmp

    Filesize

    200KB

  • memory/4848-1111-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/4848-1112-0x0000000004BD0000-0x0000000004C1B000-memory.dmp

    Filesize

    300KB