Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    96s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 22:34

General

  • Target

    ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe

  • Size

    700KB

  • MD5

    2f15f86c63100defdfcc67771b7086ce

  • SHA1

    3d982b5478c9ceffdb2635d0723aca5aa985bcea

  • SHA256

    ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2

  • SHA512

    16f4aca15a3f5c22af5e0f23e39b877089ee0040001aeb0775dd2f1e0a0780d018ecb08ca43a8b78bbf39f7f623e1fac48f4f124612c799bb21820f9c5bb19af

  • SSDEEP

    12288:0Mr/y90SxVu899HbB0/L9DMjcA3yyBj8F3BDXV7Gg8icIAhe5CVrnXqnPpQP+k:TyvxYMVaY3yyBj8V2guIKEaV

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe
    "C:\Users\Admin\AppData\Local\Temp\ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un889893.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un889893.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8245.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8245.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:992
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 1044
          4⤵
          • Program crash
          PID:3912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1514.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1514.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3824
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 1328
          4⤵
          • Program crash
          PID:4192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538695.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538695.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4068
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 992 -ip 992
    1⤵
      PID:3816
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3824 -ip 3824
      1⤵
        PID:816

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538695.exe

        Filesize

        175KB

        MD5

        f828658358673b1b17a02e5639814a22

        SHA1

        31f1f17c0b240cbcce8f3900bf61782938292bdc

        SHA256

        c8895fc57cb88891b4348ab4c238e03aba65d8f98e1bbf8cf1d8788db40d87d5

        SHA512

        e38b7224ae54688b0ba3ef0beb221f62362aa7342d5424414c136fe11d60abdd7f8f5d3f7540757e735a062d68b5d31b112d5642d53fcc60f70d962f24c68665

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538695.exe

        Filesize

        175KB

        MD5

        f828658358673b1b17a02e5639814a22

        SHA1

        31f1f17c0b240cbcce8f3900bf61782938292bdc

        SHA256

        c8895fc57cb88891b4348ab4c238e03aba65d8f98e1bbf8cf1d8788db40d87d5

        SHA512

        e38b7224ae54688b0ba3ef0beb221f62362aa7342d5424414c136fe11d60abdd7f8f5d3f7540757e735a062d68b5d31b112d5642d53fcc60f70d962f24c68665

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un889893.exe

        Filesize

        558KB

        MD5

        50e37e73b6ec71e51e7d18869a1bbea7

        SHA1

        45b0749c26b34e29a35b3e7ddcf773320a01b3bb

        SHA256

        b73583d5c2dd36e253164c445b22fd3375b0d857dace1c0c6fe9756e7207efb0

        SHA512

        bdf01bbc3a9c58a0e95928d5d0b6319d2f7a259882683101cc9551989285b64f3b92f7174566efe9b50dc9a07ca0acb6bbd7582142ac656faa38e987d2c73723

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un889893.exe

        Filesize

        558KB

        MD5

        50e37e73b6ec71e51e7d18869a1bbea7

        SHA1

        45b0749c26b34e29a35b3e7ddcf773320a01b3bb

        SHA256

        b73583d5c2dd36e253164c445b22fd3375b0d857dace1c0c6fe9756e7207efb0

        SHA512

        bdf01bbc3a9c58a0e95928d5d0b6319d2f7a259882683101cc9551989285b64f3b92f7174566efe9b50dc9a07ca0acb6bbd7582142ac656faa38e987d2c73723

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8245.exe

        Filesize

        307KB

        MD5

        675ac5bca3b36557109fadab48c21754

        SHA1

        a7b049229db0a6db4cf617ea39ac4110019a8be0

        SHA256

        48f28188f7d3e52f0c9d6bcf9c528a4ac3443833d996e2b139329a2e0ee589b0

        SHA512

        43bf90074da53ef61baca31ddbfd94d1ebbd52c540b07ff6374d8ab527188c07dde9a37abd58eb293171718f257de60b0c2b04137d6a1136643057e377e5e727

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8245.exe

        Filesize

        307KB

        MD5

        675ac5bca3b36557109fadab48c21754

        SHA1

        a7b049229db0a6db4cf617ea39ac4110019a8be0

        SHA256

        48f28188f7d3e52f0c9d6bcf9c528a4ac3443833d996e2b139329a2e0ee589b0

        SHA512

        43bf90074da53ef61baca31ddbfd94d1ebbd52c540b07ff6374d8ab527188c07dde9a37abd58eb293171718f257de60b0c2b04137d6a1136643057e377e5e727

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1514.exe

        Filesize

        365KB

        MD5

        d8f3f9055846a3b22df80ab7eb7d4c05

        SHA1

        b9a0213988e5dac0669fa0f33ec894543f06b63e

        SHA256

        68a9d7629028cc4c8ce7ec227f6f9b039ff60c0519c4a63862d8b76d7ba5c7cc

        SHA512

        ff6fee222ab31f3f9829e00aadb93eb92f40eb12c5667596bbf34b97def4197e7a4449d3ea66bedc88387f3e89b55fc2b242de01359ac04b921edce09b72de05

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1514.exe

        Filesize

        365KB

        MD5

        d8f3f9055846a3b22df80ab7eb7d4c05

        SHA1

        b9a0213988e5dac0669fa0f33ec894543f06b63e

        SHA256

        68a9d7629028cc4c8ce7ec227f6f9b039ff60c0519c4a63862d8b76d7ba5c7cc

        SHA512

        ff6fee222ab31f3f9829e00aadb93eb92f40eb12c5667596bbf34b97def4197e7a4449d3ea66bedc88387f3e89b55fc2b242de01359ac04b921edce09b72de05

      • memory/992-148-0x0000000004E40000-0x00000000053E4000-memory.dmp

        Filesize

        5.6MB

      • memory/992-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/992-150-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/992-151-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/992-152-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-153-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-155-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-159-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-157-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-161-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-163-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-165-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-167-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-169-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-171-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-173-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-175-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-177-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-179-0x00000000023A0000-0x00000000023B2000-memory.dmp

        Filesize

        72KB

      • memory/992-180-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/992-181-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/992-182-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/992-183-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/992-185-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/3824-190-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-191-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-193-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-195-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-197-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-202-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/3824-200-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/3824-204-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/3824-206-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/3824-207-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-203-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-199-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-209-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-211-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-213-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-215-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-217-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-219-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-221-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-223-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-225-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-227-0x0000000005290000-0x00000000052CF000-memory.dmp

        Filesize

        252KB

      • memory/3824-1100-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/3824-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/3824-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/3824-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/3824-1104-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/3824-1105-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/3824-1106-0x0000000006620000-0x00000000066B2000-memory.dmp

        Filesize

        584KB

      • memory/3824-1108-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/3824-1109-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/3824-1110-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/3824-1111-0x0000000006840000-0x00000000068B6000-memory.dmp

        Filesize

        472KB

      • memory/3824-1112-0x00000000068C0000-0x0000000006910000-memory.dmp

        Filesize

        320KB

      • memory/3824-1113-0x0000000006A40000-0x0000000006C02000-memory.dmp

        Filesize

        1.8MB

      • memory/3824-1114-0x0000000006C10000-0x000000000713C000-memory.dmp

        Filesize

        5.2MB

      • memory/3824-1115-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/4068-1121-0x0000000000660000-0x0000000000692000-memory.dmp

        Filesize

        200KB

      • memory/4068-1122-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB