Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    99s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 11:18

General

  • Target

    097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe

  • Size

    688KB

  • MD5

    f60918781bc446d37cbb16b0177daa8b

  • SHA1

    96be892b7555c3af6e9d203e336bc22c300c5bbd

  • SHA256

    097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab

  • SHA512

    548e59e18fbde0e3047cf8e7cdfc8e0655ec050dbf790ce8c34715d14425ab86b31f470d841cb22b88551a68c4c54bb450c18216ce6aa58b403dcee12ccbaa08

  • SSDEEP

    12288:LMrSy906Edg2me+Gha0UpN9z4/8meXWZ0DEyqZsndBwyyu:pyoDMDpXz4/+G+DEjIeyyu

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe
    "C:\Users\Admin\AppData\Local\Temp\097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908128.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908128.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7796.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7796.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 1080
          4⤵
          • Program crash
          PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9238.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9238.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2760
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 1332
          4⤵
          • Program crash
          PID:944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363839.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363839.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4184
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1648 -ip 1648
    1⤵
      PID:4944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2760 -ip 2760
      1⤵
        PID:4284

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363839.exe

        Filesize

        175KB

        MD5

        278ab40e4b9fc7c647a14e1b1e255c5a

        SHA1

        0f40bd85d74c493486290b99ede81e53df952552

        SHA256

        7ff0a007c943701f4de67e06881e6cdc461d7602feb1976da383e2fc2a10ed5f

        SHA512

        b790adfd69b31893eee71c3ae31f9249968d2d147932d8939994b6b398574f820124c46dab483e85e95c474574b72889d73719d9055af460f6c36a1e5ea85698

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363839.exe

        Filesize

        175KB

        MD5

        278ab40e4b9fc7c647a14e1b1e255c5a

        SHA1

        0f40bd85d74c493486290b99ede81e53df952552

        SHA256

        7ff0a007c943701f4de67e06881e6cdc461d7602feb1976da383e2fc2a10ed5f

        SHA512

        b790adfd69b31893eee71c3ae31f9249968d2d147932d8939994b6b398574f820124c46dab483e85e95c474574b72889d73719d9055af460f6c36a1e5ea85698

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908128.exe

        Filesize

        545KB

        MD5

        43716da2475a6a4e085e81a1d7c61184

        SHA1

        a2b1506ba6caab7dd11572b9c788ac836a735855

        SHA256

        1a1818e01bb71a40d6af076901a59b2567a90c95cae6c37d6a55c0808d18468f

        SHA512

        d4b5d993fb0563c903fc849ea34e500e2cb914db806b8033543d9ecc5dc77b76221ee2268cd74660f2f3e818bf53be83abbc7af06f5ce76a7eb6a513b3c5a995

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908128.exe

        Filesize

        545KB

        MD5

        43716da2475a6a4e085e81a1d7c61184

        SHA1

        a2b1506ba6caab7dd11572b9c788ac836a735855

        SHA256

        1a1818e01bb71a40d6af076901a59b2567a90c95cae6c37d6a55c0808d18468f

        SHA512

        d4b5d993fb0563c903fc849ea34e500e2cb914db806b8033543d9ecc5dc77b76221ee2268cd74660f2f3e818bf53be83abbc7af06f5ce76a7eb6a513b3c5a995

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7796.exe

        Filesize

        300KB

        MD5

        cde7418409d40162db2d5d108665025e

        SHA1

        ab5a9ba3c001d281071e75dab8b4062b474472ca

        SHA256

        0e431e5f7c571090b0d00362eefb40a094254f57f401978c858c357755c60fae

        SHA512

        0c6be7c32015c4d7690f17b22a495e80c87117121619bd81caa06e6fa804f41baa251ca348ef13ec7336dcce0e0cbd157442b9433932769fc1f8c8636bf38ce5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7796.exe

        Filesize

        300KB

        MD5

        cde7418409d40162db2d5d108665025e

        SHA1

        ab5a9ba3c001d281071e75dab8b4062b474472ca

        SHA256

        0e431e5f7c571090b0d00362eefb40a094254f57f401978c858c357755c60fae

        SHA512

        0c6be7c32015c4d7690f17b22a495e80c87117121619bd81caa06e6fa804f41baa251ca348ef13ec7336dcce0e0cbd157442b9433932769fc1f8c8636bf38ce5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9238.exe

        Filesize

        359KB

        MD5

        1a42876776bf6235cdb4175bb59de171

        SHA1

        0c0e0de20ed07d7b84b2835bf79531f6a0283316

        SHA256

        1874bce898c85a088e02ac0126510f6b1453d7957f739cdad7a84c2b4347e315

        SHA512

        3f527ea863a52fd17dae513e814499e5f7b02a6d0ff854900f8d1dc7a3dd4ba3fdb0c2cbd313b7e8e445c272811da49d66c666222d3e8b1798d46903fd11879f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9238.exe

        Filesize

        359KB

        MD5

        1a42876776bf6235cdb4175bb59de171

        SHA1

        0c0e0de20ed07d7b84b2835bf79531f6a0283316

        SHA256

        1874bce898c85a088e02ac0126510f6b1453d7957f739cdad7a84c2b4347e315

        SHA512

        3f527ea863a52fd17dae513e814499e5f7b02a6d0ff854900f8d1dc7a3dd4ba3fdb0c2cbd313b7e8e445c272811da49d66c666222d3e8b1798d46903fd11879f

      • memory/1648-148-0x0000000004E40000-0x00000000053E4000-memory.dmp

        Filesize

        5.6MB

      • memory/1648-149-0x00000000009F0000-0x0000000000A1D000-memory.dmp

        Filesize

        180KB

      • memory/1648-151-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/1648-150-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/1648-152-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/1648-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1648-181-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/1648-182-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/1648-183-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/1648-185-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/2760-190-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-191-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-193-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-195-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-197-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-199-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-201-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-203-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-205-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-207-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-209-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-211-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-213-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-215-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-217-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-219-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-221-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-223-0x00000000027D0000-0x000000000280E000-memory.dmp

        Filesize

        248KB

      • memory/2760-407-0x00000000008E0000-0x000000000092B000-memory.dmp

        Filesize

        300KB

      • memory/2760-412-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2760-410-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2760-1099-0x00000000053F0000-0x0000000005A08000-memory.dmp

        Filesize

        6.1MB

      • memory/2760-1100-0x0000000005A10000-0x0000000005B1A000-memory.dmp

        Filesize

        1.0MB

      • memory/2760-1101-0x0000000004E10000-0x0000000004E22000-memory.dmp

        Filesize

        72KB

      • memory/2760-1102-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2760-1103-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/2760-1104-0x0000000005E10000-0x0000000005E76000-memory.dmp

        Filesize

        408KB

      • memory/2760-1105-0x00000000064E0000-0x0000000006572000-memory.dmp

        Filesize

        584KB

      • memory/2760-1107-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2760-1108-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2760-1109-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2760-1110-0x0000000007990000-0x0000000007B52000-memory.dmp

        Filesize

        1.8MB

      • memory/2760-1111-0x0000000007B60000-0x000000000808C000-memory.dmp

        Filesize

        5.2MB

      • memory/2760-1112-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2760-1113-0x0000000008110000-0x0000000008186000-memory.dmp

        Filesize

        472KB

      • memory/2760-1114-0x00000000081B0000-0x0000000008200000-memory.dmp

        Filesize

        320KB

      • memory/4184-1120-0x00000000004A0000-0x00000000004D2000-memory.dmp

        Filesize

        200KB

      • memory/4184-1121-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB