Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 14:47

General

  • Target

    11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe

  • Size

    685KB

  • MD5

    2d289dfe316bd8f40e108e165086e671

  • SHA1

    d58173d21c36d85cd6aa7b8d05dbdc81e1b8dace

  • SHA256

    11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7

  • SHA512

    75ab67944d5c6dc8e2f93f8015ba8f84f6007041b19fdff6b970deeb5cbf059fa9d875bbe59a382f56543fa1e644e9e17f87597f1d4a4dbf24cfd7140be2407c

  • SSDEEP

    12288:ZMrky900KfE6bkKM64p7n29As8hyzjodIP9pQwbmjTySIBrksETkgH/+I3iL:ByofE6bkDtpL5yzjTVWVjT8hksETkgJq

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe
    "C:\Users\Admin\AppData\Local\Temp\11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4328
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un242058.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un242058.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8084.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8084.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2512
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 1092
          4⤵
          • Program crash
          PID:3188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0710.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0710.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3496
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 2024
          4⤵
          • Program crash
          PID:3592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125970.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125970.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4632
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2512 -ip 2512
    1⤵
      PID:3880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3496 -ip 3496
      1⤵
        PID:4580

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125970.exe

        Filesize

        175KB

        MD5

        841b7357cfc8f8918cb7df4c39263aae

        SHA1

        e9661250d32a5b14d26adc82749932187002d438

        SHA256

        76b4609cd57ab982a0301beaad76374580389275bffa946605c642f9bde57f16

        SHA512

        a53439d7599998a5565dc38d959769951ad9c869d1bfdf3166b197044c3f1734c82b3e7c20950fef1ed5090727ab56b80b35c527847fdaee588b4bbe8ef11579

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125970.exe

        Filesize

        175KB

        MD5

        841b7357cfc8f8918cb7df4c39263aae

        SHA1

        e9661250d32a5b14d26adc82749932187002d438

        SHA256

        76b4609cd57ab982a0301beaad76374580389275bffa946605c642f9bde57f16

        SHA512

        a53439d7599998a5565dc38d959769951ad9c869d1bfdf3166b197044c3f1734c82b3e7c20950fef1ed5090727ab56b80b35c527847fdaee588b4bbe8ef11579

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un242058.exe

        Filesize

        543KB

        MD5

        f3cae483658b7f6a25fa3c7f6c3b9b9a

        SHA1

        c7bb21a389d23b105a991fa43ca28634b0af1f68

        SHA256

        73dce7ae45f8b806b2712ac5baf0ffef1985cf8a9b7265b24bc933d6ea28cdcd

        SHA512

        f5773f6d5f8d8609c9dc04d147fc7ef30f89d27fec80dcf0c45add96279ae3cee2ef156eda6b1f728b79f8b44278f770765f6adfcffe48c4a8ba2dfb6dc14118

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un242058.exe

        Filesize

        543KB

        MD5

        f3cae483658b7f6a25fa3c7f6c3b9b9a

        SHA1

        c7bb21a389d23b105a991fa43ca28634b0af1f68

        SHA256

        73dce7ae45f8b806b2712ac5baf0ffef1985cf8a9b7265b24bc933d6ea28cdcd

        SHA512

        f5773f6d5f8d8609c9dc04d147fc7ef30f89d27fec80dcf0c45add96279ae3cee2ef156eda6b1f728b79f8b44278f770765f6adfcffe48c4a8ba2dfb6dc14118

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8084.exe

        Filesize

        292KB

        MD5

        87702ace7043d23ff88045fa8e9f7f89

        SHA1

        34acfcc199fda51360ae7e8fc844398c3944798a

        SHA256

        46a140f84aabf0f80b12f625d8f8f7d3386d618f1ca18cedfbf3f4a27673e32b

        SHA512

        6b5d7eeeeddcfd2d86b9318009c957b7f8b15f72c2083204637379dfa480892e4fc6fa27697525bf4b31e2d7cbf79c59abd44cf988856542e621e5743b0f45ac

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8084.exe

        Filesize

        292KB

        MD5

        87702ace7043d23ff88045fa8e9f7f89

        SHA1

        34acfcc199fda51360ae7e8fc844398c3944798a

        SHA256

        46a140f84aabf0f80b12f625d8f8f7d3386d618f1ca18cedfbf3f4a27673e32b

        SHA512

        6b5d7eeeeddcfd2d86b9318009c957b7f8b15f72c2083204637379dfa480892e4fc6fa27697525bf4b31e2d7cbf79c59abd44cf988856542e621e5743b0f45ac

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0710.exe

        Filesize

        350KB

        MD5

        ae3330a4fa1c3a69f956c1908bc2bba8

        SHA1

        feeef79bcad7e615b307f85ac3e500d875b97674

        SHA256

        793cf058c43cb0c75fb7823ebc4253cbd08871bd6ca9db4a7db1aa4da05e11ff

        SHA512

        4174fbe888ae183d1d6d66e4406df5112609e169b16ccd4c3dfb5156299c74e537621ce841374acdf3f503c7470e67e69587c9ac80656c70dd4be410fde6193b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0710.exe

        Filesize

        350KB

        MD5

        ae3330a4fa1c3a69f956c1908bc2bba8

        SHA1

        feeef79bcad7e615b307f85ac3e500d875b97674

        SHA256

        793cf058c43cb0c75fb7823ebc4253cbd08871bd6ca9db4a7db1aa4da05e11ff

        SHA512

        4174fbe888ae183d1d6d66e4406df5112609e169b16ccd4c3dfb5156299c74e537621ce841374acdf3f503c7470e67e69587c9ac80656c70dd4be410fde6193b

      • memory/2512-148-0x0000000004E40000-0x00000000053E4000-memory.dmp

        Filesize

        5.6MB

      • memory/2512-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/2512-150-0x00000000025F0000-0x0000000002600000-memory.dmp

        Filesize

        64KB

      • memory/2512-151-0x00000000025F0000-0x0000000002600000-memory.dmp

        Filesize

        64KB

      • memory/2512-154-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-153-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-156-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-152-0x00000000025F0000-0x0000000002600000-memory.dmp

        Filesize

        64KB

      • memory/2512-158-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-160-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-162-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-164-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-166-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-168-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-170-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-172-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-174-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-176-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-178-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-180-0x0000000002760000-0x0000000002772000-memory.dmp

        Filesize

        72KB

      • memory/2512-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2512-182-0x00000000025F0000-0x0000000002600000-memory.dmp

        Filesize

        64KB

      • memory/2512-183-0x00000000025F0000-0x0000000002600000-memory.dmp

        Filesize

        64KB

      • memory/2512-184-0x00000000025F0000-0x0000000002600000-memory.dmp

        Filesize

        64KB

      • memory/2512-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/3496-191-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-192-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-194-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-196-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-199-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/3496-198-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-201-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/3496-202-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-203-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/3496-205-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-207-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-209-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-211-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-213-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-215-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-217-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-219-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-221-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-223-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-225-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-227-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3496-1100-0x0000000005420000-0x0000000005A38000-memory.dmp

        Filesize

        6.1MB

      • memory/3496-1101-0x0000000005A40000-0x0000000005B4A000-memory.dmp

        Filesize

        1.0MB

      • memory/3496-1102-0x0000000004E10000-0x0000000004E22000-memory.dmp

        Filesize

        72KB

      • memory/3496-1103-0x0000000005B50000-0x0000000005B8C000-memory.dmp

        Filesize

        240KB

      • memory/3496-1104-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/3496-1105-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/3496-1106-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/3496-1108-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/3496-1109-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/3496-1110-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/3496-1111-0x00000000066D0000-0x0000000006892000-memory.dmp

        Filesize

        1.8MB

      • memory/3496-1112-0x0000000006AB0000-0x0000000006FDC000-memory.dmp

        Filesize

        5.2MB

      • memory/3496-1113-0x0000000007100000-0x0000000007176000-memory.dmp

        Filesize

        472KB

      • memory/3496-1114-0x00000000071A0000-0x00000000071F0000-memory.dmp

        Filesize

        320KB

      • memory/3496-1115-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/4632-1121-0x0000000000730000-0x0000000000762000-memory.dmp

        Filesize

        200KB

      • memory/4632-1122-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB