Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    56s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 15:35

General

  • Target

    d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe

  • Size

    699KB

  • MD5

    3840bafe9b89587dc6d34e67d47164eb

  • SHA1

    0e0c0ebbb7cb22fb000e7443e33443b334a96199

  • SHA256

    d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66

  • SHA512

    43b668818b0b02e5f994151e52ce9edda8be61a6b51c73a242b058a7283f658479fdf00ac129829fd3771c0e2d01ec0de3621cdbd2dbc5dccfb712bcdd2d1374

  • SSDEEP

    12288:aMrfy90YfWoEoXH/NWoAZquN9X6uLHTHBRvqKSxSO5Rw2Wa3vZ7:FyLl8n9nHTH+KSoiRJ/3vp

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe
    "C:\Users\Admin\AppData\Local\Temp\d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un757991.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un757991.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6294.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6294.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2268
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 1080
          4⤵
          • Program crash
          PID:324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0324.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0324.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4848
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 1784
          4⤵
          • Program crash
          PID:2108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797257.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797257.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2268 -ip 2268
    1⤵
      PID:2656
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4848 -ip 4848
      1⤵
        PID:3440

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797257.exe

        Filesize

        175KB

        MD5

        2cb621148319048fa3a0a4c9afad2268

        SHA1

        770f83503ace26c2a67bf61dc9d94e8e622f3879

        SHA256

        2edca9d8f79748fe8b9f85f417e922adec4631c9f7546cc22d45810b40d542ef

        SHA512

        b83efd0b5ca38935b8b5c10f8531dd7c8cdc7f5b237dea79d4414e70f807839878277e417d51611f5d52f81b74ecd3fd1bc13af263b21798e4d26debe22cdc0f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797257.exe

        Filesize

        175KB

        MD5

        2cb621148319048fa3a0a4c9afad2268

        SHA1

        770f83503ace26c2a67bf61dc9d94e8e622f3879

        SHA256

        2edca9d8f79748fe8b9f85f417e922adec4631c9f7546cc22d45810b40d542ef

        SHA512

        b83efd0b5ca38935b8b5c10f8531dd7c8cdc7f5b237dea79d4414e70f807839878277e417d51611f5d52f81b74ecd3fd1bc13af263b21798e4d26debe22cdc0f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un757991.exe

        Filesize

        557KB

        MD5

        0bfde275754351e2739bb9167df0afaa

        SHA1

        62f73f747f2f955d3f1f15595b8e12d3e3566e9a

        SHA256

        55e0f90362332cfd8afaf0cd6d358ff53b4a35b61079c9a7bb16208dd416d67e

        SHA512

        7b6d8f2b49cb94480c2749643ba3c82478ed6fa8ed49c80eb19f77193a4b47faa674f1684fd42b0640196388db083b3053f105fb4cfa612c8664062b74c8edcb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un757991.exe

        Filesize

        557KB

        MD5

        0bfde275754351e2739bb9167df0afaa

        SHA1

        62f73f747f2f955d3f1f15595b8e12d3e3566e9a

        SHA256

        55e0f90362332cfd8afaf0cd6d358ff53b4a35b61079c9a7bb16208dd416d67e

        SHA512

        7b6d8f2b49cb94480c2749643ba3c82478ed6fa8ed49c80eb19f77193a4b47faa674f1684fd42b0640196388db083b3053f105fb4cfa612c8664062b74c8edcb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6294.exe

        Filesize

        308KB

        MD5

        d5dbc1be75a2aad1a6b7a061b02c83d6

        SHA1

        4bd577bb4963d26930cf5424e27b145b09473d37

        SHA256

        f54385b9b5d8b316a631753b8e0fe2f7c3a8ba2eb25e1ce9c719d0312b1a6307

        SHA512

        37a04b852c9e31f228f444009bf9e082bbbe9bf09e30aa0e548ff6864746a872fa0600d4980721d83f53c0bb5604ddf3109d46df1a24f31182aa42cbbfe0f3b3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6294.exe

        Filesize

        308KB

        MD5

        d5dbc1be75a2aad1a6b7a061b02c83d6

        SHA1

        4bd577bb4963d26930cf5424e27b145b09473d37

        SHA256

        f54385b9b5d8b316a631753b8e0fe2f7c3a8ba2eb25e1ce9c719d0312b1a6307

        SHA512

        37a04b852c9e31f228f444009bf9e082bbbe9bf09e30aa0e548ff6864746a872fa0600d4980721d83f53c0bb5604ddf3109d46df1a24f31182aa42cbbfe0f3b3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0324.exe

        Filesize

        366KB

        MD5

        3852395950811d472d8513b62aa53be7

        SHA1

        929673aa33745f08a6b20fe58f30a0ccffe5e29a

        SHA256

        80e52d5b22a33744adc27c5534039d31d474152c88eba6f1f3af67f8859ae280

        SHA512

        bf60e55003d36d9b599fd896262d64adb6646378150cce6f5493661551c14137872cb7890b6c1c75076fc29b6110ddd130c3c6ce4f0c6df6c22fbae2914d64a3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0324.exe

        Filesize

        366KB

        MD5

        3852395950811d472d8513b62aa53be7

        SHA1

        929673aa33745f08a6b20fe58f30a0ccffe5e29a

        SHA256

        80e52d5b22a33744adc27c5534039d31d474152c88eba6f1f3af67f8859ae280

        SHA512

        bf60e55003d36d9b599fd896262d64adb6646378150cce6f5493661551c14137872cb7890b6c1c75076fc29b6110ddd130c3c6ce4f0c6df6c22fbae2914d64a3

      • memory/2268-148-0x0000000004D30000-0x00000000052D4000-memory.dmp

        Filesize

        5.6MB

      • memory/2268-149-0x0000000000810000-0x000000000083D000-memory.dmp

        Filesize

        180KB

      • memory/2268-150-0x0000000004D20000-0x0000000004D30000-memory.dmp

        Filesize

        64KB

      • memory/2268-151-0x0000000004D20000-0x0000000004D30000-memory.dmp

        Filesize

        64KB

      • memory/2268-152-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-153-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-155-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-157-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-159-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-161-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-163-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-165-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-167-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-169-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-171-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-173-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-175-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-177-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-179-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/2268-180-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/2268-181-0x0000000004D20000-0x0000000004D30000-memory.dmp

        Filesize

        64KB

      • memory/2268-182-0x0000000004D20000-0x0000000004D30000-memory.dmp

        Filesize

        64KB

      • memory/2268-183-0x0000000004D20000-0x0000000004D30000-memory.dmp

        Filesize

        64KB

      • memory/2268-185-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4720-1121-0x0000000000340000-0x0000000000372000-memory.dmp

        Filesize

        200KB

      • memory/4720-1122-0x0000000004C70000-0x0000000004C80000-memory.dmp

        Filesize

        64KB

      • memory/4848-191-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-226-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-195-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-197-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-199-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-201-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-203-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-205-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-207-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-209-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-211-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-213-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-215-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-217-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-219-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-222-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/4848-224-0x0000000002340000-0x0000000002350000-memory.dmp

        Filesize

        64KB

      • memory/4848-225-0x0000000002340000-0x0000000002350000-memory.dmp

        Filesize

        64KB

      • memory/4848-227-0x0000000002340000-0x0000000002350000-memory.dmp

        Filesize

        64KB

      • memory/4848-193-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-221-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-1100-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/4848-1101-0x0000000005AC0000-0x0000000005BCA000-memory.dmp

        Filesize

        1.0MB

      • memory/4848-1102-0x0000000005C00000-0x0000000005C12000-memory.dmp

        Filesize

        72KB

      • memory/4848-1103-0x0000000005C20000-0x0000000005C5C000-memory.dmp

        Filesize

        240KB

      • memory/4848-1104-0x0000000002340000-0x0000000002350000-memory.dmp

        Filesize

        64KB

      • memory/4848-1105-0x0000000005F10000-0x0000000005F76000-memory.dmp

        Filesize

        408KB

      • memory/4848-1106-0x00000000065D0000-0x0000000006662000-memory.dmp

        Filesize

        584KB

      • memory/4848-1108-0x0000000002340000-0x0000000002350000-memory.dmp

        Filesize

        64KB

      • memory/4848-1109-0x0000000002340000-0x0000000002350000-memory.dmp

        Filesize

        64KB

      • memory/4848-1110-0x0000000002340000-0x0000000002350000-memory.dmp

        Filesize

        64KB

      • memory/4848-1111-0x0000000002340000-0x0000000002350000-memory.dmp

        Filesize

        64KB

      • memory/4848-1112-0x0000000006810000-0x00000000069D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4848-190-0x0000000002980000-0x00000000029BE000-memory.dmp

        Filesize

        248KB

      • memory/4848-1113-0x0000000006A30000-0x0000000006F5C000-memory.dmp

        Filesize

        5.2MB

      • memory/4848-1114-0x0000000007060000-0x00000000070D6000-memory.dmp

        Filesize

        472KB

      • memory/4848-1115-0x00000000070F0000-0x0000000007140000-memory.dmp

        Filesize

        320KB