Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    48s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/03/2023, 14:59

General

  • Target

    7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe

  • Size

    685KB

  • MD5

    a8ee9a1502b7e2288c59d86a5d9d4680

  • SHA1

    84802cbc0e660db6a199359876fcafe5f12e46a4

  • SHA256

    7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816

  • SHA512

    1beeb40af2cd15b53958b9fe1258b8b2ef126303211b760772071647e7718a49768c033b71125b7c2998ae643bd1215dd0c9471e46aaceea0c1ed78f50fcea69

  • SSDEEP

    12288:qMrMy90eRis6wMJwnRbrO6SJnkyHiNF/jUHGsG/75mB6WtE15k01mfdbDb0:KyIs1MJiSNwzR/7goWtE15kT1X4

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe
    "C:\Users\Admin\AppData\Local\Temp\7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468341.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468341.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9485.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9485.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372508.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372508.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372508.exe

    Filesize

    175KB

    MD5

    7ac46aa5052e8db30c09aa0c8e63f76b

    SHA1

    79b9d9398c4f3fd8c3b0a3ff1a2f61cfb4ca033c

    SHA256

    9dedb882a9ebef66568455cf0d9a94f8d4ec0ef51f6aea805abfc4c7406e9fd9

    SHA512

    e09a42448ea0c2d834eff15619109b84127f66ea62ef2c5bb30c6e8024e584c5382d6b8550bf6da5f62a93173ba018b39cbf0fa260c67e046832275c62281cbf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372508.exe

    Filesize

    175KB

    MD5

    7ac46aa5052e8db30c09aa0c8e63f76b

    SHA1

    79b9d9398c4f3fd8c3b0a3ff1a2f61cfb4ca033c

    SHA256

    9dedb882a9ebef66568455cf0d9a94f8d4ec0ef51f6aea805abfc4c7406e9fd9

    SHA512

    e09a42448ea0c2d834eff15619109b84127f66ea62ef2c5bb30c6e8024e584c5382d6b8550bf6da5f62a93173ba018b39cbf0fa260c67e046832275c62281cbf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468341.exe

    Filesize

    543KB

    MD5

    ac6a45ae2a6298a5f7c0b74594a1582e

    SHA1

    c22664accbc376c606560bdd4fd989c9170db6d9

    SHA256

    38b59bcb47771fbaed4c3e6ae784707cc4f1390147fcc47dd10e4b638bbccfa1

    SHA512

    88f827fe8b20e5dc81ffe3a310654eda3d0da6affa14087741b6d6b6379d450ba5ab3c6d14e1143fee69735e0bede771ae1711410dae247a113d6d00c08dcced

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468341.exe

    Filesize

    543KB

    MD5

    ac6a45ae2a6298a5f7c0b74594a1582e

    SHA1

    c22664accbc376c606560bdd4fd989c9170db6d9

    SHA256

    38b59bcb47771fbaed4c3e6ae784707cc4f1390147fcc47dd10e4b638bbccfa1

    SHA512

    88f827fe8b20e5dc81ffe3a310654eda3d0da6affa14087741b6d6b6379d450ba5ab3c6d14e1143fee69735e0bede771ae1711410dae247a113d6d00c08dcced

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9485.exe

    Filesize

    292KB

    MD5

    b34b385e19e8b82d9857aec4cc3c5b79

    SHA1

    ce0fa8a16032fdd132ea9387e3c27a0407ad3aef

    SHA256

    faaadd95814ff2ddc3bf489daef955413a4bf69dc6ee166b7ac2b751c448edb1

    SHA512

    f6dfa12123b102ad928d8eaac2ed7f39b3533fc022e6c1c2adf3b263d065f2fa0a0740606626b9ba1a9e1e7431d2b0a6776c5f609a155d7d5335edf464223291

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9485.exe

    Filesize

    292KB

    MD5

    b34b385e19e8b82d9857aec4cc3c5b79

    SHA1

    ce0fa8a16032fdd132ea9387e3c27a0407ad3aef

    SHA256

    faaadd95814ff2ddc3bf489daef955413a4bf69dc6ee166b7ac2b751c448edb1

    SHA512

    f6dfa12123b102ad928d8eaac2ed7f39b3533fc022e6c1c2adf3b263d065f2fa0a0740606626b9ba1a9e1e7431d2b0a6776c5f609a155d7d5335edf464223291

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exe

    Filesize

    350KB

    MD5

    83998dc38017cb848666499b36f69a1b

    SHA1

    5446a2ad1a653e690d3a99864a37c7859a7ac9b8

    SHA256

    9d413804fd90e334663b1f66cd3343f234e6a3af3fd180ac975132e0d6013d07

    SHA512

    cee559961dbae8c7c60ba998ab355c2b121a4696286a09ba2d8dd3cd609109162963b7ff42e227d1a30a6dccfd1f312757c98f53e6660909d033eb3994e7cf8d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exe

    Filesize

    350KB

    MD5

    83998dc38017cb848666499b36f69a1b

    SHA1

    5446a2ad1a653e690d3a99864a37c7859a7ac9b8

    SHA256

    9d413804fd90e334663b1f66cd3343f234e6a3af3fd180ac975132e0d6013d07

    SHA512

    cee559961dbae8c7c60ba998ab355c2b121a4696286a09ba2d8dd3cd609109162963b7ff42e227d1a30a6dccfd1f312757c98f53e6660909d033eb3994e7cf8d

  • memory/2708-1093-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/2708-1094-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2708-1107-0x00000000069B0000-0x0000000006EDC000-memory.dmp

    Filesize

    5.2MB

  • memory/2708-1106-0x00000000067E0000-0x00000000069A2000-memory.dmp

    Filesize

    1.8MB

  • memory/2708-194-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-1105-0x0000000006780000-0x00000000067D0000-memory.dmp

    Filesize

    320KB

  • memory/2708-1104-0x00000000066F0000-0x0000000006766000-memory.dmp

    Filesize

    472KB

  • memory/2708-1103-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2708-198-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-1101-0x00000000056F0000-0x0000000005782000-memory.dmp

    Filesize

    584KB

  • memory/2708-1100-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2708-1099-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2708-1098-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2708-1096-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/2708-1095-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/2708-1092-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/2708-1091-0x0000000005870000-0x0000000005E76000-memory.dmp

    Filesize

    6.0MB

  • memory/2708-218-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-215-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2708-216-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-213-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2708-210-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2708-212-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-179-0x0000000004C10000-0x0000000004C56000-memory.dmp

    Filesize

    280KB

  • memory/2708-180-0x0000000004C90000-0x0000000004CD4000-memory.dmp

    Filesize

    272KB

  • memory/2708-181-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-182-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-184-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-186-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-188-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-190-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-192-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-208-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-200-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-1102-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/2708-196-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-202-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-204-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-206-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2708-209-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/4804-1113-0x0000000000410000-0x0000000000442000-memory.dmp

    Filesize

    200KB

  • memory/4804-1115-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/4804-1114-0x0000000004E50000-0x0000000004E9B000-memory.dmp

    Filesize

    300KB

  • memory/4924-150-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-154-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-171-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/4924-170-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-168-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-166-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-138-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4924-141-0x0000000004CE0000-0x00000000051DE000-memory.dmp

    Filesize

    5.0MB

  • memory/4924-164-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-162-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-144-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-156-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-160-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-172-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4924-152-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-158-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-148-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-146-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-143-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4924-142-0x0000000004C40000-0x0000000004C58000-memory.dmp

    Filesize

    96KB

  • memory/4924-137-0x0000000002500000-0x000000000251A000-memory.dmp

    Filesize

    104KB

  • memory/4924-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4924-174-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/4924-140-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4924-139-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB