Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    60s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/03/2023, 15:02

General

  • Target

    da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe

  • Size

    685KB

  • MD5

    7170710f160f0080d02b94779a53f277

  • SHA1

    378638fbb9579bd46f635058e11001cb7e4f676a

  • SHA256

    da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02

  • SHA512

    2d4499789d8912ec79b18e6881155cc7ccb65b3827a08a9da7d63979f24e5737870c0c565e8bdd0c535b924b6984b332d352480e364223811856b77495af170e

  • SSDEEP

    12288:rMrmy90iIeroQM2rTLszDLjGD7M9XjRBIBrRwEJo44zWlfA5q:FyoNt2rMzDHGY9TQhRwEJobYA5q

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe
    "C:\Users\Admin\AppData\Local\Temp\da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un218721.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un218721.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5117.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5117.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si294742.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si294742.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si294742.exe

    Filesize

    175KB

    MD5

    da5b23e7498c4b200a0fbf4679f05989

    SHA1

    3afcdaaa40db40ca098fcfd2a645fa0f89e2d1a7

    SHA256

    90d6b56ec18ace6c2fb36785fb49e32c41786feac8d4dbae1744b1e692a8a476

    SHA512

    8f78ef03de02fdee3bf9ebed6a5c6ad22948f111774d5d8eafb947db242859050be1419072665b504c047f0ca5fbb89af4eaed61bcf7b7e8e3905bf2e368fd5d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si294742.exe

    Filesize

    175KB

    MD5

    da5b23e7498c4b200a0fbf4679f05989

    SHA1

    3afcdaaa40db40ca098fcfd2a645fa0f89e2d1a7

    SHA256

    90d6b56ec18ace6c2fb36785fb49e32c41786feac8d4dbae1744b1e692a8a476

    SHA512

    8f78ef03de02fdee3bf9ebed6a5c6ad22948f111774d5d8eafb947db242859050be1419072665b504c047f0ca5fbb89af4eaed61bcf7b7e8e3905bf2e368fd5d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un218721.exe

    Filesize

    543KB

    MD5

    6664cc6e85579782686b9fd9355bcaf9

    SHA1

    904af2e783e998ba7c1e099beb88143b8200a81e

    SHA256

    f6967dbd944c68eb43fa559117e7ac032f8e82c3f98237b6a1a55c19f7339481

    SHA512

    ad149859057e78b44f06d97d432b318f7211a89afeee31bc1469d5e123e7317cb0ad9ecbcb86e7c3ad429c2f0ad64617a96541204934ad6165d564b854b41f5b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un218721.exe

    Filesize

    543KB

    MD5

    6664cc6e85579782686b9fd9355bcaf9

    SHA1

    904af2e783e998ba7c1e099beb88143b8200a81e

    SHA256

    f6967dbd944c68eb43fa559117e7ac032f8e82c3f98237b6a1a55c19f7339481

    SHA512

    ad149859057e78b44f06d97d432b318f7211a89afeee31bc1469d5e123e7317cb0ad9ecbcb86e7c3ad429c2f0ad64617a96541204934ad6165d564b854b41f5b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5117.exe

    Filesize

    292KB

    MD5

    84b380b921d80ac66ba528e01b0993cf

    SHA1

    115df9271278cacf4d4b448c8cf245eea9eee0a4

    SHA256

    d0251391171a173fcab1643e613b689895212cada022a920f2c81973abecb8fb

    SHA512

    fd990011dc8a6e4d61c179361a7361bfac7aecb997c7c4e5e720c8b6f74e356dbf145884ecb0df1e5973a40845a215de339ab8cc24bc87ddc8c9ea8e23d7287f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5117.exe

    Filesize

    292KB

    MD5

    84b380b921d80ac66ba528e01b0993cf

    SHA1

    115df9271278cacf4d4b448c8cf245eea9eee0a4

    SHA256

    d0251391171a173fcab1643e613b689895212cada022a920f2c81973abecb8fb

    SHA512

    fd990011dc8a6e4d61c179361a7361bfac7aecb997c7c4e5e720c8b6f74e356dbf145884ecb0df1e5973a40845a215de339ab8cc24bc87ddc8c9ea8e23d7287f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exe

    Filesize

    350KB

    MD5

    ce5af866ae9e169e5a87381daaf86b65

    SHA1

    7f7fae1eb4192ff8a1b1173b24366ae8c3b47f1f

    SHA256

    9127aa7c607a089361ba587e47d256025b26bff9b8521342fac7806a63daf6ce

    SHA512

    22fae1ac6db8a854ab49f2b8d79d8877e54521c182561af576ce8d3e0b0c0580120ce07d178ef36f814916487655a581e8e2991a5af4248c05da2fd24439f7a2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exe

    Filesize

    350KB

    MD5

    ce5af866ae9e169e5a87381daaf86b65

    SHA1

    7f7fae1eb4192ff8a1b1173b24366ae8c3b47f1f

    SHA256

    9127aa7c607a089361ba587e47d256025b26bff9b8521342fac7806a63daf6ce

    SHA512

    22fae1ac6db8a854ab49f2b8d79d8877e54521c182561af576ce8d3e0b0c0580120ce07d178ef36f814916487655a581e8e2991a5af4248c05da2fd24439f7a2

  • memory/2252-1086-0x0000000004DA0000-0x0000000004EAA000-memory.dmp

    Filesize

    1.0MB

  • memory/2252-505-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2252-1102-0x00000000081C0000-0x0000000008210000-memory.dmp

    Filesize

    320KB

  • memory/2252-1101-0x0000000008130000-0x00000000081A6000-memory.dmp

    Filesize

    472KB

  • memory/2252-1100-0x0000000007A10000-0x0000000007F3C000-memory.dmp

    Filesize

    5.2MB

  • memory/2252-1099-0x0000000007840000-0x0000000007A02000-memory.dmp

    Filesize

    1.8MB

  • memory/2252-1097-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2252-1096-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/2252-1095-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/2252-1094-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2252-1093-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2252-1092-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2252-1090-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2252-1089-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/2252-1088-0x0000000005A30000-0x0000000005A6E000-memory.dmp

    Filesize

    248KB

  • memory/2252-1087-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/2252-191-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-193-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-1085-0x0000000005420000-0x0000000005A26000-memory.dmp

    Filesize

    6.0MB

  • memory/2252-207-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-501-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2252-173-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/2252-174-0x0000000002450000-0x0000000002496000-memory.dmp

    Filesize

    280KB

  • memory/2252-175-0x0000000002620000-0x0000000002664000-memory.dmp

    Filesize

    272KB

  • memory/2252-176-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-177-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-179-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-181-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-183-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-185-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-187-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-189-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-503-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2252-195-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-209-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-197-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-199-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-201-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-203-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/2252-205-0x0000000002620000-0x000000000265E000-memory.dmp

    Filesize

    248KB

  • memory/4116-165-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-166-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/4116-137-0x0000000005160000-0x0000000005178000-memory.dmp

    Filesize

    96KB

  • memory/4116-135-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/4116-136-0x0000000004C60000-0x000000000515E000-memory.dmp

    Filesize

    5.0MB

  • memory/4116-168-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/4116-134-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/4116-163-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-161-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-159-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-157-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-155-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-153-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-151-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-149-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-147-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-145-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-143-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-141-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-139-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-138-0x0000000005160000-0x0000000005172000-memory.dmp

    Filesize

    72KB

  • memory/4116-133-0x0000000000710000-0x000000000073D000-memory.dmp

    Filesize

    180KB

  • memory/4116-132-0x00000000026E0000-0x00000000026FA000-memory.dmp

    Filesize

    104KB

  • memory/4520-1108-0x0000000000E60000-0x0000000000E92000-memory.dmp

    Filesize

    200KB

  • memory/4520-1109-0x00000000058A0000-0x00000000058EB000-memory.dmp

    Filesize

    300KB

  • memory/4520-1110-0x00000000059B0000-0x00000000059C0000-memory.dmp

    Filesize

    64KB

  • memory/4520-1111-0x00000000059B0000-0x00000000059C0000-memory.dmp

    Filesize

    64KB