Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    97s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 18:38

General

  • Target

    9c9e9ab6750e4dd13efabb2015d21f7f19493d262adcdb2ea4ed8c1ef86d31ef.exe

  • Size

    695KB

  • MD5

    829ce779374ee129f720621e78854ace

  • SHA1

    062a9b469520623878e1d110ba8863fa887789b7

  • SHA256

    9c9e9ab6750e4dd13efabb2015d21f7f19493d262adcdb2ea4ed8c1ef86d31ef

  • SHA512

    31a0af39909be6dd66607f0c22a2468704eaf8cf02711f0e3523cf3685e95582b508367202958849cca50e8456cc22728e07ac2f77ce756c2ff780ea904749f5

  • SSDEEP

    12288:2Mrvy90Vj+FKd5lkR8Z3hFvZacpZtrdosnQsCIzAurJqJ9LeCRREFUIrjeK:5ywyyX9jZZt+vwA+KUwREqO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c9e9ab6750e4dd13efabb2015d21f7f19493d262adcdb2ea4ed8c1ef86d31ef.exe
    "C:\Users\Admin\AppData\Local\Temp\9c9e9ab6750e4dd13efabb2015d21f7f19493d262adcdb2ea4ed8c1ef86d31ef.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282251.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282251.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0512.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0512.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1704
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5372.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5372.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628086.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628086.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628086.exe

    Filesize

    175KB

    MD5

    ef6dcc78038f6d82fd800002c4cbc082

    SHA1

    23d56cb32d15cd7ebdbecf55766798f0168cecf2

    SHA256

    e574c99e644f3c6f5b48f64d414c5b65620b0758a9d6bdd87a6fa90e3aec9eee

    SHA512

    3e50865b8fc2fcdce25a0b75d29a1b8ff37da174273d3d3e64845bb186a27a4048fc3ee76601e0a795bbacc9f0c4a4253b0938994d07f2b3267c032d63c06d65

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628086.exe

    Filesize

    175KB

    MD5

    ef6dcc78038f6d82fd800002c4cbc082

    SHA1

    23d56cb32d15cd7ebdbecf55766798f0168cecf2

    SHA256

    e574c99e644f3c6f5b48f64d414c5b65620b0758a9d6bdd87a6fa90e3aec9eee

    SHA512

    3e50865b8fc2fcdce25a0b75d29a1b8ff37da174273d3d3e64845bb186a27a4048fc3ee76601e0a795bbacc9f0c4a4253b0938994d07f2b3267c032d63c06d65

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282251.exe

    Filesize

    553KB

    MD5

    6c64bf5242815d908ed8eeb0936a93a3

    SHA1

    efaeaea17a03f859553825136a6d7ac7da07f12e

    SHA256

    463eff26e83e9badb34d9b2fe18bc96d130007ecef12871996542750ad56a8b9

    SHA512

    47339ea6be8cde28930ea0e59a0fa4a0c3e5283784237e91d6d1976a6d33affe06681754de640c6f255f9fb9fd44c4e514bb85a5b67e882c9ea8b809c9bdcffc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un282251.exe

    Filesize

    553KB

    MD5

    6c64bf5242815d908ed8eeb0936a93a3

    SHA1

    efaeaea17a03f859553825136a6d7ac7da07f12e

    SHA256

    463eff26e83e9badb34d9b2fe18bc96d130007ecef12871996542750ad56a8b9

    SHA512

    47339ea6be8cde28930ea0e59a0fa4a0c3e5283784237e91d6d1976a6d33affe06681754de640c6f255f9fb9fd44c4e514bb85a5b67e882c9ea8b809c9bdcffc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0512.exe

    Filesize

    308KB

    MD5

    c1786672e5da184b83363e6c92c1234e

    SHA1

    fc9dc4c9f56efb9c36f7518094c014156259f7e2

    SHA256

    3ca62ac33d734e41df19eff669710b2eecc35df27c45756d58dd9d4b8f3df88a

    SHA512

    2b25b1a30e504e846a3e2b0e0f90a9d0a1fc831ade09d669c8433e619f9d29cb71d1760a55b139b203fff7e664d301a4ec720c9237c1a5108650e2a77634e8aa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0512.exe

    Filesize

    308KB

    MD5

    c1786672e5da184b83363e6c92c1234e

    SHA1

    fc9dc4c9f56efb9c36f7518094c014156259f7e2

    SHA256

    3ca62ac33d734e41df19eff669710b2eecc35df27c45756d58dd9d4b8f3df88a

    SHA512

    2b25b1a30e504e846a3e2b0e0f90a9d0a1fc831ade09d669c8433e619f9d29cb71d1760a55b139b203fff7e664d301a4ec720c9237c1a5108650e2a77634e8aa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5372.exe

    Filesize

    366KB

    MD5

    2d3aa1a2aa65f16d395bc0eb407e8555

    SHA1

    43bcf695291d76f62f88f9183bfa32e60ed402ce

    SHA256

    402e685e95c2c09f7f434852a3cd4a2296fb11791dd7c8e9be86f000a8de7bd2

    SHA512

    662de5cbca7d20bdef318c8affdfeabd72dbea51724ead82de05fcae4277a3b2e0d2620049c9672428e1b89f5800509e493c28d3853dc3a995edd579abe333b3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5372.exe

    Filesize

    366KB

    MD5

    2d3aa1a2aa65f16d395bc0eb407e8555

    SHA1

    43bcf695291d76f62f88f9183bfa32e60ed402ce

    SHA256

    402e685e95c2c09f7f434852a3cd4a2296fb11791dd7c8e9be86f000a8de7bd2

    SHA512

    662de5cbca7d20bdef318c8affdfeabd72dbea51724ead82de05fcae4277a3b2e0d2620049c9672428e1b89f5800509e493c28d3853dc3a995edd579abe333b3

  • memory/1540-1122-0x00000000005B0000-0x00000000005E2000-memory.dmp

    Filesize

    200KB

  • memory/1540-1123-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/1540-1124-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/1704-160-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-172-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-152-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/1704-154-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-153-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-156-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-158-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-151-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/1704-162-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-164-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-166-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-168-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-170-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-150-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/1704-174-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-176-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-178-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-180-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/1704-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1704-182-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/1704-183-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/1704-184-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/1704-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1704-149-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/1704-148-0x0000000004F30000-0x00000000054D4000-memory.dmp

    Filesize

    5.6MB

  • memory/2824-194-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/2824-228-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-198-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-195-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-193-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-200-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-202-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-204-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-206-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-208-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-210-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-212-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-214-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-216-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-218-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-220-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-222-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-224-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-226-0x0000000005280000-0x00000000052BF000-memory.dmp

    Filesize

    252KB

  • memory/2824-197-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/2824-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

    Filesize

    6.1MB

  • memory/2824-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/2824-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/2824-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/2824-1105-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/2824-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

    Filesize

    584KB

  • memory/2824-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

    Filesize

    408KB

  • memory/2824-1109-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/2824-1110-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/2824-1111-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/2824-1112-0x0000000006830000-0x00000000068A6000-memory.dmp

    Filesize

    472KB

  • memory/2824-1113-0x00000000068C0000-0x0000000006910000-memory.dmp

    Filesize

    320KB

  • memory/2824-192-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/2824-191-0x0000000000820000-0x000000000086B000-memory.dmp

    Filesize

    300KB

  • memory/2824-1114-0x0000000006A40000-0x0000000006C02000-memory.dmp

    Filesize

    1.8MB

  • memory/2824-1115-0x0000000006E10000-0x000000000733C000-memory.dmp

    Filesize

    5.2MB

  • memory/2824-1116-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB