Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    99s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 19:00

General

  • Target

    ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe

  • Size

    695KB

  • MD5

    bfb893eee9a49fa0ab9efa40102233bc

  • SHA1

    75ed95c500c55f245f9abd8bcb9e2cc6f18bfbbe

  • SHA256

    ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253

  • SHA512

    a69d362e1ac2e60c85d8969950899c21dcba5d781a6efb8f4a69b30eacfe979382f5bc391beb3c4a0f61c7879ad9b72ec6b05dc61124ce9e10c1ae32e02aa13d

  • SSDEEP

    12288:9Mrly90+3xtSFmRNBTi9rXBJGKJRvApuPlDstw1j/vPSpzAt7JT9t/1zL1:0yN7Ti9rX+KMpelDsQj/y5A9nttF

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe
    "C:\Users\Admin\AppData\Local\Temp\ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515138.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515138.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2291.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2291.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5425.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5425.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3496
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si266401.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si266401.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si266401.exe

    Filesize

    175KB

    MD5

    79f59598a91236c810563e1bab965f06

    SHA1

    f4de8e6e487104775c15b7e30c2d1730b16a8fd7

    SHA256

    0ca8d92aa268f7c716ecee90c48766c92ea7d848e2cb5804076b783e13567594

    SHA512

    a7d4975606ed2b33a77aa7275e2cd5f07a1467c19d430b62793513a9c683e9091453b0a022c1cec1d901bcbc4b9a22728551988341c61166abc155a6a10918db

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si266401.exe

    Filesize

    175KB

    MD5

    79f59598a91236c810563e1bab965f06

    SHA1

    f4de8e6e487104775c15b7e30c2d1730b16a8fd7

    SHA256

    0ca8d92aa268f7c716ecee90c48766c92ea7d848e2cb5804076b783e13567594

    SHA512

    a7d4975606ed2b33a77aa7275e2cd5f07a1467c19d430b62793513a9c683e9091453b0a022c1cec1d901bcbc4b9a22728551988341c61166abc155a6a10918db

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515138.exe

    Filesize

    553KB

    MD5

    4889986e97277455c3f388cc1eb9bba3

    SHA1

    36745ce953fe858a64c4b5b962fd312cb7da9f02

    SHA256

    555bc828add4a4013837aa7d4b7ba52ab46d807dab1992fa0d4d39736f1a10f5

    SHA512

    9b6a22f2243134e77d595a0f472d312f328a915bc748532c92587fe58ca494611d7c1553d490669b309171672d1862acc3ef889fbbe2f25a1644754aad9c4bfa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515138.exe

    Filesize

    553KB

    MD5

    4889986e97277455c3f388cc1eb9bba3

    SHA1

    36745ce953fe858a64c4b5b962fd312cb7da9f02

    SHA256

    555bc828add4a4013837aa7d4b7ba52ab46d807dab1992fa0d4d39736f1a10f5

    SHA512

    9b6a22f2243134e77d595a0f472d312f328a915bc748532c92587fe58ca494611d7c1553d490669b309171672d1862acc3ef889fbbe2f25a1644754aad9c4bfa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2291.exe

    Filesize

    308KB

    MD5

    627893938485b27983f8e03a5e045daa

    SHA1

    89b2506a22d6caddac982b6fcbb154722c3340e2

    SHA256

    d7142b94b44e17dd841fb8aa19dfaf21e18501c756e6fd06892b255fa8f1adf9

    SHA512

    0c12832c8795d6f8114e7cf784e57e75c08513e623e29b87eed0da67b6cce167e5ad41d66c2b49730f35d8f18ced651c25952e0659e00198ac14773a77648ba8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2291.exe

    Filesize

    308KB

    MD5

    627893938485b27983f8e03a5e045daa

    SHA1

    89b2506a22d6caddac982b6fcbb154722c3340e2

    SHA256

    d7142b94b44e17dd841fb8aa19dfaf21e18501c756e6fd06892b255fa8f1adf9

    SHA512

    0c12832c8795d6f8114e7cf784e57e75c08513e623e29b87eed0da67b6cce167e5ad41d66c2b49730f35d8f18ced651c25952e0659e00198ac14773a77648ba8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5425.exe

    Filesize

    366KB

    MD5

    b7a8bfda155d68e7d2ca9fd8a1367223

    SHA1

    df8dfbe6266b7cd7032437d66c3046d7793bf1e0

    SHA256

    a5014f398055b91817f0fa6e2b5a359649406264a28903c514809450f223bfd9

    SHA512

    e5e9fce760bf129fd9722bff6eecb64677762cb002d2406151865ff74ffa4fe773ad6528a2e1754c2c4bbb627558d1749042ef7c800276402a92a0a8933c2390

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5425.exe

    Filesize

    366KB

    MD5

    b7a8bfda155d68e7d2ca9fd8a1367223

    SHA1

    df8dfbe6266b7cd7032437d66c3046d7793bf1e0

    SHA256

    a5014f398055b91817f0fa6e2b5a359649406264a28903c514809450f223bfd9

    SHA512

    e5e9fce760bf129fd9722bff6eecb64677762cb002d2406151865ff74ffa4fe773ad6528a2e1754c2c4bbb627558d1749042ef7c800276402a92a0a8933c2390

  • memory/1152-148-0x0000000004D10000-0x00000000052B4000-memory.dmp

    Filesize

    5.6MB

  • memory/1152-149-0x0000000000710000-0x000000000073D000-memory.dmp

    Filesize

    180KB

  • memory/1152-150-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/1152-152-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/1152-151-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/1152-153-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-156-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-154-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-158-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-160-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-162-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-164-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-166-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-168-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-170-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-172-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-174-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-176-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-178-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-180-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/1152-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1152-182-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/1152-183-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/1152-184-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/1152-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2012-1122-0x00000000006C0000-0x00000000006F2000-memory.dmp

    Filesize

    200KB

  • memory/2012-1123-0x0000000005390000-0x00000000053A0000-memory.dmp

    Filesize

    64KB

  • memory/3496-194-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-226-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-196-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-198-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-200-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-202-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-204-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-208-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-206-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-210-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-212-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-215-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3496-216-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-218-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3496-220-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-217-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3496-213-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/3496-222-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-224-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-192-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-228-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-1101-0x0000000005480000-0x0000000005A98000-memory.dmp

    Filesize

    6.1MB

  • memory/3496-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/3496-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/3496-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/3496-1105-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3496-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp

    Filesize

    408KB

  • memory/3496-1107-0x0000000006600000-0x0000000006692000-memory.dmp

    Filesize

    584KB

  • memory/3496-1109-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3496-1110-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3496-1111-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3496-1112-0x00000000067F0000-0x0000000006866000-memory.dmp

    Filesize

    472KB

  • memory/3496-1113-0x0000000006880000-0x00000000068D0000-memory.dmp

    Filesize

    320KB

  • memory/3496-191-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3496-1114-0x0000000006A40000-0x0000000006C02000-memory.dmp

    Filesize

    1.8MB

  • memory/3496-1115-0x0000000006C20000-0x000000000714C000-memory.dmp

    Filesize

    5.2MB

  • memory/3496-1116-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB