Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    87s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 20:21

General

  • Target

    c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe

  • Size

    695KB

  • MD5

    9949a89ddfe8e005beac43bb66cfd65b

  • SHA1

    b870a218401ca88b004a2c99e38642c9727168c3

  • SHA256

    c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92

  • SHA512

    323f6fa07917b8002b3956da26eb8f45ee203c2b0306e0f098e212bcc5403062ecc45d0c7cb6d3929868712b5c29e01c639f361ffe4826c13aab12cf20ffa25f

  • SSDEEP

    12288:yMrNy90Qc7kJ278CKoY9940BFFxMylsQ2lWYbEzVhtJ0aEDnJlHI:PyA7kaPKT2OFxMylsQezsVjylTJ9I

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe
    "C:\Users\Admin\AppData\Local\Temp\c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556306.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556306.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4416
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7944.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7944.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1160
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8276.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8276.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4884
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si938803.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si938803.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si938803.exe

    Filesize

    175KB

    MD5

    bb6bf2ef1156251e259c430e3da214bc

    SHA1

    c9ce12fc65fdc02b3410d8a8e7247b114de827ed

    SHA256

    3917a5a2ec754696b113fe13a8ab5b5763de80f6449b387de9715ffd36e37717

    SHA512

    20652d4f746d5baefe256987cb45a799fbdebc47045b4e04dbde0bec329af320b89fc367c00e6865fb067a8632cd764cca684286635ea41f9e6f3ce4a827dfd5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si938803.exe

    Filesize

    175KB

    MD5

    bb6bf2ef1156251e259c430e3da214bc

    SHA1

    c9ce12fc65fdc02b3410d8a8e7247b114de827ed

    SHA256

    3917a5a2ec754696b113fe13a8ab5b5763de80f6449b387de9715ffd36e37717

    SHA512

    20652d4f746d5baefe256987cb45a799fbdebc47045b4e04dbde0bec329af320b89fc367c00e6865fb067a8632cd764cca684286635ea41f9e6f3ce4a827dfd5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556306.exe

    Filesize

    553KB

    MD5

    1cdd574ebc2cf93ba666b1420ea9c4eb

    SHA1

    a032d7da956630cc00567708057e9b09cf5727d6

    SHA256

    06e27269782081deca25eba84d4355caa26eac5ea9ff0d17500750a1285dba0a

    SHA512

    a1c8577db58be3aed9ec650d639c4cc99327387340978ce03462ef94d6ccde7d6899af168648fcb22ebbebf6092dec919ac271e9b42a5260c69d80589e34430a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556306.exe

    Filesize

    553KB

    MD5

    1cdd574ebc2cf93ba666b1420ea9c4eb

    SHA1

    a032d7da956630cc00567708057e9b09cf5727d6

    SHA256

    06e27269782081deca25eba84d4355caa26eac5ea9ff0d17500750a1285dba0a

    SHA512

    a1c8577db58be3aed9ec650d639c4cc99327387340978ce03462ef94d6ccde7d6899af168648fcb22ebbebf6092dec919ac271e9b42a5260c69d80589e34430a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7944.exe

    Filesize

    308KB

    MD5

    a5a480e1c1847fa93c2715a1572e6818

    SHA1

    5a11891c20fc5832ac9a1aeeb76f6bfa620a01fe

    SHA256

    62e80581c29ab96ac52dbeb83c6202e350134fc7eb959075a644e52ebb782566

    SHA512

    624d1d00e08443c3392e025ced46139b779592744636b53c9e5fda6822779669acf7f8181d4b404b47f08da3286d607c59e821dc601b1833adfc8c38bc897af6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7944.exe

    Filesize

    308KB

    MD5

    a5a480e1c1847fa93c2715a1572e6818

    SHA1

    5a11891c20fc5832ac9a1aeeb76f6bfa620a01fe

    SHA256

    62e80581c29ab96ac52dbeb83c6202e350134fc7eb959075a644e52ebb782566

    SHA512

    624d1d00e08443c3392e025ced46139b779592744636b53c9e5fda6822779669acf7f8181d4b404b47f08da3286d607c59e821dc601b1833adfc8c38bc897af6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8276.exe

    Filesize

    366KB

    MD5

    d7c4787271a65e7615ad256cfd174484

    SHA1

    f1d5a5a4e8eb63d0553aa9a778df4e97695cdf53

    SHA256

    49a9c705524f85bc61bd3d8e065623f94a48d643589613c36c3b0a49dfbe5051

    SHA512

    b8ebb63b50c4fb3758752cceaf43c0d2eec8a325f3d755d810e7227e615139dd0ba7c664f84614c15dab5a10e94563e33315d98945bc1a90243331b3f829339d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8276.exe

    Filesize

    366KB

    MD5

    d7c4787271a65e7615ad256cfd174484

    SHA1

    f1d5a5a4e8eb63d0553aa9a778df4e97695cdf53

    SHA256

    49a9c705524f85bc61bd3d8e065623f94a48d643589613c36c3b0a49dfbe5051

    SHA512

    b8ebb63b50c4fb3758752cceaf43c0d2eec8a325f3d755d810e7227e615139dd0ba7c664f84614c15dab5a10e94563e33315d98945bc1a90243331b3f829339d

  • memory/1160-148-0x0000000004D10000-0x00000000052B4000-memory.dmp

    Filesize

    5.6MB

  • memory/1160-149-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/1160-150-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1160-151-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1160-152-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1160-153-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-154-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-156-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-158-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-164-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-162-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-166-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-170-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-172-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-174-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-176-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-178-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-180-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/1160-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1160-182-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1160-183-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1160-184-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1160-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4884-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-203-0x0000000000810000-0x000000000085B000-memory.dmp

    Filesize

    300KB

  • memory/4884-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-205-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/4884-207-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/4884-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-209-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/4884-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-226-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-228-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/4884-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

    Filesize

    6.1MB

  • memory/4884-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4884-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/4884-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/4884-1105-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/4884-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp

    Filesize

    408KB

  • memory/4884-1107-0x0000000006610000-0x00000000066A2000-memory.dmp

    Filesize

    584KB

  • memory/4884-1110-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/4884-1109-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/4884-1111-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/4884-1112-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/4884-1113-0x00000000079C0000-0x0000000007B82000-memory.dmp

    Filesize

    1.8MB

  • memory/4884-1114-0x0000000007BA0000-0x00000000080CC000-memory.dmp

    Filesize

    5.2MB

  • memory/4884-1115-0x00000000082F0000-0x0000000008366000-memory.dmp

    Filesize

    472KB

  • memory/4884-1116-0x00000000047D0000-0x0000000004820000-memory.dmp

    Filesize

    320KB

  • memory/5068-1122-0x0000000000CB0000-0x0000000000CE2000-memory.dmp

    Filesize

    200KB

  • memory/5068-1123-0x00000000055C0000-0x00000000055D0000-memory.dmp

    Filesize

    64KB

  • memory/5068-1124-0x00000000055C0000-0x00000000055D0000-memory.dmp

    Filesize

    64KB