Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    57s
  • max time network
    59s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29/03/2023, 00:05

General

  • Target

    e8280e61cc4a5609efd3d332e4d39dde5c4f65aed4fa21ac67c3d7176b1e5802.exe

  • Size

    659KB

  • MD5

    486164cba30558ad4f1cd52e508f807a

  • SHA1

    edeb065b81b6e9ee57b4df4cab6eb31ca382a422

  • SHA256

    e8280e61cc4a5609efd3d332e4d39dde5c4f65aed4fa21ac67c3d7176b1e5802

  • SHA512

    3440db0b6495621398311bab930bffdefcae13783c93f3343bbbdd2447917b1463d183133cbf0c6f83f382b6cccb93001a5f08d07add59e4f79fa9b35b6bd7ee

  • SSDEEP

    12288:aMrcy90VVzqSVlUy3So1YAKOLKw+GHkTi6youYdp2DEc0RA:6ygLVlUxMbBKa0i6yoADaRA

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zaza

C2

176.113.115.145:4125

Attributes
  • auth_value

    48bf44c663fe3c1035fb4dd0b91fde5d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8280e61cc4a5609efd3d332e4d39dde5c4f65aed4fa21ac67c3d7176b1e5802.exe
    "C:\Users\Admin\AppData\Local\Temp\e8280e61cc4a5609efd3d332e4d39dde5c4f65aed4fa21ac67c3d7176b1e5802.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un379693.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un379693.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8295.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8295.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3371.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3371.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si757349.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si757349.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si757349.exe

    Filesize

    175KB

    MD5

    bd22c4b054d101821699c41241d57724

    SHA1

    f335a5360c0005fe48e752b3d33faffa5c12f203

    SHA256

    f2fc55815b11d7bcf111eef35d8c091cf168ec85ff9150578ec83039930734dc

    SHA512

    248d59629ff25ab82ff348061172303242238fef7a581f2988f25e4a904cb1d50bbfe54cbdf35ab2706bc60e5c8042f912de3580b934b645d144ce801b3a8f9d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si757349.exe

    Filesize

    175KB

    MD5

    bd22c4b054d101821699c41241d57724

    SHA1

    f335a5360c0005fe48e752b3d33faffa5c12f203

    SHA256

    f2fc55815b11d7bcf111eef35d8c091cf168ec85ff9150578ec83039930734dc

    SHA512

    248d59629ff25ab82ff348061172303242238fef7a581f2988f25e4a904cb1d50bbfe54cbdf35ab2706bc60e5c8042f912de3580b934b645d144ce801b3a8f9d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un379693.exe

    Filesize

    516KB

    MD5

    a527581ef86200422f0ec552eef86499

    SHA1

    18e3e49cc43ff9f7783d6bd6e39116dd3d9e0865

    SHA256

    65d2508f9c314a5ddd30bd2601f1454184a27a84cbb5446fb6626577bc7cd7fc

    SHA512

    1a214f94256af3ffefbd36862df78a941a78078fa1ed8d36d1a84fe2fcaeceb99d88d0791e6ee8261a65bb55b9fc916cccaeecf64bd342f0b15cf1b789610587

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un379693.exe

    Filesize

    516KB

    MD5

    a527581ef86200422f0ec552eef86499

    SHA1

    18e3e49cc43ff9f7783d6bd6e39116dd3d9e0865

    SHA256

    65d2508f9c314a5ddd30bd2601f1454184a27a84cbb5446fb6626577bc7cd7fc

    SHA512

    1a214f94256af3ffefbd36862df78a941a78078fa1ed8d36d1a84fe2fcaeceb99d88d0791e6ee8261a65bb55b9fc916cccaeecf64bd342f0b15cf1b789610587

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8295.exe

    Filesize

    275KB

    MD5

    8786eafcb95e1c12ef47369628ad4564

    SHA1

    6a3ff75ff3d110960cedf9121de397b60fcf169a

    SHA256

    950b311434aa8de64d3665a60e6adef4954e72aef1ce7ce44945b758d8d2e866

    SHA512

    5fdc78aa1fcffd4bb3099895ebfb3e283c05cc5d90aa775c0e3d0a974bfb96d15b23fc52f30aa4a0cb7bc0077e6a26c8587fd8a192758b70d7843c107ffd7906

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8295.exe

    Filesize

    275KB

    MD5

    8786eafcb95e1c12ef47369628ad4564

    SHA1

    6a3ff75ff3d110960cedf9121de397b60fcf169a

    SHA256

    950b311434aa8de64d3665a60e6adef4954e72aef1ce7ce44945b758d8d2e866

    SHA512

    5fdc78aa1fcffd4bb3099895ebfb3e283c05cc5d90aa775c0e3d0a974bfb96d15b23fc52f30aa4a0cb7bc0077e6a26c8587fd8a192758b70d7843c107ffd7906

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3371.exe

    Filesize

    333KB

    MD5

    ae34c9eec5ccf40efbf1009bdb729cec

    SHA1

    aeb9e61347df879cd28f0fc0101806cec31750e8

    SHA256

    d03d46bb1d40b1c0ac9a342dbc536158af1c107220b81bb9647dbaf8b9f20519

    SHA512

    d15b9b2e2500025ef77432509a2910be4bcb7fdf3712a802da92b07df5b700d5ad6f9be725a16ad0805ca895c6d5bc89b78615b7cb1e6a1d8f0cef8add0542d0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3371.exe

    Filesize

    333KB

    MD5

    ae34c9eec5ccf40efbf1009bdb729cec

    SHA1

    aeb9e61347df879cd28f0fc0101806cec31750e8

    SHA256

    d03d46bb1d40b1c0ac9a342dbc536158af1c107220b81bb9647dbaf8b9f20519

    SHA512

    d15b9b2e2500025ef77432509a2910be4bcb7fdf3712a802da92b07df5b700d5ad6f9be725a16ad0805ca895c6d5bc89b78615b7cb1e6a1d8f0cef8add0542d0

  • memory/1340-136-0x0000000002B80000-0x0000000002BAD000-memory.dmp

    Filesize

    180KB

  • memory/1340-137-0x0000000004840000-0x000000000485A000-memory.dmp

    Filesize

    104KB

  • memory/1340-138-0x0000000007320000-0x000000000781E000-memory.dmp

    Filesize

    5.0MB

  • memory/1340-139-0x0000000004B50000-0x0000000004B68000-memory.dmp

    Filesize

    96KB

  • memory/1340-140-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/1340-141-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/1340-142-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/1340-143-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-144-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-146-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-148-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-150-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-152-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-154-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-156-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-158-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-160-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-162-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-164-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-166-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-168-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-170-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/1340-171-0x0000000000400000-0x0000000002B73000-memory.dmp

    Filesize

    39.4MB

  • memory/1340-172-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/1340-174-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/1340-173-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/1340-176-0x0000000000400000-0x0000000002B73000-memory.dmp

    Filesize

    39.4MB

  • memory/1776-181-0x0000000007080000-0x00000000070C6000-memory.dmp

    Filesize

    280KB

  • memory/1776-182-0x0000000007100000-0x0000000007144000-memory.dmp

    Filesize

    272KB

  • memory/1776-183-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-184-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-186-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-188-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-190-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-192-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-194-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-196-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-198-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-200-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-203-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/1776-202-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-205-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/1776-207-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-208-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/1776-206-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/1776-210-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-212-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-214-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-216-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-218-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-220-0x0000000007100000-0x000000000713F000-memory.dmp

    Filesize

    252KB

  • memory/1776-1093-0x00000000076A0000-0x0000000007CA6000-memory.dmp

    Filesize

    6.0MB

  • memory/1776-1094-0x0000000007D30000-0x0000000007E3A000-memory.dmp

    Filesize

    1.0MB

  • memory/1776-1095-0x0000000007E70000-0x0000000007E82000-memory.dmp

    Filesize

    72KB

  • memory/1776-1096-0x0000000007E90000-0x0000000007ECE000-memory.dmp

    Filesize

    248KB

  • memory/1776-1097-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/1776-1098-0x0000000007FE0000-0x000000000802B000-memory.dmp

    Filesize

    300KB

  • memory/1776-1100-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/1776-1101-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/1776-1102-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/1776-1103-0x0000000008170000-0x0000000008202000-memory.dmp

    Filesize

    584KB

  • memory/1776-1104-0x0000000008210000-0x0000000008276000-memory.dmp

    Filesize

    408KB

  • memory/1776-1105-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/1776-1107-0x0000000004A80000-0x0000000004AF6000-memory.dmp

    Filesize

    472KB

  • memory/1776-1108-0x0000000009CC0000-0x0000000009D10000-memory.dmp

    Filesize

    320KB

  • memory/1776-1109-0x0000000009D20000-0x0000000009EE2000-memory.dmp

    Filesize

    1.8MB

  • memory/1776-1110-0x0000000009EF0000-0x000000000A41C000-memory.dmp

    Filesize

    5.2MB

  • memory/4756-1116-0x0000000000810000-0x0000000000842000-memory.dmp

    Filesize

    200KB

  • memory/4756-1117-0x0000000005250000-0x000000000529B000-memory.dmp

    Filesize

    300KB

  • memory/4756-1118-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB