Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2023, 17:58

General

  • Target

    6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe

  • Size

    672KB

  • MD5

    7553fea207eab95d1aeb9db3c8bb1a77

  • SHA1

    c25191c981512cd04ba8ab4109a40a600ac4a6cf

  • SHA256

    6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931

  • SHA512

    cf28eaab86a676e4a6c6183ab942e89d0055480e745297bd8fc6a33b512684c7de6d98b683110c75310738d169a994ba5020d2697c5183fc88efa1cd737ea32d

  • SSDEEP

    12288:0Mr6y9051AJnKm2Iiaesxu0UBGh7Ct6stVSNomHZ+YZ52Fp9d0dVy:WyCAJKm0ae70FVM6kuoRqm7i8

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe
    "C:\Users\Admin\AppData\Local\Temp\6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un939683.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un939683.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9442.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9442.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:408
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 408 -s 1084
          4⤵
          • Program crash
          PID:2548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0970.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0970.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:220
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 1328
          4⤵
          • Program crash
          PID:3932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si146350.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si146350.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:872
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 408 -ip 408
    1⤵
      PID:4840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 220 -ip 220
      1⤵
        PID:3136

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si146350.exe

        Filesize

        175KB

        MD5

        f031eb34ddd698a2dc82280d43cd87e2

        SHA1

        ed580e673be25151de29292719743a1761437c85

        SHA256

        7790777cf13c01f61ff7e1ba397a7c045578ae46e4626a29416213f9dccd49c5

        SHA512

        145acb8b996b138bdfd2458ead0a25608568e853adf862653278b595c3d74570d7d438fe0a8b52a4ba5dc30cabe41153dc53e0b1c3b569eb165739841b835324

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si146350.exe

        Filesize

        175KB

        MD5

        f031eb34ddd698a2dc82280d43cd87e2

        SHA1

        ed580e673be25151de29292719743a1761437c85

        SHA256

        7790777cf13c01f61ff7e1ba397a7c045578ae46e4626a29416213f9dccd49c5

        SHA512

        145acb8b996b138bdfd2458ead0a25608568e853adf862653278b595c3d74570d7d438fe0a8b52a4ba5dc30cabe41153dc53e0b1c3b569eb165739841b835324

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un939683.exe

        Filesize

        530KB

        MD5

        9b13fb6ca7854e48267013267d126ab8

        SHA1

        38807628f6c3b044110c28c0edc192d582a271fb

        SHA256

        4d70bb5c99dfec43badae95bf4648d753112359b8c8a111a4a8201162f771074

        SHA512

        8c66d1eebf9e5e447a8347c2b9f936b4a23ed7ebf9dce4b6511ab9c7927c8e2a3269400b94aef7facb768c9fc9e846bcf16f58130546c64f184f5cfc665347d7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un939683.exe

        Filesize

        530KB

        MD5

        9b13fb6ca7854e48267013267d126ab8

        SHA1

        38807628f6c3b044110c28c0edc192d582a271fb

        SHA256

        4d70bb5c99dfec43badae95bf4648d753112359b8c8a111a4a8201162f771074

        SHA512

        8c66d1eebf9e5e447a8347c2b9f936b4a23ed7ebf9dce4b6511ab9c7927c8e2a3269400b94aef7facb768c9fc9e846bcf16f58130546c64f184f5cfc665347d7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9442.exe

        Filesize

        259KB

        MD5

        85e46d62ca27163b31dbd60fd2e69568

        SHA1

        2c753dd8d6e705e912f81feea6dd6aaf0b80c3ad

        SHA256

        5cc8c308c595bdbb956a1593206decbe64d9d443c37880649f0151b80817d8c5

        SHA512

        c75d8ba8b9b0dc728023fcd4066f2e714365043e37b75d2f0621da74508415d9131591961e834125c77253bc56a070aeacaa6a0026c3cf0d71aa3cf436498b7d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9442.exe

        Filesize

        259KB

        MD5

        85e46d62ca27163b31dbd60fd2e69568

        SHA1

        2c753dd8d6e705e912f81feea6dd6aaf0b80c3ad

        SHA256

        5cc8c308c595bdbb956a1593206decbe64d9d443c37880649f0151b80817d8c5

        SHA512

        c75d8ba8b9b0dc728023fcd4066f2e714365043e37b75d2f0621da74508415d9131591961e834125c77253bc56a070aeacaa6a0026c3cf0d71aa3cf436498b7d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0970.exe

        Filesize

        318KB

        MD5

        501dffe4e3f2ddc052aab1b276ed414e

        SHA1

        ba32c25a183f6755fb1fdb4f4b63362469117856

        SHA256

        49dade739115fb18897274b8288a783a7409b0c790afda8db08eb460d8d1793c

        SHA512

        be6c2b2354a92ab23529d45e3bf9e3b748a64cf08e22ec0565e84076803f19a294fc57680b1aee98275a3a89c1c26a5edbbb2e78d3d99bfb1a60359d3dad1a3a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0970.exe

        Filesize

        318KB

        MD5

        501dffe4e3f2ddc052aab1b276ed414e

        SHA1

        ba32c25a183f6755fb1fdb4f4b63362469117856

        SHA256

        49dade739115fb18897274b8288a783a7409b0c790afda8db08eb460d8d1793c

        SHA512

        be6c2b2354a92ab23529d45e3bf9e3b748a64cf08e22ec0565e84076803f19a294fc57680b1aee98275a3a89c1c26a5edbbb2e78d3d99bfb1a60359d3dad1a3a

      • memory/220-1102-0x00000000058D0000-0x00000000059DA000-memory.dmp

        Filesize

        1.0MB

      • memory/220-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp

        Filesize

        72KB

      • memory/220-1116-0x00000000069E0000-0x0000000006F0C000-memory.dmp

        Filesize

        5.2MB

      • memory/220-1115-0x0000000006810000-0x00000000069D2000-memory.dmp

        Filesize

        1.8MB

      • memory/220-1114-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/220-1113-0x0000000006760000-0x00000000067B0000-memory.dmp

        Filesize

        320KB

      • memory/220-1112-0x00000000066E0000-0x0000000006756000-memory.dmp

        Filesize

        472KB

      • memory/220-1111-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/220-1110-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/220-1109-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/220-1107-0x0000000006500000-0x0000000006592000-memory.dmp

        Filesize

        584KB

      • memory/220-1106-0x0000000005CF0000-0x0000000005D56000-memory.dmp

        Filesize

        408KB

      • memory/220-1105-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/220-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmp

        Filesize

        240KB

      • memory/220-200-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-1101-0x00000000052B0000-0x00000000058C8000-memory.dmp

        Filesize

        6.1MB

      • memory/220-228-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-226-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-224-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-222-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-204-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-218-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-216-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-191-0x0000000000660000-0x00000000006AB000-memory.dmp

        Filesize

        300KB

      • memory/220-192-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/220-194-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/220-193-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/220-196-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-198-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-214-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-206-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-220-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-202-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-208-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-210-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/220-212-0x0000000004AA0000-0x0000000004ADF000-memory.dmp

        Filesize

        252KB

      • memory/408-154-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-148-0x0000000000850000-0x000000000087D000-memory.dmp

        Filesize

        180KB

      • memory/408-152-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/408-172-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-184-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/408-183-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/408-182-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/408-181-0x0000000000400000-0x00000000004B1000-memory.dmp

        Filesize

        708KB

      • memory/408-176-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-150-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/408-178-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-170-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-151-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/408-180-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-153-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-168-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-166-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-164-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-162-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-160-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-158-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-156-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-174-0x0000000004B60000-0x0000000004B72000-memory.dmp

        Filesize

        72KB

      • memory/408-149-0x0000000004CE0000-0x0000000005284000-memory.dmp

        Filesize

        5.6MB

      • memory/408-186-0x0000000000400000-0x00000000004B1000-memory.dmp

        Filesize

        708KB

      • memory/872-1122-0x0000000000FC0000-0x0000000000FF2000-memory.dmp

        Filesize

        200KB

      • memory/872-1123-0x0000000005B90000-0x0000000005BA0000-memory.dmp

        Filesize

        64KB