Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    61s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/04/2023, 22:32

General

  • Target

    226c12a3d8af5ff9357e1681e4332b0cfc9a8362643f7785117b83b867189364.exe

  • Size

    659KB

  • MD5

    db407680b28f2e48a9482f75dce213e4

  • SHA1

    a43fc9985cacc74c6bbe7c68ed4edab9549445ab

  • SHA256

    226c12a3d8af5ff9357e1681e4332b0cfc9a8362643f7785117b83b867189364

  • SHA512

    2ba260989e777abf7dd8ec84de282fdab0130cda9995bc1f29d0d5a81754573ed0eb96f74728e24856c0de88b15781941bbb5cb83352f32a0c74b0a4f85022a1

  • SSDEEP

    12288:aMrjy90PqRIC3iJobDiuSXfuY4wxE1+of5K/a/4mlrqxMJ3Gp2I:VygO3K2cxE1XArml+wWYI

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\226c12a3d8af5ff9357e1681e4332b0cfc9a8362643f7785117b83b867189364.exe
    "C:\Users\Admin\AppData\Local\Temp\226c12a3d8af5ff9357e1681e4332b0cfc9a8362643f7785117b83b867189364.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un454408.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un454408.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0640.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0640.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3808.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3808.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703897.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703897.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703897.exe

    Filesize

    176KB

    MD5

    f8b04c57e3ce5d50910f1e68dbef480f

    SHA1

    f2a0c360ea7a8ff2f7412939b1f3ca19fa3fbc95

    SHA256

    b1195f131d6c44221fd33b5538afd715b36241d3e20d57d646cc515215d206a2

    SHA512

    e42bc2c4bc24237c590cc2ef4cc6612c6fa3634174c3d80ca276732a2c668a8dbdd447710ec95138c9f4bdea0f7a4b13d28810e2b313c4afe2a14b5f771861d9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si703897.exe

    Filesize

    176KB

    MD5

    f8b04c57e3ce5d50910f1e68dbef480f

    SHA1

    f2a0c360ea7a8ff2f7412939b1f3ca19fa3fbc95

    SHA256

    b1195f131d6c44221fd33b5538afd715b36241d3e20d57d646cc515215d206a2

    SHA512

    e42bc2c4bc24237c590cc2ef4cc6612c6fa3634174c3d80ca276732a2c668a8dbdd447710ec95138c9f4bdea0f7a4b13d28810e2b313c4afe2a14b5f771861d9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un454408.exe

    Filesize

    518KB

    MD5

    7f562a0ebca3f7d94f27a01c3a4004c1

    SHA1

    c73fc1489a9d79946de70410429e15d4b10bd545

    SHA256

    118ea45f8a8d71e88b033a19e23432690848438024017612dfa7f8aca20360d8

    SHA512

    9b5887fec211d1ac2420948c580bb14200c6ca80b177448e5dc2452a3e5f302c0eef301a31d58eac982f04208a587fb7374717d54d66f3f54058a487e6538055

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un454408.exe

    Filesize

    518KB

    MD5

    7f562a0ebca3f7d94f27a01c3a4004c1

    SHA1

    c73fc1489a9d79946de70410429e15d4b10bd545

    SHA256

    118ea45f8a8d71e88b033a19e23432690848438024017612dfa7f8aca20360d8

    SHA512

    9b5887fec211d1ac2420948c580bb14200c6ca80b177448e5dc2452a3e5f302c0eef301a31d58eac982f04208a587fb7374717d54d66f3f54058a487e6538055

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0640.exe

    Filesize

    376KB

    MD5

    b0330656100c8f0da4b1bd2177e2405e

    SHA1

    e5d67ea12fcfd6ef0832637cec3849cd871d93cb

    SHA256

    f8a1c94062407b16debea6e9876ea923ddada90d8f4f0da1f25b09892dc79cf4

    SHA512

    a81643c0f72c28cda691a70fd79d9a5393ef5aa85c18884b2823cc1ac98613047eff0a9ab654f2ab6abfd4816d24c0dcae9b00240c82bc4d96bdc7eaa83b00ac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0640.exe

    Filesize

    376KB

    MD5

    b0330656100c8f0da4b1bd2177e2405e

    SHA1

    e5d67ea12fcfd6ef0832637cec3849cd871d93cb

    SHA256

    f8a1c94062407b16debea6e9876ea923ddada90d8f4f0da1f25b09892dc79cf4

    SHA512

    a81643c0f72c28cda691a70fd79d9a5393ef5aa85c18884b2823cc1ac98613047eff0a9ab654f2ab6abfd4816d24c0dcae9b00240c82bc4d96bdc7eaa83b00ac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3808.exe

    Filesize

    434KB

    MD5

    9cf554876b73773a8284ab94bf0e8dd8

    SHA1

    bc77726824fe7c471d0daa1b8eddb825053c79ae

    SHA256

    5eb3253d832a3d67ce679b8e3eac79b05f05707d97d3734cf5d384cc4cf404bb

    SHA512

    2e8869a947c1d62033e5e98fa63599c12357df8e88ca6f5fdf10e89495ce96135a0310ecdbd5432c0706154df75a6708a3d38f2f43b2fb67774136b4b53aa261

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3808.exe

    Filesize

    434KB

    MD5

    9cf554876b73773a8284ab94bf0e8dd8

    SHA1

    bc77726824fe7c471d0daa1b8eddb825053c79ae

    SHA256

    5eb3253d832a3d67ce679b8e3eac79b05f05707d97d3734cf5d384cc4cf404bb

    SHA512

    2e8869a947c1d62033e5e98fa63599c12357df8e88ca6f5fdf10e89495ce96135a0310ecdbd5432c0706154df75a6708a3d38f2f43b2fb67774136b4b53aa261

  • memory/1388-1092-0x0000000005180000-0x0000000005786000-memory.dmp

    Filesize

    6.0MB

  • memory/1388-228-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/1388-1108-0x0000000006850000-0x0000000006D7C000-memory.dmp

    Filesize

    5.2MB

  • memory/1388-1107-0x0000000006670000-0x0000000006832000-memory.dmp

    Filesize

    1.8MB

  • memory/1388-1106-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/1388-1105-0x00000000065F0000-0x0000000006640000-memory.dmp

    Filesize

    320KB

  • memory/1388-195-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-1104-0x0000000006570000-0x00000000065E6000-memory.dmp

    Filesize

    472KB

  • memory/1388-1103-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/1388-199-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-1102-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/1388-1101-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/1388-1100-0x0000000005C40000-0x0000000005CA6000-memory.dmp

    Filesize

    408KB

  • memory/1388-1099-0x0000000005BA0000-0x0000000005C32000-memory.dmp

    Filesize

    584KB

  • memory/1388-1097-0x0000000005A10000-0x0000000005A5B000-memory.dmp

    Filesize

    300KB

  • memory/1388-1096-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/1388-1095-0x00000000058C0000-0x00000000058FE000-memory.dmp

    Filesize

    248KB

  • memory/1388-1094-0x00000000058A0000-0x00000000058B2000-memory.dmp

    Filesize

    72KB

  • memory/1388-1093-0x0000000005790000-0x000000000589A000-memory.dmp

    Filesize

    1.0MB

  • memory/1388-197-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-226-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/1388-222-0x0000000000690000-0x00000000006DB000-memory.dmp

    Filesize

    300KB

  • memory/1388-224-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/1388-215-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-213-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-180-0x0000000004B00000-0x0000000004B46000-memory.dmp

    Filesize

    280KB

  • memory/1388-181-0x0000000004B80000-0x0000000004BC4000-memory.dmp

    Filesize

    272KB

  • memory/1388-182-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-183-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-185-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-187-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-189-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-191-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-193-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-211-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-207-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-209-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-201-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-203-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/1388-205-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2088-170-0x0000000000400000-0x00000000005A3000-memory.dmp

    Filesize

    1.6MB

  • memory/2088-153-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-147-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2088-139-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/2088-175-0x0000000000400000-0x00000000005A3000-memory.dmp

    Filesize

    1.6MB

  • memory/2088-173-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/2088-172-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/2088-171-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/2088-137-0x00000000023D0000-0x00000000023E8000-memory.dmp

    Filesize

    96KB

  • memory/2088-140-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/2088-169-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-167-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-165-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-163-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-161-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-159-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-157-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-155-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-151-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-149-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-145-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-143-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-142-0x00000000023D0000-0x00000000023E2000-memory.dmp

    Filesize

    72KB

  • memory/2088-141-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/2088-136-0x0000000004D10000-0x000000000520E000-memory.dmp

    Filesize

    5.0MB

  • memory/2088-135-0x00000000021B0000-0x00000000021CA000-memory.dmp

    Filesize

    104KB

  • memory/2444-1114-0x0000000000890000-0x00000000008C2000-memory.dmp

    Filesize

    200KB

  • memory/2444-1115-0x00000000052D0000-0x000000000531B000-memory.dmp

    Filesize

    300KB

  • memory/2444-1116-0x00000000053F0000-0x0000000005400000-memory.dmp

    Filesize

    64KB