Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 23:44

General

  • Target

    f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe

  • Size

    531KB

  • MD5

    1a14ccde94897499deea2a69c473fb01

  • SHA1

    430809095604e7b0ed005f8764171132b7e409a0

  • SHA256

    f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601

  • SHA512

    9b5080e831e9ac1d3d13cd0101802b6a147cc6c4e4af3738e76b357377b23ee7412222776fe3d70bab56db548b40ce3436ebcded55cf44f7a65929e4a2990829

  • SSDEEP

    12288:iMrIy90NQwkINmGg3NTRG7IF1ryudvJyqf5KXa/wm1blWnlCqFOrAIQx:WyOkINeRG7IF9x3Arm1bElCMgG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe
    "C:\Users\Admin\AppData\Local\Temp\f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisE6544.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisE6544.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr093390.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr093390.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku582903.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku582903.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1604
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 1084
          4⤵
          • Program crash
          PID:828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553667.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553667.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2388
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1604 -ip 1604
    1⤵
      PID:1344

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553667.exe

      Filesize

      176KB

      MD5

      13a773e684ff6c9b4fe791d71898a603

      SHA1

      47587eb7f8df8ef2b426f9969f7105afc3f3e0cc

      SHA256

      e7a16a8a44e8d790bb6650a1ebc8296c177d50cddbc6ea9bdb5e9f8d4219301a

      SHA512

      c4f156970fd372aaba54cfa5e1eccd31448c73663f5ff5a2092ab94f4316590b269afaab285b4aa2980724bb0537f9bf585b3cf7ce95f682408f7b04e44ef6dd

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553667.exe

      Filesize

      176KB

      MD5

      13a773e684ff6c9b4fe791d71898a603

      SHA1

      47587eb7f8df8ef2b426f9969f7105afc3f3e0cc

      SHA256

      e7a16a8a44e8d790bb6650a1ebc8296c177d50cddbc6ea9bdb5e9f8d4219301a

      SHA512

      c4f156970fd372aaba54cfa5e1eccd31448c73663f5ff5a2092ab94f4316590b269afaab285b4aa2980724bb0537f9bf585b3cf7ce95f682408f7b04e44ef6dd

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisE6544.exe

      Filesize

      388KB

      MD5

      d41bb93ab2d8dc2b3287de9e59fa9876

      SHA1

      532827ce3f3b86f800ee862d3d941deb0e29b409

      SHA256

      02014b5ee7e71bea762b043536015a6272e7cf7e9de55bff9d5720925fd44e08

      SHA512

      0b0903e580e23c41de0cd803704da61364c47bc7cbd9811e73dcd1200238634b7b6101111285141462e7a3a251d65458fb28117e54b57589f7c5741b2e7b639f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisE6544.exe

      Filesize

      388KB

      MD5

      d41bb93ab2d8dc2b3287de9e59fa9876

      SHA1

      532827ce3f3b86f800ee862d3d941deb0e29b409

      SHA256

      02014b5ee7e71bea762b043536015a6272e7cf7e9de55bff9d5720925fd44e08

      SHA512

      0b0903e580e23c41de0cd803704da61364c47bc7cbd9811e73dcd1200238634b7b6101111285141462e7a3a251d65458fb28117e54b57589f7c5741b2e7b639f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr093390.exe

      Filesize

      11KB

      MD5

      9b2fb0f2a58168b7b00102317d63ca91

      SHA1

      e8d794d2f5468d330c65cb94f4a9ceb649517179

      SHA256

      65b52bda54a208be8d1f8793809dfaf654b8f50d3fa4d976b5688c4c04717ef2

      SHA512

      5aa5fc321c68772fb910f268143f81f274df0146e677d2de0d1c0bd1e6c4be0b791304370c2921aedf3fb30c4a4f6617be03cd7c0dc77a800928dbfc51d77252

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr093390.exe

      Filesize

      11KB

      MD5

      9b2fb0f2a58168b7b00102317d63ca91

      SHA1

      e8d794d2f5468d330c65cb94f4a9ceb649517179

      SHA256

      65b52bda54a208be8d1f8793809dfaf654b8f50d3fa4d976b5688c4c04717ef2

      SHA512

      5aa5fc321c68772fb910f268143f81f274df0146e677d2de0d1c0bd1e6c4be0b791304370c2921aedf3fb30c4a4f6617be03cd7c0dc77a800928dbfc51d77252

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku582903.exe

      Filesize

      434KB

      MD5

      87de609fc861f515a2d06be8166db992

      SHA1

      b3dae492192e33dd7b4f2277c135b24f8792fcc1

      SHA256

      1830853de237fdace93c3641aafde641de9f4d842e050313116b0fa8ca19ca01

      SHA512

      a025069b8ae5200fbc8c9159bcb44c050c2afd1e89ab1a5dba990f2e08a0a2d04d59a6cbc6103cd3594f962c09c97c032bc08ecfd006343b459c747fbf17f676

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku582903.exe

      Filesize

      434KB

      MD5

      87de609fc861f515a2d06be8166db992

      SHA1

      b3dae492192e33dd7b4f2277c135b24f8792fcc1

      SHA256

      1830853de237fdace93c3641aafde641de9f4d842e050313116b0fa8ca19ca01

      SHA512

      a025069b8ae5200fbc8c9159bcb44c050c2afd1e89ab1a5dba990f2e08a0a2d04d59a6cbc6103cd3594f962c09c97c032bc08ecfd006343b459c747fbf17f676

    • memory/1604-153-0x0000000004DC0000-0x0000000005364000-memory.dmp

      Filesize

      5.6MB

    • memory/1604-154-0x0000000000720000-0x000000000076B000-memory.dmp

      Filesize

      300KB

    • memory/1604-155-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/1604-156-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/1604-157-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/1604-158-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-159-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-161-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-163-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-165-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-167-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-169-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-171-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-173-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-175-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-177-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-179-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-181-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-183-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-185-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-187-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-189-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-191-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-193-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-195-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-197-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-199-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-201-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-203-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-205-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-207-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-209-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-211-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-213-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-215-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-217-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-219-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-221-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1604-1064-0x0000000005370000-0x0000000005988000-memory.dmp

      Filesize

      6.1MB

    • memory/1604-1065-0x00000000059A0000-0x0000000005AAA000-memory.dmp

      Filesize

      1.0MB

    • memory/1604-1066-0x0000000005AE0000-0x0000000005AF2000-memory.dmp

      Filesize

      72KB

    • memory/1604-1067-0x0000000005B00000-0x0000000005B3C000-memory.dmp

      Filesize

      240KB

    • memory/1604-1068-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/1604-1070-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/1604-1071-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/1604-1072-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/1604-1073-0x0000000005DF0000-0x0000000005E82000-memory.dmp

      Filesize

      584KB

    • memory/1604-1074-0x0000000005E90000-0x0000000005EF6000-memory.dmp

      Filesize

      408KB

    • memory/1604-1075-0x0000000006690000-0x0000000006706000-memory.dmp

      Filesize

      472KB

    • memory/1604-1076-0x0000000006720000-0x0000000006770000-memory.dmp

      Filesize

      320KB

    • memory/1604-1077-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/1604-1078-0x00000000068D0000-0x0000000006A92000-memory.dmp

      Filesize

      1.8MB

    • memory/1604-1079-0x0000000006AC0000-0x0000000006FEC000-memory.dmp

      Filesize

      5.2MB

    • memory/2008-147-0x00000000007E0000-0x00000000007EA000-memory.dmp

      Filesize

      40KB

    • memory/2388-1086-0x0000000000840000-0x0000000000872000-memory.dmp

      Filesize

      200KB

    • memory/2388-1087-0x00000000053E0000-0x00000000053F0000-memory.dmp

      Filesize

      64KB