Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    55s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/04/2023, 10:29

General

  • Target

    f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe

  • Size

    658KB

  • MD5

    fb2b21384faf7980a9e565cd7d025ef4

  • SHA1

    406ebac6eb5fa1b90e9a44806b8288793a7d043b

  • SHA256

    f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb

  • SHA512

    d09901a59c7d02033431f81e139beab90b03b9fedd4eeb9f5817c1a5c27377692c0b5b65e0f92ca1f8be170292b4302a2d7a21bfa74dc95736a3477865c2fd34

  • SSDEEP

    12288:BMrKy90sicL5IWNqNF/+9MwBdDrUCWnR4IcuJ4MLZqueW:nyKjWNqb+9TDrUCWnyNumy

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe
    "C:\Users\Admin\AppData\Local\Temp\f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un852806.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un852806.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2054.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2054.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si505249.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si505249.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si505249.exe

    Filesize

    176KB

    MD5

    19875be0dffb21ccb2555ebe154640a6

    SHA1

    81b01ffc072f24a57aa4839e81e2860b968d4d31

    SHA256

    6fc8bbbbfb4ffea103a8c41c7f6eaff73dbe626c2945df13206cbe6f55422b2b

    SHA512

    62797bfc7580d66ff34789c4023eb980841c52e7192b0e2e1197a4baa9c861ab829009dd0cb371ca94d0cb0f3ee584312dc11b553b5ae2b6cf25e9d38f8b0fcc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si505249.exe

    Filesize

    176KB

    MD5

    19875be0dffb21ccb2555ebe154640a6

    SHA1

    81b01ffc072f24a57aa4839e81e2860b968d4d31

    SHA256

    6fc8bbbbfb4ffea103a8c41c7f6eaff73dbe626c2945df13206cbe6f55422b2b

    SHA512

    62797bfc7580d66ff34789c4023eb980841c52e7192b0e2e1197a4baa9c861ab829009dd0cb371ca94d0cb0f3ee584312dc11b553b5ae2b6cf25e9d38f8b0fcc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un852806.exe

    Filesize

    516KB

    MD5

    6493c72af47fb56034c5062b675888af

    SHA1

    41819556c413be3125e95b4c934f4b034668914f

    SHA256

    4f6bbf69e294098c095a82b70e4baf76026589d8d30fbcd2b18803fb2f99ab98

    SHA512

    762c61d6e7f8b0830974124d14258b308e499f37fa0cbf456ac9435b912b729434639cc90fdade8e0507138daed3ec9c2e1aa5814d4b3748920db9fc13b48fc0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un852806.exe

    Filesize

    516KB

    MD5

    6493c72af47fb56034c5062b675888af

    SHA1

    41819556c413be3125e95b4c934f4b034668914f

    SHA256

    4f6bbf69e294098c095a82b70e4baf76026589d8d30fbcd2b18803fb2f99ab98

    SHA512

    762c61d6e7f8b0830974124d14258b308e499f37fa0cbf456ac9435b912b729434639cc90fdade8e0507138daed3ec9c2e1aa5814d4b3748920db9fc13b48fc0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2054.exe

    Filesize

    284KB

    MD5

    a6701553ed9ab22b7259dccdeeaa9255

    SHA1

    7c8320190f4b1e181ac3f4f46fe1460e224b176d

    SHA256

    f1dbb178517653cdcb19dfbba63628bb99d7130d20f840708eac4a849206b7f3

    SHA512

    d8b9e9801e47e9e0cbf31b91973a434e54881527f593108370ae2b0c138a701073bb06085154a8820fb822c3deacbe03e86398e047cdf4aaafcbb51aa9030646

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2054.exe

    Filesize

    284KB

    MD5

    a6701553ed9ab22b7259dccdeeaa9255

    SHA1

    7c8320190f4b1e181ac3f4f46fe1460e224b176d

    SHA256

    f1dbb178517653cdcb19dfbba63628bb99d7130d20f840708eac4a849206b7f3

    SHA512

    d8b9e9801e47e9e0cbf31b91973a434e54881527f593108370ae2b0c138a701073bb06085154a8820fb822c3deacbe03e86398e047cdf4aaafcbb51aa9030646

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exe

    Filesize

    342KB

    MD5

    54e8ebab38449b304323bb4adb1e9d66

    SHA1

    ea341980b2a1205b94162d52d36bc19b2e97b36a

    SHA256

    b8812553faa6e18d0f00b4b8a826d3be2484dcda90da46c4bbf090931137948d

    SHA512

    f350b74b68c4551c99accf215d232096addc8ba2c168e75b6e233efd83a35cd7032fc55e11402f4f097557444dc344d486b62bc374446e057db0b1c4ab1e8d03

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exe

    Filesize

    342KB

    MD5

    54e8ebab38449b304323bb4adb1e9d66

    SHA1

    ea341980b2a1205b94162d52d36bc19b2e97b36a

    SHA256

    b8812553faa6e18d0f00b4b8a826d3be2484dcda90da46c4bbf090931137948d

    SHA512

    f350b74b68c4551c99accf215d232096addc8ba2c168e75b6e233efd83a35cd7032fc55e11402f4f097557444dc344d486b62bc374446e057db0b1c4ab1e8d03

  • memory/2516-136-0x0000000002C50000-0x0000000002C7D000-memory.dmp

    Filesize

    180KB

  • memory/2516-137-0x0000000004650000-0x000000000466A000-memory.dmp

    Filesize

    104KB

  • memory/2516-138-0x00000000071B0000-0x00000000076AE000-memory.dmp

    Filesize

    5.0MB

  • memory/2516-139-0x0000000004870000-0x0000000004888000-memory.dmp

    Filesize

    96KB

  • memory/2516-151-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-163-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-165-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-167-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-161-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-159-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-157-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-155-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-153-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-149-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-147-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-145-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-143-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-141-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-140-0x0000000004870000-0x0000000004882000-memory.dmp

    Filesize

    72KB

  • memory/2516-170-0x0000000004860000-0x0000000004870000-memory.dmp

    Filesize

    64KB

  • memory/2516-169-0x0000000004860000-0x0000000004870000-memory.dmp

    Filesize

    64KB

  • memory/2516-168-0x0000000004860000-0x0000000004870000-memory.dmp

    Filesize

    64KB

  • memory/2516-171-0x0000000000400000-0x0000000002B75000-memory.dmp

    Filesize

    39.5MB

  • memory/2516-173-0x0000000000400000-0x0000000002B75000-memory.dmp

    Filesize

    39.5MB

  • memory/3912-1111-0x0000000000E60000-0x0000000000E92000-memory.dmp

    Filesize

    200KB

  • memory/3912-1113-0x00000000056F0000-0x0000000005700000-memory.dmp

    Filesize

    64KB

  • memory/3912-1112-0x00000000058A0000-0x00000000058EB000-memory.dmp

    Filesize

    300KB

  • memory/3916-180-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-191-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-189-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-187-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-199-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-197-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-201-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-195-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-193-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-206-0x00000000072C0000-0x00000000072D0000-memory.dmp

    Filesize

    64KB

  • memory/3916-208-0x00000000072C0000-0x00000000072D0000-memory.dmp

    Filesize

    64KB

  • memory/3916-210-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-217-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-215-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-213-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-211-0x00000000072C0000-0x00000000072D0000-memory.dmp

    Filesize

    64KB

  • memory/3916-207-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-203-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-204-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/3916-181-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-185-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-183-0x0000000007140000-0x000000000717F000-memory.dmp

    Filesize

    252KB

  • memory/3916-1090-0x00000000077D0000-0x0000000007DD6000-memory.dmp

    Filesize

    6.0MB

  • memory/3916-1091-0x0000000007DE0000-0x0000000007EEA000-memory.dmp

    Filesize

    1.0MB

  • memory/3916-1092-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3916-1093-0x0000000007260000-0x000000000729E000-memory.dmp

    Filesize

    248KB

  • memory/3916-1094-0x00000000072C0000-0x00000000072D0000-memory.dmp

    Filesize

    64KB

  • memory/3916-1095-0x0000000007FF0000-0x000000000803B000-memory.dmp

    Filesize

    300KB

  • memory/3916-1097-0x0000000008170000-0x00000000081D6000-memory.dmp

    Filesize

    408KB

  • memory/3916-1098-0x0000000008830000-0x00000000088C2000-memory.dmp

    Filesize

    584KB

  • memory/3916-1099-0x00000000072C0000-0x00000000072D0000-memory.dmp

    Filesize

    64KB

  • memory/3916-1100-0x00000000072C0000-0x00000000072D0000-memory.dmp

    Filesize

    64KB

  • memory/3916-1101-0x0000000008A30000-0x0000000008AA6000-memory.dmp

    Filesize

    472KB

  • memory/3916-1102-0x0000000008AC0000-0x0000000008B10000-memory.dmp

    Filesize

    320KB

  • memory/3916-179-0x0000000007140000-0x0000000007184000-memory.dmp

    Filesize

    272KB

  • memory/3916-178-0x0000000004C70000-0x0000000004CB6000-memory.dmp

    Filesize

    280KB

  • memory/3916-1103-0x00000000072C0000-0x00000000072D0000-memory.dmp

    Filesize

    64KB

  • memory/3916-1104-0x0000000008D90000-0x0000000008F52000-memory.dmp

    Filesize

    1.8MB

  • memory/3916-1105-0x0000000008F60000-0x000000000948C000-memory.dmp

    Filesize

    5.2MB