Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    98s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 11:37

General

  • Target

    dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe

  • Size

    531KB

  • MD5

    b1507b9cd0b170821cc2d6fe2c4097f6

  • SHA1

    0d8f3e577b46a3a7610143c8468a71cce2ddbb2a

  • SHA256

    dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc

  • SHA512

    eddd5852660bfdfad12da438a83b554858586a06e2abf39f57b519aa46d8be9ac3bfb379826a6ea8d8b1d8f3e21dcb4b67557c0233229ff02dc3c7e09b977134

  • SSDEEP

    12288:wMrqy90+sXdSt/S3oPbjJmv51oV1kfwPa57+DD/:KyyXddoPbEM1a7I

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe
    "C:\Users\Admin\AppData\Local\Temp\dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziet8081.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziet8081.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr682944.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr682944.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku381639.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku381639.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:492
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 492 -s 1896
          4⤵
          • Program crash
          PID:4840
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr451204.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr451204.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2452
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 492 -ip 492
    1⤵
      PID:1952

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr451204.exe

      Filesize

      176KB

      MD5

      f31e43e77eec0ee82027897b8cf8e2c6

      SHA1

      ec5b20827e2d5fdadab3cb595ed7cd5bd4e6f673

      SHA256

      c4aea6f251ecba22e41ed4ae684da6d290bda48254ac718a8c9e64940df4e30e

      SHA512

      9ec406087572d4736d14d97b32baf13fc6680ad78c2deca81a1a940034046d30efdf414d97418d0bb8503d3aa2b0d1142e41673a196f539d9a99aac84cbfa1e5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr451204.exe

      Filesize

      176KB

      MD5

      f31e43e77eec0ee82027897b8cf8e2c6

      SHA1

      ec5b20827e2d5fdadab3cb595ed7cd5bd4e6f673

      SHA256

      c4aea6f251ecba22e41ed4ae684da6d290bda48254ac718a8c9e64940df4e30e

      SHA512

      9ec406087572d4736d14d97b32baf13fc6680ad78c2deca81a1a940034046d30efdf414d97418d0bb8503d3aa2b0d1142e41673a196f539d9a99aac84cbfa1e5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziet8081.exe

      Filesize

      389KB

      MD5

      fef77f81a9b4f01240c6e839fd580991

      SHA1

      595d57c811154c56269dd382f532bb4d05cb3310

      SHA256

      dbcea9081a82afa6be1ff9adfe658fce599e059e09f28df410edde574fbeabff

      SHA512

      f70246267f33041b7713da040826e8daa4d81d417402fca496d42309c1dcc1287d8dbce9c68f86b35e81e631e6b6142fded32adf393fc09ae712ae1d18aa6d96

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziet8081.exe

      Filesize

      389KB

      MD5

      fef77f81a9b4f01240c6e839fd580991

      SHA1

      595d57c811154c56269dd382f532bb4d05cb3310

      SHA256

      dbcea9081a82afa6be1ff9adfe658fce599e059e09f28df410edde574fbeabff

      SHA512

      f70246267f33041b7713da040826e8daa4d81d417402fca496d42309c1dcc1287d8dbce9c68f86b35e81e631e6b6142fded32adf393fc09ae712ae1d18aa6d96

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr682944.exe

      Filesize

      12KB

      MD5

      a4cb641215ee47f285df25acd5b70c9c

      SHA1

      23787c6cfb129c3bd069d8867817e4d4d2754f7d

      SHA256

      088939fcce9169cb72794761fc0fd4968c1ca833d969563e60dacaef430496bf

      SHA512

      a22f3a3861b84bb57538ae7256138dfb2b49c9e583bd566fd68cd953166e78429eb4892f5ad3f17b34e9c0397a67c3ff6c421553798e56eac25d44e63f501443

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr682944.exe

      Filesize

      12KB

      MD5

      a4cb641215ee47f285df25acd5b70c9c

      SHA1

      23787c6cfb129c3bd069d8867817e4d4d2754f7d

      SHA256

      088939fcce9169cb72794761fc0fd4968c1ca833d969563e60dacaef430496bf

      SHA512

      a22f3a3861b84bb57538ae7256138dfb2b49c9e583bd566fd68cd953166e78429eb4892f5ad3f17b34e9c0397a67c3ff6c421553798e56eac25d44e63f501443

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku381639.exe

      Filesize

      355KB

      MD5

      5f47c92883cf6a14a8e15c6c4bd31ae3

      SHA1

      cb924fbf5008c17fad5d2e32ff74d651528c1995

      SHA256

      1482a956fa86f7347ab115daf1444fa45852cdf577bd9cb5ca5ac22e898568ad

      SHA512

      8d00ed8e21fe8509eb665d9b37997c531f28951b3e330b419c66a20ac97d3737e57c96fec8e6e850823a5c3fddf7b3eafe97d2203e0e0e54548ba35d7c5db783

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku381639.exe

      Filesize

      355KB

      MD5

      5f47c92883cf6a14a8e15c6c4bd31ae3

      SHA1

      cb924fbf5008c17fad5d2e32ff74d651528c1995

      SHA256

      1482a956fa86f7347ab115daf1444fa45852cdf577bd9cb5ca5ac22e898568ad

      SHA512

      8d00ed8e21fe8509eb665d9b37997c531f28951b3e330b419c66a20ac97d3737e57c96fec8e6e850823a5c3fddf7b3eafe97d2203e0e0e54548ba35d7c5db783

    • memory/492-153-0x00000000072B0000-0x0000000007854000-memory.dmp

      Filesize

      5.6MB

    • memory/492-155-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/492-154-0x0000000004800000-0x000000000484B000-memory.dmp

      Filesize

      300KB

    • memory/492-156-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/492-157-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/492-158-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-159-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-161-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-163-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-165-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-167-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-169-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-171-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-173-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-175-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-177-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-179-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-181-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-183-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-185-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-187-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-189-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-191-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-193-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-195-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-197-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-199-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-201-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-203-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-205-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-207-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-209-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-211-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-213-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-215-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-217-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-219-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-221-0x0000000007150000-0x000000000718F000-memory.dmp

      Filesize

      252KB

    • memory/492-1064-0x0000000007960000-0x0000000007F78000-memory.dmp

      Filesize

      6.1MB

    • memory/492-1065-0x0000000007F80000-0x000000000808A000-memory.dmp

      Filesize

      1.0MB

    • memory/492-1066-0x00000000080B0000-0x00000000080C2000-memory.dmp

      Filesize

      72KB

    • memory/492-1067-0x00000000080D0000-0x000000000810C000-memory.dmp

      Filesize

      240KB

    • memory/492-1068-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/492-1070-0x00000000083C0000-0x0000000008452000-memory.dmp

      Filesize

      584KB

    • memory/492-1071-0x0000000008460000-0x00000000084C6000-memory.dmp

      Filesize

      408KB

    • memory/492-1072-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/492-1073-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/492-1074-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/492-1075-0x0000000008B90000-0x0000000008D52000-memory.dmp

      Filesize

      1.8MB

    • memory/492-1076-0x0000000008D60000-0x000000000928C000-memory.dmp

      Filesize

      5.2MB

    • memory/492-1077-0x0000000009500000-0x0000000009576000-memory.dmp

      Filesize

      472KB

    • memory/492-1078-0x0000000009580000-0x00000000095D0000-memory.dmp

      Filesize

      320KB

    • memory/492-1079-0x00000000072A0000-0x00000000072B0000-memory.dmp

      Filesize

      64KB

    • memory/652-147-0x0000000000800000-0x000000000080A000-memory.dmp

      Filesize

      40KB

    • memory/2452-1086-0x0000000000370000-0x00000000003A2000-memory.dmp

      Filesize

      200KB

    • memory/2452-1087-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

      Filesize

      64KB