Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 12:37

General

  • Target

    18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe

  • Size

    530KB

  • MD5

    a7aa0da9b0d5f4f9ae4422bedfb85ff2

  • SHA1

    ffaa2e1b47508b0403a5ac9e35fda09dfb3927a4

  • SHA256

    18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85

  • SHA512

    6b34351acd4e3e14b3e53bd57eceae340318c7e3dc44d73e2b7c76b5daddd3b93b082018ac28bd5de8ce6fff503c611cf89aba3610dd0d85ad4218a8220079e9

  • SSDEEP

    12288:KMrZy90m2ig/f+demCgtjPehT9Aijv5VnJdF/oA:/yc+Bptu9AijBVuA

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe
    "C:\Users\Admin\AppData\Local\Temp\18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGG4145.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGG4145.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr951028.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr951028.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku005015.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku005015.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4340
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 1920
          4⤵
          • Program crash
          PID:4604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr086789.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr086789.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4340 -ip 4340
    1⤵
      PID:4708

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr086789.exe

      Filesize

      175KB

      MD5

      be8df8ae835624cfe4922352f7719058

      SHA1

      92be69c54956200d41f9e97c69952463d826744a

      SHA256

      6b5bbef61a2369448a918979428c77695c567df4dde01aa4bcbcf59d554bc69b

      SHA512

      d308fae0bee81544dac0639aa54e15ce7f80b04afae6b13b44e6685dda80a06db57687139f245331115aa3bf77389e6fa9d122d8e707c3ddef999c24f7e0b6e3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr086789.exe

      Filesize

      175KB

      MD5

      be8df8ae835624cfe4922352f7719058

      SHA1

      92be69c54956200d41f9e97c69952463d826744a

      SHA256

      6b5bbef61a2369448a918979428c77695c567df4dde01aa4bcbcf59d554bc69b

      SHA512

      d308fae0bee81544dac0639aa54e15ce7f80b04afae6b13b44e6685dda80a06db57687139f245331115aa3bf77389e6fa9d122d8e707c3ddef999c24f7e0b6e3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGG4145.exe

      Filesize

      388KB

      MD5

      50d47c35203dcba35b7e91e995560e9c

      SHA1

      60972531d7455af886133bd29e6c4704111f994d

      SHA256

      d0c8811959366ee1d96fe088a9da5989cbea2bbff054b3852906ea2a38461b4c

      SHA512

      913a67cdd504d3e45d0cfff8a530608d5959992649f360b1d84b599f33c8024f92b05ab2c9c591c44440aec77bd2c964a4f9cca54560c15eb694c7983a692eaa

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGG4145.exe

      Filesize

      388KB

      MD5

      50d47c35203dcba35b7e91e995560e9c

      SHA1

      60972531d7455af886133bd29e6c4704111f994d

      SHA256

      d0c8811959366ee1d96fe088a9da5989cbea2bbff054b3852906ea2a38461b4c

      SHA512

      913a67cdd504d3e45d0cfff8a530608d5959992649f360b1d84b599f33c8024f92b05ab2c9c591c44440aec77bd2c964a4f9cca54560c15eb694c7983a692eaa

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr951028.exe

      Filesize

      11KB

      MD5

      dc60f0c6c3c7a8ac4f2a4f95a36f94bc

      SHA1

      5daba85b1a40c2ca8e34ff00612e8070cd426768

      SHA256

      338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4

      SHA512

      f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr951028.exe

      Filesize

      11KB

      MD5

      dc60f0c6c3c7a8ac4f2a4f95a36f94bc

      SHA1

      5daba85b1a40c2ca8e34ff00612e8070cd426768

      SHA256

      338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4

      SHA512

      f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku005015.exe

      Filesize

      355KB

      MD5

      9e857f425cd92216c513e43c3109eb8d

      SHA1

      00678d8a8180057f0b4e7902f682429d13ff7a41

      SHA256

      8c993b3886241cddf1cac98f45c349f8ac06e798261d9fac17f56439a4c86373

      SHA512

      b4c434ff193a2cb78d6bb355cdae4fb99c9e837732f6bfd8b74c0a019c0accfd5d9de30654f1c8ef5a0773d51734d5a73338f54895e9c889d99b1232b2719def

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku005015.exe

      Filesize

      355KB

      MD5

      9e857f425cd92216c513e43c3109eb8d

      SHA1

      00678d8a8180057f0b4e7902f682429d13ff7a41

      SHA256

      8c993b3886241cddf1cac98f45c349f8ac06e798261d9fac17f56439a4c86373

      SHA512

      b4c434ff193a2cb78d6bb355cdae4fb99c9e837732f6bfd8b74c0a019c0accfd5d9de30654f1c8ef5a0773d51734d5a73338f54895e9c889d99b1232b2719def

    • memory/2808-1085-0x0000000000BA0000-0x0000000000BD2000-memory.dmp

      Filesize

      200KB

    • memory/2808-1086-0x0000000005460000-0x0000000005470000-memory.dmp

      Filesize

      64KB

    • memory/2808-1087-0x0000000005460000-0x0000000005470000-memory.dmp

      Filesize

      64KB

    • memory/3848-147-0x0000000000FB0000-0x0000000000FBA000-memory.dmp

      Filesize

      40KB

    • memory/4340-189-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-203-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-155-0x00000000071C0000-0x00000000071D0000-memory.dmp

      Filesize

      64KB

    • memory/4340-157-0x00000000071C0000-0x00000000071D0000-memory.dmp

      Filesize

      64KB

    • memory/4340-158-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-161-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-159-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-163-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-165-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-167-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-169-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-171-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-173-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-175-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-177-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-179-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-181-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-183-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-185-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-187-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-154-0x00000000047C0000-0x000000000480B000-memory.dmp

      Filesize

      300KB

    • memory/4340-191-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-193-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-195-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-197-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-199-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-201-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-156-0x00000000071C0000-0x00000000071D0000-memory.dmp

      Filesize

      64KB

    • memory/4340-205-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-207-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-209-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-211-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-213-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-215-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-217-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-219-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-221-0x0000000007130000-0x000000000716F000-memory.dmp

      Filesize

      252KB

    • memory/4340-1064-0x0000000007790000-0x0000000007DA8000-memory.dmp

      Filesize

      6.1MB

    • memory/4340-1065-0x0000000007E30000-0x0000000007F3A000-memory.dmp

      Filesize

      1.0MB

    • memory/4340-1066-0x0000000007F70000-0x0000000007F82000-memory.dmp

      Filesize

      72KB

    • memory/4340-1067-0x0000000007F90000-0x0000000007FCC000-memory.dmp

      Filesize

      240KB

    • memory/4340-1068-0x00000000071C0000-0x00000000071D0000-memory.dmp

      Filesize

      64KB

    • memory/4340-1070-0x0000000008280000-0x00000000082E6000-memory.dmp

      Filesize

      408KB

    • memory/4340-1071-0x0000000008930000-0x00000000089C2000-memory.dmp

      Filesize

      584KB

    • memory/4340-1072-0x0000000008A20000-0x0000000008A96000-memory.dmp

      Filesize

      472KB

    • memory/4340-1073-0x0000000008AB0000-0x0000000008B00000-memory.dmp

      Filesize

      320KB

    • memory/4340-1074-0x00000000071C0000-0x00000000071D0000-memory.dmp

      Filesize

      64KB

    • memory/4340-1075-0x00000000071C0000-0x00000000071D0000-memory.dmp

      Filesize

      64KB

    • memory/4340-153-0x00000000071D0000-0x0000000007774000-memory.dmp

      Filesize

      5.6MB

    • memory/4340-1076-0x00000000071C0000-0x00000000071D0000-memory.dmp

      Filesize

      64KB

    • memory/4340-1077-0x0000000008D60000-0x0000000008F22000-memory.dmp

      Filesize

      1.8MB

    • memory/4340-1078-0x0000000008F40000-0x000000000946C000-memory.dmp

      Filesize

      5.2MB

    • memory/4340-1079-0x00000000071C0000-0x00000000071D0000-memory.dmp

      Filesize

      64KB