Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    97s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 13:56

General

  • Target

    2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe

  • Size

    659KB

  • MD5

    d017fabcfcd10bb0301006800b146038

  • SHA1

    df8045122b218cfa84eb965b22ccd2e94b1a6f42

  • SHA256

    2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124

  • SHA512

    e995277a96a7d3e13f4ba1dd0ee517756cb88a1270f1fb5e819010c3370d6366460c9e1421458626dec7d5d2f1dd5071838c7774b4b1f8f81e91003132c8c7fb

  • SSDEEP

    12288:NMrFy90ly2ZtZnboiWElqPNrTswqpVdU1IKjHQoqBiTVQ9a1eRr99FgN:wy6y2ZtZbpkyfGfzQDj9a1K5IN

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe
    "C:\Users\Admin\AppData\Local\Temp\2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un991171.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un991171.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8634.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8634.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2644
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 1028
          4⤵
          • Program crash
          PID:224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6983.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6983.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4384
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 1316
          4⤵
          • Program crash
          PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si350099.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si350099.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3732
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2644 -ip 2644
    1⤵
      PID:212
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4384 -ip 4384
      1⤵
        PID:4180

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si350099.exe

        Filesize

        175KB

        MD5

        3744f630c55fdec7a90b35397597eabb

        SHA1

        6edd3b6a0fbade60492aa57d3c624dea6f92465c

        SHA256

        bdda940775912b85ee2905982a3d2f31ce993542690ddabf9efa72784ce0fd71

        SHA512

        37937b01350f8d9e97a80ecb1396f63c54e50385cee41d699c7a75e3103512762e5458007de01b177a2ec062c48530e59c6a226f859d6233186b908c6c71524e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si350099.exe

        Filesize

        175KB

        MD5

        3744f630c55fdec7a90b35397597eabb

        SHA1

        6edd3b6a0fbade60492aa57d3c624dea6f92465c

        SHA256

        bdda940775912b85ee2905982a3d2f31ce993542690ddabf9efa72784ce0fd71

        SHA512

        37937b01350f8d9e97a80ecb1396f63c54e50385cee41d699c7a75e3103512762e5458007de01b177a2ec062c48530e59c6a226f859d6233186b908c6c71524e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un991171.exe

        Filesize

        517KB

        MD5

        385db9f30cbd4057296c1dcf1416ff1c

        SHA1

        6518843037e240867c9ed900bc8084c08cf53502

        SHA256

        6d235c83aebb8f21223719a4e4075fc36418c01c6dbc1dfd4866c5f5d65aead9

        SHA512

        87c128676915571cd2642f6d7b3e3b8ed4c90d11cacd38512cf499ca8e99c7c74e7547e6bf9b75901393ddd05fba2c29a1fd8f5d2ce836e034dcf76d58ea6b7d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un991171.exe

        Filesize

        517KB

        MD5

        385db9f30cbd4057296c1dcf1416ff1c

        SHA1

        6518843037e240867c9ed900bc8084c08cf53502

        SHA256

        6d235c83aebb8f21223719a4e4075fc36418c01c6dbc1dfd4866c5f5d65aead9

        SHA512

        87c128676915571cd2642f6d7b3e3b8ed4c90d11cacd38512cf499ca8e99c7c74e7547e6bf9b75901393ddd05fba2c29a1fd8f5d2ce836e034dcf76d58ea6b7d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8634.exe

        Filesize

        295KB

        MD5

        39cf14dea333f519222bd0d39a1b794a

        SHA1

        ccb68070f34cca2ef2de397c4ccf9631cf93a495

        SHA256

        dfe4f7ff144bb4f346de6deac15d58365c68804f7d0ce2619336c70a885bf1c6

        SHA512

        226e385cef31dd817175fb9d31496a631917215d012dfa0a869edc1a764d16135a328cf2217d74db6497c096e1ef7f98425af9841fae0c2fe89c24a70d6e2a65

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8634.exe

        Filesize

        295KB

        MD5

        39cf14dea333f519222bd0d39a1b794a

        SHA1

        ccb68070f34cca2ef2de397c4ccf9631cf93a495

        SHA256

        dfe4f7ff144bb4f346de6deac15d58365c68804f7d0ce2619336c70a885bf1c6

        SHA512

        226e385cef31dd817175fb9d31496a631917215d012dfa0a869edc1a764d16135a328cf2217d74db6497c096e1ef7f98425af9841fae0c2fe89c24a70d6e2a65

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6983.exe

        Filesize

        354KB

        MD5

        9dc8725fd176a7730e6a9594c764bb8f

        SHA1

        f18609cd546cf552cdc7f3952bb2ca79b62d93bb

        SHA256

        c061bd036673a0695df99c27ebc8f1e8708268c9b1dbabf16ee7989e3e9d7dce

        SHA512

        b3ad01f74adc23933e8eeb417c5f4cbb3b826e2379af5a2c5d2b51e9cf6197ca3ba13ca19ef0884e205ab282f6d1ecd394fc2e910b16189d0364030682cb89c1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6983.exe

        Filesize

        354KB

        MD5

        9dc8725fd176a7730e6a9594c764bb8f

        SHA1

        f18609cd546cf552cdc7f3952bb2ca79b62d93bb

        SHA256

        c061bd036673a0695df99c27ebc8f1e8708268c9b1dbabf16ee7989e3e9d7dce

        SHA512

        b3ad01f74adc23933e8eeb417c5f4cbb3b826e2379af5a2c5d2b51e9cf6197ca3ba13ca19ef0884e205ab282f6d1ecd394fc2e910b16189d0364030682cb89c1

      • memory/2644-162-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-168-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-150-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/2644-151-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/2644-152-0x00000000072D0000-0x0000000007874000-memory.dmp

        Filesize

        5.6MB

      • memory/2644-153-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-154-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-156-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-158-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-160-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-148-0x0000000002D00000-0x0000000002D2D000-memory.dmp

        Filesize

        180KB

      • memory/2644-164-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-166-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-149-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/2644-170-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-172-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-174-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-176-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-178-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-180-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2644-181-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/2644-182-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/2644-183-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/2644-184-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/2644-186-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/3732-1121-0x0000000000D70000-0x0000000000DA2000-memory.dmp

        Filesize

        200KB

      • memory/3732-1127-0x00000000058F0000-0x0000000005900000-memory.dmp

        Filesize

        64KB

      • memory/3732-1122-0x00000000058F0000-0x0000000005900000-memory.dmp

        Filesize

        64KB

      • memory/4384-194-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-196-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-199-0x0000000002D20000-0x0000000002D6B000-memory.dmp

        Filesize

        300KB

      • memory/4384-201-0x0000000003090000-0x00000000030A0000-memory.dmp

        Filesize

        64KB

      • memory/4384-198-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-203-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-202-0x0000000003090000-0x00000000030A0000-memory.dmp

        Filesize

        64KB

      • memory/4384-207-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-205-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-209-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-211-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-213-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-215-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-217-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-219-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-221-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-223-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-225-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-227-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-1100-0x00000000079A0000-0x0000000007FB8000-memory.dmp

        Filesize

        6.1MB

      • memory/4384-1101-0x0000000007FC0000-0x00000000080CA000-memory.dmp

        Filesize

        1.0MB

      • memory/4384-1102-0x0000000004F80000-0x0000000004F92000-memory.dmp

        Filesize

        72KB

      • memory/4384-1103-0x0000000003090000-0x00000000030A0000-memory.dmp

        Filesize

        64KB

      • memory/4384-1104-0x00000000080D0000-0x000000000810C000-memory.dmp

        Filesize

        240KB

      • memory/4384-1106-0x00000000083C0000-0x0000000008452000-memory.dmp

        Filesize

        584KB

      • memory/4384-1107-0x0000000008460000-0x00000000084C6000-memory.dmp

        Filesize

        408KB

      • memory/4384-1108-0x0000000003090000-0x00000000030A0000-memory.dmp

        Filesize

        64KB

      • memory/4384-1109-0x0000000003090000-0x00000000030A0000-memory.dmp

        Filesize

        64KB

      • memory/4384-1110-0x0000000003090000-0x00000000030A0000-memory.dmp

        Filesize

        64KB

      • memory/4384-1111-0x0000000008C60000-0x0000000008CD6000-memory.dmp

        Filesize

        472KB

      • memory/4384-1112-0x0000000008CF0000-0x0000000008D40000-memory.dmp

        Filesize

        320KB

      • memory/4384-192-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-191-0x0000000004AD0000-0x0000000004B0F000-memory.dmp

        Filesize

        252KB

      • memory/4384-1113-0x0000000008EB0000-0x0000000009072000-memory.dmp

        Filesize

        1.8MB

      • memory/4384-1114-0x00000000090C0000-0x00000000095EC000-memory.dmp

        Filesize

        5.2MB

      • memory/4384-1115-0x0000000003090000-0x00000000030A0000-memory.dmp

        Filesize

        64KB