Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 14:44

General

  • Target

    0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe

  • Size

    658KB

  • MD5

    591b55a4fe9885d748c1fd044ae614cb

  • SHA1

    6a1c1cd54df03d16af2d77e94de2d12ef2c619fd

  • SHA256

    0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79

  • SHA512

    59578c36a89a58bb802d90b52a8d74da023c1faf4dab2b5792e3395ebe39745aa03fd414cc7fe5094ad6e83b1ea8376b17f3ad291113baf541e8b6e021ea03ab

  • SSDEEP

    12288:5Mr8y90a1yPQDfEIl5V/kJD2O+u8XJVaQCnPG0XVaKjsQoqBibUbwj7:Fyg3Il5V/kSBXJVdCnPnxIQDmUa7

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe
    "C:\Users\Admin\AppData\Local\Temp\0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un010813.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un010813.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7629.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7629.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1200
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 1080
          4⤵
          • Program crash
          PID:3600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0506.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0506.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 1560
          4⤵
          • Program crash
          PID:4308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si604604.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si604604.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1256
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1200 -ip 1200
    1⤵
      PID:4684
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4840 -ip 4840
      1⤵
        PID:5004

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si604604.exe

        Filesize

        175KB

        MD5

        320ed9a07da95271730c1208187f92b7

        SHA1

        540d7cf11521bf862f6efe15edf266b953c72645

        SHA256

        491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af

        SHA512

        2190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si604604.exe

        Filesize

        175KB

        MD5

        320ed9a07da95271730c1208187f92b7

        SHA1

        540d7cf11521bf862f6efe15edf266b953c72645

        SHA256

        491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af

        SHA512

        2190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un010813.exe

        Filesize

        517KB

        MD5

        4550402b8a74604184a3a8390d351ae0

        SHA1

        7075af9b7f9a6720148bdda4cd8838fc75f06bf3

        SHA256

        c5354da6a5795e17abdb6ad17447da52f8bc95a848fb2af238051f023fac15de

        SHA512

        7d3dfdf24aaeaf0ef79c59f9c1603295b17ec2012747e5fe05f723759fef0d74694f13fd7824ee6dfea935fc17b4b7ca5723ffc1db537e6d203869747839407b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un010813.exe

        Filesize

        517KB

        MD5

        4550402b8a74604184a3a8390d351ae0

        SHA1

        7075af9b7f9a6720148bdda4cd8838fc75f06bf3

        SHA256

        c5354da6a5795e17abdb6ad17447da52f8bc95a848fb2af238051f023fac15de

        SHA512

        7d3dfdf24aaeaf0ef79c59f9c1603295b17ec2012747e5fe05f723759fef0d74694f13fd7824ee6dfea935fc17b4b7ca5723ffc1db537e6d203869747839407b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7629.exe

        Filesize

        295KB

        MD5

        028d599331e8685115c2805bf0106160

        SHA1

        d2b4e41ada86195ce5fca5d7e11aa700ef10a0ab

        SHA256

        b26c9181f3f23e4856728b5d6f830a630c187a15eca8d00a0d985bcea3355cd3

        SHA512

        842689808c970189b232f43801d9f33b16f89cc622851580c0235c3b116a8b5ffc3b82afe46fbf6cb6ace34366975dd10545f0e10937e760f3c352e62594c66b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7629.exe

        Filesize

        295KB

        MD5

        028d599331e8685115c2805bf0106160

        SHA1

        d2b4e41ada86195ce5fca5d7e11aa700ef10a0ab

        SHA256

        b26c9181f3f23e4856728b5d6f830a630c187a15eca8d00a0d985bcea3355cd3

        SHA512

        842689808c970189b232f43801d9f33b16f89cc622851580c0235c3b116a8b5ffc3b82afe46fbf6cb6ace34366975dd10545f0e10937e760f3c352e62594c66b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0506.exe

        Filesize

        354KB

        MD5

        06fc1c2c8659c7f00591e2d67309837d

        SHA1

        0eeee5d5dcc676c7c3b4408a52deb84522b09ccb

        SHA256

        a8abde98befa51485ea173636a21d5a40af764ae8d510ed782d190c93c78628c

        SHA512

        20cfec687e77614951cf49566063dc2602570b99dccb8884c33290f192802e7dc898d398c070fc4394db6162ca251b425874068fdd54dd67f390d16f4b31e5fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0506.exe

        Filesize

        354KB

        MD5

        06fc1c2c8659c7f00591e2d67309837d

        SHA1

        0eeee5d5dcc676c7c3b4408a52deb84522b09ccb

        SHA256

        a8abde98befa51485ea173636a21d5a40af764ae8d510ed782d190c93c78628c

        SHA512

        20cfec687e77614951cf49566063dc2602570b99dccb8884c33290f192802e7dc898d398c070fc4394db6162ca251b425874068fdd54dd67f390d16f4b31e5fb

      • memory/1200-148-0x0000000007230000-0x00000000077D4000-memory.dmp

        Filesize

        5.6MB

      • memory/1200-149-0x0000000002CF0000-0x0000000002D1D000-memory.dmp

        Filesize

        180KB

      • memory/1200-151-0x0000000002E50000-0x0000000002E60000-memory.dmp

        Filesize

        64KB

      • memory/1200-150-0x0000000002E50000-0x0000000002E60000-memory.dmp

        Filesize

        64KB

      • memory/1200-152-0x0000000002E50000-0x0000000002E60000-memory.dmp

        Filesize

        64KB

      • memory/1200-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1200-181-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/1200-182-0x0000000002E50000-0x0000000002E60000-memory.dmp

        Filesize

        64KB

      • memory/1200-183-0x0000000002E50000-0x0000000002E60000-memory.dmp

        Filesize

        64KB

      • memory/1200-184-0x0000000002E50000-0x0000000002E60000-memory.dmp

        Filesize

        64KB

      • memory/1200-186-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/1256-1123-0x0000000000120000-0x0000000000152000-memory.dmp

        Filesize

        200KB

      • memory/1256-1125-0x00000000049F0000-0x0000000004A00000-memory.dmp

        Filesize

        64KB

      • memory/1256-1124-0x00000000049F0000-0x0000000004A00000-memory.dmp

        Filesize

        64KB

      • memory/4840-192-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/4840-228-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-195-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/4840-196-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-198-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-200-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-202-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-204-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-206-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-208-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-210-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-212-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-214-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-216-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-218-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-220-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-222-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-224-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-226-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-194-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

        Filesize

        252KB

      • memory/4840-1101-0x00000000078E0000-0x0000000007EF8000-memory.dmp

        Filesize

        6.1MB

      • memory/4840-1102-0x0000000007F70000-0x000000000807A000-memory.dmp

        Filesize

        1.0MB

      • memory/4840-1103-0x00000000080B0000-0x00000000080C2000-memory.dmp

        Filesize

        72KB

      • memory/4840-1104-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/4840-1105-0x00000000080D0000-0x000000000810C000-memory.dmp

        Filesize

        240KB

      • memory/4840-1107-0x00000000083C0000-0x0000000008426000-memory.dmp

        Filesize

        408KB

      • memory/4840-1108-0x0000000008A80000-0x0000000008B12000-memory.dmp

        Filesize

        584KB

      • memory/4840-1110-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/4840-1109-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/4840-1111-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/4840-1112-0x0000000008C80000-0x0000000008E42000-memory.dmp

        Filesize

        1.8MB

      • memory/4840-1113-0x0000000008E60000-0x000000000938C000-memory.dmp

        Filesize

        5.2MB

      • memory/4840-193-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/4840-191-0x0000000004880000-0x00000000048CB000-memory.dmp

        Filesize

        300KB

      • memory/4840-1114-0x00000000094E0000-0x0000000009556000-memory.dmp

        Filesize

        472KB

      • memory/4840-1115-0x0000000009560000-0x00000000095B0000-memory.dmp

        Filesize

        320KB

      • memory/4840-1116-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB