Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    50s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/04/2023, 17:09

General

  • Target

    ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe

  • Size

    658KB

  • MD5

    483bb6e412a1a6bd1ba41f527edfc2aa

  • SHA1

    fed429fb658ded6c011e90589a6794029c517141

  • SHA256

    ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8

  • SHA512

    f767ef8a32d97010c6720a5f65d661ada72be6af0169f64f2b49892ac460545ad1d4ba2a1746cbfdfb8c541fa37f9bafaf2b064271b8f1bd067aae5deeb71f45

  • SSDEEP

    12288:8Mrwy90mK2lbGpI06XEz/KgqvjBWP2rgF8cki+EvZx9vrdjbkH230:8yn3lbG78ZRZi+Evz9vrVGS0

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe
    "C:\Users\Admin\AppData\Local\Temp\ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285558.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285558.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9723.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9723.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1471.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1471.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si235985.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si235985.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5072

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si235985.exe

    Filesize

    175KB

    MD5

    8ef4c666bfd761a945adf2d673543588

    SHA1

    182976a90feeeb42a2855df1eae7724d8c64c498

    SHA256

    39d9a6f1dea3a3b41b5c7db47851110ba9bd64332d477f1e3380eb64910b5cb7

    SHA512

    a30a82ba892f431a1bbeda7d6607cbe13c35763c8174fc78c2a8b0a006452d7c85471c5fc44c7440dd4e641f1709d8bbb102c00936a8d0e89cb8a402fe2e03b3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si235985.exe

    Filesize

    175KB

    MD5

    8ef4c666bfd761a945adf2d673543588

    SHA1

    182976a90feeeb42a2855df1eae7724d8c64c498

    SHA256

    39d9a6f1dea3a3b41b5c7db47851110ba9bd64332d477f1e3380eb64910b5cb7

    SHA512

    a30a82ba892f431a1bbeda7d6607cbe13c35763c8174fc78c2a8b0a006452d7c85471c5fc44c7440dd4e641f1709d8bbb102c00936a8d0e89cb8a402fe2e03b3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285558.exe

    Filesize

    516KB

    MD5

    c0c3620611ce52aea3588ac716e94650

    SHA1

    72ba8f5ba4f891015e942714d99ea3007fdc290f

    SHA256

    5da0254ab9f656049ef55940bf4ab5b934c77ad12e4953efb7c5430e457a09d6

    SHA512

    ad8aadfe3d020a9896b53f1bcfe87cbdde004f04d336de32d8c61fdec23fb535c7c1d938c196235cfb7bb0b379a4655143acb7e30362b30c864e699194b9b35b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285558.exe

    Filesize

    516KB

    MD5

    c0c3620611ce52aea3588ac716e94650

    SHA1

    72ba8f5ba4f891015e942714d99ea3007fdc290f

    SHA256

    5da0254ab9f656049ef55940bf4ab5b934c77ad12e4953efb7c5430e457a09d6

    SHA512

    ad8aadfe3d020a9896b53f1bcfe87cbdde004f04d336de32d8c61fdec23fb535c7c1d938c196235cfb7bb0b379a4655143acb7e30362b30c864e699194b9b35b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9723.exe

    Filesize

    295KB

    MD5

    64259891ec4b65da75367a987ca963ce

    SHA1

    bb4f84e2c295c9004f269b0f29f9035573d4b926

    SHA256

    a2d84ec1b045eac77066313792bb26a70067a03a69b1954d70494e67c38c4604

    SHA512

    2d609fbe073771130b236cfa8f4192ebf7a1066422898f7bf547eb6cf5213f7a44cc3409de20ac90aad672e12f748298f60347c913ae5ec61cc975d8c1d63fa7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9723.exe

    Filesize

    295KB

    MD5

    64259891ec4b65da75367a987ca963ce

    SHA1

    bb4f84e2c295c9004f269b0f29f9035573d4b926

    SHA256

    a2d84ec1b045eac77066313792bb26a70067a03a69b1954d70494e67c38c4604

    SHA512

    2d609fbe073771130b236cfa8f4192ebf7a1066422898f7bf547eb6cf5213f7a44cc3409de20ac90aad672e12f748298f60347c913ae5ec61cc975d8c1d63fa7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1471.exe

    Filesize

    354KB

    MD5

    486ac47f1fc876fed537d896b0d9d48d

    SHA1

    1302c37fff24a0f5c4c84d7ae562c534a0dfbd37

    SHA256

    0a2fc121de460c7119c6989eecaba1d9ded5a31a023e59f5799e8a866584f6a9

    SHA512

    124c7dc8f6066772e3e4849ec344585ef986284e306324b8aa51c415d4a5191f764066c80544a6824becf83ac50f03b346e40edcf1e01174a7ae81e3159a98b2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1471.exe

    Filesize

    354KB

    MD5

    486ac47f1fc876fed537d896b0d9d48d

    SHA1

    1302c37fff24a0f5c4c84d7ae562c534a0dfbd37

    SHA256

    0a2fc121de460c7119c6989eecaba1d9ded5a31a023e59f5799e8a866584f6a9

    SHA512

    124c7dc8f6066772e3e4849ec344585ef986284e306324b8aa51c415d4a5191f764066c80544a6824becf83ac50f03b346e40edcf1e01174a7ae81e3159a98b2

  • memory/3736-1093-0x0000000007D30000-0x0000000007E3A000-memory.dmp

    Filesize

    1.0MB

  • memory/3736-236-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3736-1108-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3736-1107-0x00000000091C0000-0x0000000009210000-memory.dmp

    Filesize

    320KB

  • memory/3736-1106-0x0000000009120000-0x0000000009196000-memory.dmp

    Filesize

    472KB

  • memory/3736-1105-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3736-197-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-1104-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3736-1103-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3736-201-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-1102-0x0000000008B00000-0x000000000902C000-memory.dmp

    Filesize

    5.2MB

  • memory/3736-1101-0x0000000008930000-0x0000000008AF2000-memory.dmp

    Filesize

    1.8MB

  • memory/3736-1100-0x0000000008830000-0x00000000088C2000-memory.dmp

    Filesize

    584KB

  • memory/3736-1099-0x0000000008170000-0x00000000081D6000-memory.dmp

    Filesize

    408KB

  • memory/3736-1097-0x0000000007FE0000-0x000000000802B000-memory.dmp

    Filesize

    300KB

  • memory/3736-1096-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3736-1095-0x0000000007E90000-0x0000000007ECE000-memory.dmp

    Filesize

    248KB

  • memory/3736-1094-0x0000000007E70000-0x0000000007E82000-memory.dmp

    Filesize

    72KB

  • memory/3736-1092-0x00000000076A0000-0x0000000007CA6000-memory.dmp

    Filesize

    6.0MB

  • memory/3736-199-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-232-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3736-235-0x0000000007070000-0x0000000007080000-memory.dmp

    Filesize

    64KB

  • memory/3736-231-0x0000000002C60000-0x0000000002CAB000-memory.dmp

    Filesize

    300KB

  • memory/3736-215-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-180-0x00000000047F0000-0x0000000004836000-memory.dmp

    Filesize

    280KB

  • memory/3736-181-0x0000000007010000-0x0000000007054000-memory.dmp

    Filesize

    272KB

  • memory/3736-182-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-183-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-185-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-187-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-191-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-189-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-193-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-195-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-213-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-209-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-211-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-203-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-205-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/3736-207-0x0000000007010000-0x000000000704F000-memory.dmp

    Filesize

    252KB

  • memory/4256-171-0x0000000000400000-0x0000000002B78000-memory.dmp

    Filesize

    39.5MB

  • memory/4256-154-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-148-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-139-0x0000000002B80000-0x0000000002BAD000-memory.dmp

    Filesize

    180KB

  • memory/4256-140-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4256-175-0x0000000000400000-0x0000000002B78000-memory.dmp

    Filesize

    39.5MB

  • memory/4256-174-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4256-172-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4256-141-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4256-138-0x00000000047B0000-0x00000000047C8000-memory.dmp

    Filesize

    96KB

  • memory/4256-170-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-168-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-166-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-164-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-162-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-160-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-158-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-156-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-152-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-150-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-146-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-144-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-143-0x00000000047B0000-0x00000000047C2000-memory.dmp

    Filesize

    72KB

  • memory/4256-142-0x00000000072E0000-0x00000000072F0000-memory.dmp

    Filesize

    64KB

  • memory/4256-137-0x00000000072F0000-0x00000000077EE000-memory.dmp

    Filesize

    5.0MB

  • memory/4256-136-0x0000000002DC0000-0x0000000002DDA000-memory.dmp

    Filesize

    104KB

  • memory/5072-1114-0x0000000000FE0000-0x0000000001012000-memory.dmp

    Filesize

    200KB

  • memory/5072-1115-0x0000000003410000-0x000000000345B000-memory.dmp

    Filesize

    300KB

  • memory/5072-1116-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

    Filesize

    64KB

  • memory/5072-1117-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

    Filesize

    64KB