Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 21:24

General

  • Target

    0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe

  • Size

    658KB

  • MD5

    e5ea72847ce39944ffc14a2381bb1edb

  • SHA1

    e92fe0291fc288edf6da27b5ba3887f561f8b5a5

  • SHA256

    0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7

  • SHA512

    89fd9e3dfd4ffc85f6f52d8a4150d0ae19fdc10be7174cff80d565ca68e1f8a11e2c039cc3f36d46c74816ff1938f722f7d54d3bec20469eb1b61a8e18fd69f5

  • SSDEEP

    12288:3MrKy90KTv0B8csAyL0XDxIE+jBWPUe9tx+E2Zx+/WnaHD:ty9r0+cVyLQxIe7x+E2zSD

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe
    "C:\Users\Admin\AppData\Local\Temp\0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un103235.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un103235.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5282.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5282.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3384
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 1004
          4⤵
          • Program crash
          PID:4828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8572.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8572.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3988
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 1580
          4⤵
          • Program crash
          PID:4736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si355965.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si355965.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3848
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3384 -ip 3384
    1⤵
      PID:5036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3988 -ip 3988
      1⤵
        PID:1084

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si355965.exe

        Filesize

        176KB

        MD5

        9da77f0723675bff51fd4d37dc6f2420

        SHA1

        7b883083dafe662c8cb4820a03922c64b7e83fdd

        SHA256

        8b747edb122bdeb48354ebc56f223c8207e352871f2e48e2668846b8832f648b

        SHA512

        44f8755cba2f825a4dfa2d26eb04927e7d09932953060dd518b00576299cf88fbec7f4b88a49be7bb975c2f471a80618ed1c9d47fccf74855170ae217da005dd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si355965.exe

        Filesize

        176KB

        MD5

        9da77f0723675bff51fd4d37dc6f2420

        SHA1

        7b883083dafe662c8cb4820a03922c64b7e83fdd

        SHA256

        8b747edb122bdeb48354ebc56f223c8207e352871f2e48e2668846b8832f648b

        SHA512

        44f8755cba2f825a4dfa2d26eb04927e7d09932953060dd518b00576299cf88fbec7f4b88a49be7bb975c2f471a80618ed1c9d47fccf74855170ae217da005dd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un103235.exe

        Filesize

        516KB

        MD5

        be9313886c305560f59a4975c0350193

        SHA1

        8029119fa86b6b6322c8407770c713b33a887603

        SHA256

        726d007a6dbb4772bef9bbe2df3bf871a103a9e396a699b10bcab6b11257f762

        SHA512

        19c9e688a96bb83b479af582112b460723a185e228c5709c011db24bfeb9b894bba3d67ca300941c4a46172633c5a0e0e43fa6dde979db1056cdd8ffdd578219

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un103235.exe

        Filesize

        516KB

        MD5

        be9313886c305560f59a4975c0350193

        SHA1

        8029119fa86b6b6322c8407770c713b33a887603

        SHA256

        726d007a6dbb4772bef9bbe2df3bf871a103a9e396a699b10bcab6b11257f762

        SHA512

        19c9e688a96bb83b479af582112b460723a185e228c5709c011db24bfeb9b894bba3d67ca300941c4a46172633c5a0e0e43fa6dde979db1056cdd8ffdd578219

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5282.exe

        Filesize

        295KB

        MD5

        c139244de12fd747829cffa331c2053f

        SHA1

        8832bd6b55c786c292472c6019686ae96d52ac43

        SHA256

        925f3750dc725f6ec67fbd19535614319a4ad08ab6b547ed5558b3e86ee01d95

        SHA512

        87e82be41aa78e2138956ecb45e27efae867e9ff1716cbf7d5f8393456b14c4a7a80aa2325b5dde25469a91de8a10879efed3562c5e44cae8fc852dbe9e8c3d6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5282.exe

        Filesize

        295KB

        MD5

        c139244de12fd747829cffa331c2053f

        SHA1

        8832bd6b55c786c292472c6019686ae96d52ac43

        SHA256

        925f3750dc725f6ec67fbd19535614319a4ad08ab6b547ed5558b3e86ee01d95

        SHA512

        87e82be41aa78e2138956ecb45e27efae867e9ff1716cbf7d5f8393456b14c4a7a80aa2325b5dde25469a91de8a10879efed3562c5e44cae8fc852dbe9e8c3d6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8572.exe

        Filesize

        354KB

        MD5

        e39f57e362d953e4dc1b11c5e1e81b51

        SHA1

        1fb20214548ea6d2b8d00acb444c544cb700e2d1

        SHA256

        063fe286a6896c8ffcccca715826bac64f38626b14feab9a8a8112f32b4d26d4

        SHA512

        e24639612d0412d81ea3b3e3da367a41fe5eb8fd016db24503f366e807837cc2bdcf3f455733ba9c1cb397bcbfbd2c8ad819de89387dbc4d305a2c34b9818a2e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8572.exe

        Filesize

        354KB

        MD5

        e39f57e362d953e4dc1b11c5e1e81b51

        SHA1

        1fb20214548ea6d2b8d00acb444c544cb700e2d1

        SHA256

        063fe286a6896c8ffcccca715826bac64f38626b14feab9a8a8112f32b4d26d4

        SHA512

        e24639612d0412d81ea3b3e3da367a41fe5eb8fd016db24503f366e807837cc2bdcf3f455733ba9c1cb397bcbfbd2c8ad819de89387dbc4d305a2c34b9818a2e

      • memory/3384-159-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-169-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-150-0x0000000007190000-0x00000000071A0000-memory.dmp

        Filesize

        64KB

      • memory/3384-151-0x0000000007190000-0x00000000071A0000-memory.dmp

        Filesize

        64KB

      • memory/3384-152-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-153-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-155-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-157-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-148-0x00000000071A0000-0x0000000007744000-memory.dmp

        Filesize

        5.6MB

      • memory/3384-161-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-163-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-165-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-167-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-149-0x0000000002BC0000-0x0000000002BED000-memory.dmp

        Filesize

        180KB

      • memory/3384-171-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-173-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-175-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-177-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-179-0x00000000070F0000-0x0000000007102000-memory.dmp

        Filesize

        72KB

      • memory/3384-180-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/3384-181-0x0000000007190000-0x00000000071A0000-memory.dmp

        Filesize

        64KB

      • memory/3384-182-0x0000000007190000-0x00000000071A0000-memory.dmp

        Filesize

        64KB

      • memory/3384-183-0x0000000007190000-0x00000000071A0000-memory.dmp

        Filesize

        64KB

      • memory/3384-185-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/3848-1120-0x00000000008A0000-0x00000000008D2000-memory.dmp

        Filesize

        200KB

      • memory/3848-1122-0x0000000005180000-0x0000000005190000-memory.dmp

        Filesize

        64KB

      • memory/3848-1121-0x0000000005180000-0x0000000005190000-memory.dmp

        Filesize

        64KB

      • memory/3988-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-199-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-197-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-201-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-203-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-205-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-207-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-209-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-211-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-213-0x0000000004840000-0x000000000488B000-memory.dmp

        Filesize

        300KB

      • memory/3988-214-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/3988-215-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-216-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/3988-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-195-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-226-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-1099-0x00000000078D0000-0x0000000007EE8000-memory.dmp

        Filesize

        6.1MB

      • memory/3988-1100-0x0000000007F70000-0x000000000807A000-memory.dmp

        Filesize

        1.0MB

      • memory/3988-1101-0x00000000080B0000-0x00000000080C2000-memory.dmp

        Filesize

        72KB

      • memory/3988-1102-0x00000000080D0000-0x000000000810C000-memory.dmp

        Filesize

        240KB

      • memory/3988-1103-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/3988-1105-0x00000000083C0000-0x0000000008426000-memory.dmp

        Filesize

        408KB

      • memory/3988-1106-0x0000000008A90000-0x0000000008B22000-memory.dmp

        Filesize

        584KB

      • memory/3988-1107-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/3988-1108-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/3988-1109-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/3988-1110-0x0000000008DC0000-0x0000000008F82000-memory.dmp

        Filesize

        1.8MB

      • memory/3988-1111-0x0000000008FA0000-0x00000000094CC000-memory.dmp

        Filesize

        5.2MB

      • memory/3988-193-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-190-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/3988-1112-0x00000000049B0000-0x0000000004A26000-memory.dmp

        Filesize

        472KB

      • memory/3988-1113-0x000000000A7A0000-0x000000000A7F0000-memory.dmp

        Filesize

        320KB

      • memory/3988-1114-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB