Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    52s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 23:17

General

  • Target

    20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe

  • Size

    537KB

  • MD5

    f33ab5631c92a2074f1e1717f4a6cac1

  • SHA1

    5803472698b721660bdbf45a84fb752bef3e5a33

  • SHA256

    20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65

  • SHA512

    f8e3fc7cec7c4531540514ccdb8bc1ac1136f342d5b8f8bee9ffb5e995a341cc78bf7f1a730c27b0de6d100a8d7015340c43a163af06bde768caa46f006673b3

  • SSDEEP

    12288:bMrIy90qRlgyhIs0fygnVszSy8GUN65HLwxsbArI5hJoU:7ynZ9gK2y8G1rw3kL

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe
    "C:\Users\Admin\AppData\Local\Temp\20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimJ7207.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimJ7207.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5084
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr192249.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr192249.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918631.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918631.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr912131.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr912131.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr912131.exe

    Filesize

    176KB

    MD5

    7dea0a7e19c8a2bfae59653e87b3bef4

    SHA1

    5986d669f33997e360a85694c68ad0df0f4f0a08

    SHA256

    93fd214bad0d6c2955d050d94bcca02c225941fb2a41790a477d50fc87c1ccde

    SHA512

    e63543796cbc635174f9a9d26139f5c2dfaf9378c60d41edd22503dedab34243be5cf3bfb910595fb1e1fb93b55c411f5389826aced666fa8f49251ffaa8a39e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr912131.exe

    Filesize

    176KB

    MD5

    7dea0a7e19c8a2bfae59653e87b3bef4

    SHA1

    5986d669f33997e360a85694c68ad0df0f4f0a08

    SHA256

    93fd214bad0d6c2955d050d94bcca02c225941fb2a41790a477d50fc87c1ccde

    SHA512

    e63543796cbc635174f9a9d26139f5c2dfaf9378c60d41edd22503dedab34243be5cf3bfb910595fb1e1fb93b55c411f5389826aced666fa8f49251ffaa8a39e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimJ7207.exe

    Filesize

    395KB

    MD5

    c018c86a498f30c34eeea6ab8c979dd1

    SHA1

    f80ccba8b0126fcebf72fec341c83ed1258147e6

    SHA256

    ec369cd5c8825ff93ab4d3457ca182d740d81958f85c75396dd8c7f5092e4183

    SHA512

    23672ff7edf1529e78d970fe30b3f9b82ab0d628f829873ad1306dbf19d74fba4fe0f535fbba39b289e9c33f0c90cb1a2ef99442d3f8e97cf9d57f01af689fc5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimJ7207.exe

    Filesize

    395KB

    MD5

    c018c86a498f30c34eeea6ab8c979dd1

    SHA1

    f80ccba8b0126fcebf72fec341c83ed1258147e6

    SHA256

    ec369cd5c8825ff93ab4d3457ca182d740d81958f85c75396dd8c7f5092e4183

    SHA512

    23672ff7edf1529e78d970fe30b3f9b82ab0d628f829873ad1306dbf19d74fba4fe0f535fbba39b289e9c33f0c90cb1a2ef99442d3f8e97cf9d57f01af689fc5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr192249.exe

    Filesize

    13KB

    MD5

    399fd287617926ea11494000d081b5f6

    SHA1

    5f5778e65478bdbbaa808dabfd8893521a8bb006

    SHA256

    045e48d5b262b22faf61d6d996ba113f2fe587b2416b91778ce1b36f4f77f505

    SHA512

    ef11967bc741e9e9b614213575a110eb167f8a8834c177f8afb2771a06c3c76014188b7461666b23bea45ea5e2f9ba3e1f5107067460f4c4451bcf1570c404ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr192249.exe

    Filesize

    13KB

    MD5

    399fd287617926ea11494000d081b5f6

    SHA1

    5f5778e65478bdbbaa808dabfd8893521a8bb006

    SHA256

    045e48d5b262b22faf61d6d996ba113f2fe587b2416b91778ce1b36f4f77f505

    SHA512

    ef11967bc741e9e9b614213575a110eb167f8a8834c177f8afb2771a06c3c76014188b7461666b23bea45ea5e2f9ba3e1f5107067460f4c4451bcf1570c404ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918631.exe

    Filesize

    352KB

    MD5

    81b591b699fc2742e29809f6c670dd16

    SHA1

    3a9cdba3e9e1eab58ee0d75908af9be199d55e24

    SHA256

    9522097f2186946843f42778e7a3c1a5f579baf39855e9907dcc648ac26d5af0

    SHA512

    be4d4f53e82913832a8088178f1d4ce5f642cf88b5ff6fc341a39328bb4d7a3a87991b6045a7d77f057cf2b1936af055fd1b8a7cd8fbf083a0c708130692cd7f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918631.exe

    Filesize

    352KB

    MD5

    81b591b699fc2742e29809f6c670dd16

    SHA1

    3a9cdba3e9e1eab58ee0d75908af9be199d55e24

    SHA256

    9522097f2186946843f42778e7a3c1a5f579baf39855e9907dcc648ac26d5af0

    SHA512

    be4d4f53e82913832a8088178f1d4ce5f642cf88b5ff6fc341a39328bb4d7a3a87991b6045a7d77f057cf2b1936af055fd1b8a7cd8fbf083a0c708130692cd7f

  • memory/3444-1074-0x0000000000640000-0x0000000000672000-memory.dmp

    Filesize

    200KB

  • memory/3444-1075-0x0000000004F20000-0x0000000004F6B000-memory.dmp

    Filesize

    300KB

  • memory/3444-1076-0x00000000052C0000-0x00000000052D0000-memory.dmp

    Filesize

    64KB

  • memory/3840-135-0x0000000000A00000-0x0000000000A0A000-memory.dmp

    Filesize

    40KB

  • memory/5100-175-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-189-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-144-0x0000000004E20000-0x000000000531E000-memory.dmp

    Filesize

    5.0MB

  • memory/5100-145-0x0000000004D80000-0x0000000004DC4000-memory.dmp

    Filesize

    272KB

  • memory/5100-146-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/5100-147-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/5100-148-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-149-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-151-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-153-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-155-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-157-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-159-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-161-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-163-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-165-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-167-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-169-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-171-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-173-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-142-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/5100-177-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-179-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-181-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-183-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-185-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-187-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-143-0x0000000004D00000-0x0000000004D46000-memory.dmp

    Filesize

    280KB

  • memory/5100-191-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-193-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-195-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-197-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-199-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-201-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-203-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-205-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-207-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-209-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-211-0x0000000004D80000-0x0000000004DBF000-memory.dmp

    Filesize

    252KB

  • memory/5100-1054-0x0000000005320000-0x0000000005926000-memory.dmp

    Filesize

    6.0MB

  • memory/5100-1055-0x00000000059B0000-0x0000000005ABA000-memory.dmp

    Filesize

    1.0MB

  • memory/5100-1056-0x0000000005AF0000-0x0000000005B02000-memory.dmp

    Filesize

    72KB

  • memory/5100-1057-0x0000000005B10000-0x0000000005B4E000-memory.dmp

    Filesize

    248KB

  • memory/5100-1058-0x0000000005C60000-0x0000000005CAB000-memory.dmp

    Filesize

    300KB

  • memory/5100-1059-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/5100-1061-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/5100-1062-0x0000000005DF0000-0x0000000005E82000-memory.dmp

    Filesize

    584KB

  • memory/5100-1063-0x0000000005E90000-0x0000000005EF6000-memory.dmp

    Filesize

    408KB

  • memory/5100-1064-0x0000000006590000-0x0000000006752000-memory.dmp

    Filesize

    1.8MB

  • memory/5100-141-0x00000000008E0000-0x000000000092B000-memory.dmp

    Filesize

    300KB

  • memory/5100-1065-0x0000000006760000-0x0000000006C8C000-memory.dmp

    Filesize

    5.2MB

  • memory/5100-1066-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/5100-1067-0x0000000007010000-0x0000000007086000-memory.dmp

    Filesize

    472KB

  • memory/5100-1068-0x0000000007090000-0x00000000070E0000-memory.dmp

    Filesize

    320KB