Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    64s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 22:37

General

  • Target

    b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe

  • Size

    666KB

  • MD5

    5f690812ae0079a78507adf72363674f

  • SHA1

    ba1c9949aa20b7e1ace86100f0a6a540dea89241

  • SHA256

    b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed

  • SHA512

    59a4c4d746ac12633a8425f03712c67b59b7690c0bb6f428d5f697c17990e86b9fe0a143743fbc366f87f6e2e002f519f92e8e8469a63dfccb3ab9f3a7dd64a8

  • SSDEEP

    12288:jMrWy90rKzd/h+8Y06Ky3IRAo1Hox8ZcFQxXrUlET/wh+BSsuMN268EY:ZyddsSxy3IXHoNFQlrLLwhA/9O

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe
    "C:\Users\Admin\AppData\Local\Temp\b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588858.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588858.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1047.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1047.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 1092
          4⤵
          • Program crash
          PID:956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9605.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9605.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2440
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 2016
          4⤵
          • Program crash
          PID:3948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si639158.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si639158.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2040 -ip 2040
    1⤵
      PID:3288
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2440 -ip 2440
      1⤵
        PID:5024

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si639158.exe

        Filesize

        176KB

        MD5

        4c4241bc6266be94ac66b6f2ea4392e9

        SHA1

        918948c5efc8c9c9238f83dd348e3a62c1d3286d

        SHA256

        5e3610f23d4d6529a0456f19fa6acc8a800a5c4900d1512eda27dfc0dec1221e

        SHA512

        9f4fc17e887cb0f435d29516560b70ded2459ab504082f86328e8db511b5867b772a6d266daa373b7c1c4c8772d3fbbca4552091cd31797e7dab4d915bba0df4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si639158.exe

        Filesize

        176KB

        MD5

        4c4241bc6266be94ac66b6f2ea4392e9

        SHA1

        918948c5efc8c9c9238f83dd348e3a62c1d3286d

        SHA256

        5e3610f23d4d6529a0456f19fa6acc8a800a5c4900d1512eda27dfc0dec1221e

        SHA512

        9f4fc17e887cb0f435d29516560b70ded2459ab504082f86328e8db511b5867b772a6d266daa373b7c1c4c8772d3fbbca4552091cd31797e7dab4d915bba0df4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588858.exe

        Filesize

        524KB

        MD5

        fe4bd13a4d5214bfb5314593db831df0

        SHA1

        3219b04cb15dbdb6c43cefe514e7811ef22c7761

        SHA256

        819303b3dd464daca38bbc682a68fd95f0a3e86f6e3a3a7014274c1f7032c834

        SHA512

        d2db42cf9e85cb328660874c02b7459e28e8d92e177049165a28b51b44c2b3cd9145eb8f6545ece82514bd190bd39549ebbdcd9246e85661a2d4adec32006847

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588858.exe

        Filesize

        524KB

        MD5

        fe4bd13a4d5214bfb5314593db831df0

        SHA1

        3219b04cb15dbdb6c43cefe514e7811ef22c7761

        SHA256

        819303b3dd464daca38bbc682a68fd95f0a3e86f6e3a3a7014274c1f7032c834

        SHA512

        d2db42cf9e85cb328660874c02b7459e28e8d92e177049165a28b51b44c2b3cd9145eb8f6545ece82514bd190bd39549ebbdcd9246e85661a2d4adec32006847

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1047.exe

        Filesize

        294KB

        MD5

        6e2aa774a04285d676b92275139db21c

        SHA1

        9f37ec28f7b15a7dd96479b9e6517e95fa8d7b0f

        SHA256

        4948b19884986e6413ea52d6f017004cd429961694413855ed741e02116144ec

        SHA512

        87afe164e078a97d54507e08018ad00b8d156fedfa1d6e50dac8beed694f73f6646317a573e2339d33111892783d5d47617bd15cac40fa87fde5d953bcbce9ec

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1047.exe

        Filesize

        294KB

        MD5

        6e2aa774a04285d676b92275139db21c

        SHA1

        9f37ec28f7b15a7dd96479b9e6517e95fa8d7b0f

        SHA256

        4948b19884986e6413ea52d6f017004cd429961694413855ed741e02116144ec

        SHA512

        87afe164e078a97d54507e08018ad00b8d156fedfa1d6e50dac8beed694f73f6646317a573e2339d33111892783d5d47617bd15cac40fa87fde5d953bcbce9ec

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9605.exe

        Filesize

        352KB

        MD5

        87cf82c49a4548290ed43530cc269306

        SHA1

        fa97fb195bdc8150d664690d80a81c5bee0a4012

        SHA256

        5581d2f75817546209ee65e18b1e05e43b06b7213b1fec4516c5691dd7ee75b1

        SHA512

        bb2c0cde28da685d77c413410219e68ff83789ded536050d8bdb17a4a1ba1d30277d999a2a8f42e55be3e4d404bdc5e7ba1af04c17b7d96ac8403e67fbe2c260

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9605.exe

        Filesize

        352KB

        MD5

        87cf82c49a4548290ed43530cc269306

        SHA1

        fa97fb195bdc8150d664690d80a81c5bee0a4012

        SHA256

        5581d2f75817546209ee65e18b1e05e43b06b7213b1fec4516c5691dd7ee75b1

        SHA512

        bb2c0cde28da685d77c413410219e68ff83789ded536050d8bdb17a4a1ba1d30277d999a2a8f42e55be3e4d404bdc5e7ba1af04c17b7d96ac8403e67fbe2c260

      • memory/1920-1122-0x0000000000280000-0x00000000002B2000-memory.dmp

        Filesize

        200KB

      • memory/1920-1123-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1920-1124-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/2040-160-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-172-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-152-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2040-153-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-154-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-156-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-158-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-150-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2040-162-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-164-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-166-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-168-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-170-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-151-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2040-174-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-176-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-178-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-180-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2040-181-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/2040-182-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2040-183-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2040-184-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2040-186-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/2040-149-0x0000000004EF0000-0x0000000005494000-memory.dmp

        Filesize

        5.6MB

      • memory/2040-148-0x0000000002460000-0x000000000248D000-memory.dmp

        Filesize

        180KB

      • memory/2440-194-0x0000000000AB0000-0x0000000000AFB000-memory.dmp

        Filesize

        300KB

      • memory/2440-195-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-197-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/2440-199-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/2440-201-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-198-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-203-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-205-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-207-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-209-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-211-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-213-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-215-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-217-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-219-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-221-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-223-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-225-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-227-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-1100-0x0000000005620000-0x0000000005C38000-memory.dmp

        Filesize

        6.1MB

      • memory/2440-1101-0x0000000004ED0000-0x0000000004FDA000-memory.dmp

        Filesize

        1.0MB

      • memory/2440-1102-0x0000000005010000-0x0000000005022000-memory.dmp

        Filesize

        72KB

      • memory/2440-1103-0x0000000005C40000-0x0000000005C7C000-memory.dmp

        Filesize

        240KB

      • memory/2440-1104-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/2440-1106-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/2440-1107-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/2440-1108-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/2440-1109-0x0000000005F00000-0x0000000005F66000-memory.dmp

        Filesize

        408KB

      • memory/2440-1110-0x00000000065D0000-0x0000000006662000-memory.dmp

        Filesize

        584KB

      • memory/2440-1111-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/2440-1112-0x0000000006910000-0x0000000006AD2000-memory.dmp

        Filesize

        1.8MB

      • memory/2440-192-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-191-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2440-1113-0x0000000006AE0000-0x000000000700C000-memory.dmp

        Filesize

        5.2MB

      • memory/2440-1114-0x0000000008650000-0x00000000086C6000-memory.dmp

        Filesize

        472KB

      • memory/2440-1115-0x00000000086D0000-0x0000000008720000-memory.dmp

        Filesize

        320KB