Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    53s
  • max time network
    55s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 23:46

General

  • Target

    52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe

  • Size

    537KB

  • MD5

    76e1cca7e9eabbdd918eb6cb3c28f8fe

  • SHA1

    4d2cb82298403016d15a729f69fe694445c260f6

  • SHA256

    52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c

  • SHA512

    67218bfafaef44f527b141ef439644c705867e5cc9012df768f8ac4028a60df84395a84b6ef82a6479cf04d0e58fecd4babdacb41e228216846611939eb7644b

  • SSDEEP

    12288:PMr2y90fVz/WdjW6FX7xy44vGVUvVH0wDckNcShNT:Zy5ZW6Z7bYGVcUw4kaShh

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe
    "C:\Users\Admin\AppData\Local\Temp\52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitr6516.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitr6516.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378382.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378382.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251778.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251778.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:60
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr270454.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr270454.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr270454.exe

    Filesize

    176KB

    MD5

    b32fe3a83193acd2ef57cd6395b38482

    SHA1

    70773bd523572e939c1c4ad034a716030513aa95

    SHA256

    5d6bee7d8fda77287c594efdfe728d7d0cdfa0d8cb71bb5c262604dc1e4ea68b

    SHA512

    27ff5c42c6e625532674020f7e5df6e0b3ac9cea94d5e387ca221b072458e5da67bc8360e608458e05eb5e8ead42341217cce29050c2db64c1a9a18df8542410

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr270454.exe

    Filesize

    176KB

    MD5

    b32fe3a83193acd2ef57cd6395b38482

    SHA1

    70773bd523572e939c1c4ad034a716030513aa95

    SHA256

    5d6bee7d8fda77287c594efdfe728d7d0cdfa0d8cb71bb5c262604dc1e4ea68b

    SHA512

    27ff5c42c6e625532674020f7e5df6e0b3ac9cea94d5e387ca221b072458e5da67bc8360e608458e05eb5e8ead42341217cce29050c2db64c1a9a18df8542410

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitr6516.exe

    Filesize

    395KB

    MD5

    2ed2879b402a2dc92c43e65aac13f29e

    SHA1

    cff90284638889dc683ad255b08dc25d3ffcd8b0

    SHA256

    c950d5e8e296e77b5952c5dbd8576324446e59cb5bd3b11e94b8036c09b94a2c

    SHA512

    bd8dfe516811fad30f979e2926616dd7f1c0081d4a90bc68b23b927876af28e3cf0b7b7e3802b4737c1f97fb56c03b909e30cd7f06838facc99d43898f06ed74

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitr6516.exe

    Filesize

    395KB

    MD5

    2ed2879b402a2dc92c43e65aac13f29e

    SHA1

    cff90284638889dc683ad255b08dc25d3ffcd8b0

    SHA256

    c950d5e8e296e77b5952c5dbd8576324446e59cb5bd3b11e94b8036c09b94a2c

    SHA512

    bd8dfe516811fad30f979e2926616dd7f1c0081d4a90bc68b23b927876af28e3cf0b7b7e3802b4737c1f97fb56c03b909e30cd7f06838facc99d43898f06ed74

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378382.exe

    Filesize

    13KB

    MD5

    432a706186e8c46642b5198b9512f2b8

    SHA1

    4c2084166c6592bc494d0f971d75ebe0740d72f6

    SHA256

    04d391158a5e3c7e6310617271af2203b39a8780e838fda6b6555108ff43f713

    SHA512

    b3d843722be6262ccb63f37aabfc1281a84b5732ef28bd4747563150021949bd23c67d14dd0ee893beb682506132d128872cb84e7d5e1393a0ad87b6c1821f69

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378382.exe

    Filesize

    13KB

    MD5

    432a706186e8c46642b5198b9512f2b8

    SHA1

    4c2084166c6592bc494d0f971d75ebe0740d72f6

    SHA256

    04d391158a5e3c7e6310617271af2203b39a8780e838fda6b6555108ff43f713

    SHA512

    b3d843722be6262ccb63f37aabfc1281a84b5732ef28bd4747563150021949bd23c67d14dd0ee893beb682506132d128872cb84e7d5e1393a0ad87b6c1821f69

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251778.exe

    Filesize

    352KB

    MD5

    24a37ace9ef9e987499bf145321ce2c6

    SHA1

    027c1d2645fe470215bbe4a514337b7d727149dc

    SHA256

    4ebf2fb539fd207be48127c60b3bd00e21c23aee8237b815e6962b7bf65f7572

    SHA512

    eddda41f24f3e7663636f50d70b514d2731dae0e61c418c8ad9843bb6a1226bc027ecba693932d11484f3af97e8dc173984b210bcdb8fee62d6b1ca5cd63c07c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251778.exe

    Filesize

    352KB

    MD5

    24a37ace9ef9e987499bf145321ce2c6

    SHA1

    027c1d2645fe470215bbe4a514337b7d727149dc

    SHA256

    4ebf2fb539fd207be48127c60b3bd00e21c23aee8237b815e6962b7bf65f7572

    SHA512

    eddda41f24f3e7663636f50d70b514d2731dae0e61c418c8ad9843bb6a1226bc027ecba693932d11484f3af97e8dc173984b210bcdb8fee62d6b1ca5cd63c07c

  • memory/60-139-0x0000000000810000-0x000000000085B000-memory.dmp

    Filesize

    300KB

  • memory/60-140-0x00000000023C0000-0x0000000002406000-memory.dmp

    Filesize

    280KB

  • memory/60-141-0x0000000004ED0000-0x00000000053CE000-memory.dmp

    Filesize

    5.0MB

  • memory/60-142-0x0000000002690000-0x00000000026D4000-memory.dmp

    Filesize

    272KB

  • memory/60-143-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-144-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-146-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-148-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-150-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-152-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/60-154-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/60-151-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/60-157-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-155-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-159-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-161-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-163-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-165-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-167-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-169-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-171-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-173-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-175-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-177-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-179-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-181-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-183-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-185-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-187-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-189-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-193-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-191-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-195-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-197-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-199-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-201-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-203-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-205-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-207-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-209-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/60-1052-0x0000000005AE0000-0x00000000060E6000-memory.dmp

    Filesize

    6.0MB

  • memory/60-1053-0x00000000054E0000-0x00000000055EA000-memory.dmp

    Filesize

    1.0MB

  • memory/60-1054-0x0000000005620000-0x0000000005632000-memory.dmp

    Filesize

    72KB

  • memory/60-1055-0x0000000005640000-0x000000000567E000-memory.dmp

    Filesize

    248KB

  • memory/60-1056-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/60-1057-0x0000000005790000-0x00000000057DB000-memory.dmp

    Filesize

    300KB

  • memory/60-1059-0x0000000005920000-0x0000000005986000-memory.dmp

    Filesize

    408KB

  • memory/60-1060-0x00000000065F0000-0x0000000006682000-memory.dmp

    Filesize

    584KB

  • memory/60-1061-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/60-1062-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/60-1063-0x0000000006810000-0x00000000069D2000-memory.dmp

    Filesize

    1.8MB

  • memory/60-1064-0x0000000006A00000-0x0000000006F2C000-memory.dmp

    Filesize

    5.2MB

  • memory/60-1065-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/60-1066-0x00000000072B0000-0x0000000007326000-memory.dmp

    Filesize

    472KB

  • memory/60-1067-0x0000000007330000-0x0000000007380000-memory.dmp

    Filesize

    320KB

  • memory/4648-133-0x0000000000660000-0x000000000066A000-memory.dmp

    Filesize

    40KB

  • memory/4696-1073-0x0000000000370000-0x00000000003A2000-memory.dmp

    Filesize

    200KB

  • memory/4696-1074-0x0000000004BF0000-0x0000000004C3B000-memory.dmp

    Filesize

    300KB

  • memory/4696-1075-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB