Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    55s
  • max time network
    59s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 00:15

General

  • Target

    b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe

  • Size

    659KB

  • MD5

    ee5037f917d5384c50daa9533cf10116

  • SHA1

    3c8c6f8375adb392069c57f682570a86064b548c

  • SHA256

    b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab

  • SHA512

    5369fd447777be4ce897cc415eb3edb8899d12bb8bab9982aaec7c69c5ac765c90ffa3cc5300eee73e6ffe9d166133c6dd30e2a7152f02b60b6933f54866a5ef

  • SSDEEP

    12288:NMrCy902IYepz6wj4KkwyPhUMPVi1Yof5KMa/rem9wzFHhfU:PymdR4hwyVPVi1pAcm9cFHhs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe
    "C:\Users\Admin\AppData\Local\Temp\b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963106.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963106.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9817.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9817.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1667.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1667.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si142651.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si142651.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si142651.exe

    Filesize

    176KB

    MD5

    38f1ded08b30e44c7b17f83fc78b9354

    SHA1

    628f8a4ee7975a685a7b9d6829b253e5c5fa9814

    SHA256

    855972b3935023b595b8f55fd8fee82b83ff72df2b41d2d5b714ec905743e118

    SHA512

    140bcb2150d128742e5d4442d342dde1a8d7be7e2c27350c23214f0c78897997fbb8a69413006867e5db704466b991271174252ff38ced6b43bdfde54d12533d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si142651.exe

    Filesize

    176KB

    MD5

    38f1ded08b30e44c7b17f83fc78b9354

    SHA1

    628f8a4ee7975a685a7b9d6829b253e5c5fa9814

    SHA256

    855972b3935023b595b8f55fd8fee82b83ff72df2b41d2d5b714ec905743e118

    SHA512

    140bcb2150d128742e5d4442d342dde1a8d7be7e2c27350c23214f0c78897997fbb8a69413006867e5db704466b991271174252ff38ced6b43bdfde54d12533d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963106.exe

    Filesize

    518KB

    MD5

    8ffaa2ae0e17e7163c1226df165b5bee

    SHA1

    a0dda4d6fc3abb7917baa7060a15b7b0ea7d281f

    SHA256

    01e9b68adce60c28650bd45c4d452a3671fa1d055da89801034868f61434da3b

    SHA512

    b080a62ff352e407626e4242ff6f4ff1eabb44161efaba6c1e4b2cb59dbf29829e4f08db58d439909f85246fcb3e428a5801d95a7b0b7305d53296958ac144a7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963106.exe

    Filesize

    518KB

    MD5

    8ffaa2ae0e17e7163c1226df165b5bee

    SHA1

    a0dda4d6fc3abb7917baa7060a15b7b0ea7d281f

    SHA256

    01e9b68adce60c28650bd45c4d452a3671fa1d055da89801034868f61434da3b

    SHA512

    b080a62ff352e407626e4242ff6f4ff1eabb44161efaba6c1e4b2cb59dbf29829e4f08db58d439909f85246fcb3e428a5801d95a7b0b7305d53296958ac144a7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9817.exe

    Filesize

    376KB

    MD5

    037d77b71a670b75f77748ce4ec6c610

    SHA1

    9ee87bc10aa335bb9ad0328c800ee4b7add625c8

    SHA256

    e03f718c032c6585b788d5015f5426db6652c2f34120865420f364e2451ac10f

    SHA512

    0b05cd418a2e61848cf2eaa74dec6f0eda19b8e51d2f74cfc1d8fa0140afa38132b80b631644e281f15ee14f037b6b7cacacbc3e2299b0e28b2e11a86e2f05b3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9817.exe

    Filesize

    376KB

    MD5

    037d77b71a670b75f77748ce4ec6c610

    SHA1

    9ee87bc10aa335bb9ad0328c800ee4b7add625c8

    SHA256

    e03f718c032c6585b788d5015f5426db6652c2f34120865420f364e2451ac10f

    SHA512

    0b05cd418a2e61848cf2eaa74dec6f0eda19b8e51d2f74cfc1d8fa0140afa38132b80b631644e281f15ee14f037b6b7cacacbc3e2299b0e28b2e11a86e2f05b3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1667.exe

    Filesize

    434KB

    MD5

    a5efcafde2fad578870bfcfbe17ef967

    SHA1

    b1810d240849611dbe1af2eb8f25160e4edcfa9d

    SHA256

    c7af7f9e1f5300dfdbe0c6596dc77e22b85fd4cfdfe5207c9115f441c6198711

    SHA512

    4a336195ae76b802f3807aa7e8a44a0193def0418c596592c5dcdf91b7f8ae4d38134290da16715bed93672a598d3d95f1c9779f1abce6d830eb6ce9cab9a5a2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1667.exe

    Filesize

    434KB

    MD5

    a5efcafde2fad578870bfcfbe17ef967

    SHA1

    b1810d240849611dbe1af2eb8f25160e4edcfa9d

    SHA256

    c7af7f9e1f5300dfdbe0c6596dc77e22b85fd4cfdfe5207c9115f441c6198711

    SHA512

    4a336195ae76b802f3807aa7e8a44a0193def0418c596592c5dcdf91b7f8ae4d38134290da16715bed93672a598d3d95f1c9779f1abce6d830eb6ce9cab9a5a2

  • memory/2524-136-0x0000000000910000-0x000000000092A000-memory.dmp

    Filesize

    104KB

  • memory/2524-137-0x0000000004B30000-0x000000000502E000-memory.dmp

    Filesize

    5.0MB

  • memory/2524-138-0x0000000002470000-0x0000000002488000-memory.dmp

    Filesize

    96KB

  • memory/2524-140-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/2524-139-0x00000000005B0000-0x00000000005DD000-memory.dmp

    Filesize

    180KB

  • memory/2524-141-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/2524-142-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/2524-143-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-144-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-146-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-148-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-150-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-152-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-154-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-156-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-158-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-160-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-162-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-164-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-166-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-168-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-170-0x0000000002470000-0x0000000002482000-memory.dmp

    Filesize

    72KB

  • memory/2524-171-0x0000000000400000-0x00000000005A3000-memory.dmp

    Filesize

    1.6MB

  • memory/2524-172-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/2524-173-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/2524-174-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/2524-176-0x0000000000400000-0x00000000005A3000-memory.dmp

    Filesize

    1.6MB

  • memory/4920-181-0x00000000021E0000-0x0000000002226000-memory.dmp

    Filesize

    280KB

  • memory/4920-182-0x00000000023B0000-0x00000000023F4000-memory.dmp

    Filesize

    272KB

  • memory/4920-183-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-186-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-184-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-188-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-190-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-191-0x0000000000690000-0x00000000006DB000-memory.dmp

    Filesize

    300KB

  • memory/4920-194-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4920-198-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-200-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-196-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4920-195-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-193-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4920-202-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-204-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-206-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-208-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-210-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-212-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-214-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-216-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-218-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-220-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4920-1093-0x0000000005180000-0x0000000005786000-memory.dmp

    Filesize

    6.0MB

  • memory/4920-1094-0x0000000005790000-0x000000000589A000-memory.dmp

    Filesize

    1.0MB

  • memory/4920-1095-0x00000000058A0000-0x00000000058B2000-memory.dmp

    Filesize

    72KB

  • memory/4920-1096-0x0000000005900000-0x000000000593E000-memory.dmp

    Filesize

    248KB

  • memory/4920-1097-0x0000000005A40000-0x0000000005A8B000-memory.dmp

    Filesize

    300KB

  • memory/4920-1098-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4920-1100-0x0000000005BA0000-0x0000000005C32000-memory.dmp

    Filesize

    584KB

  • memory/4920-1101-0x0000000005C40000-0x0000000005CA6000-memory.dmp

    Filesize

    408KB

  • memory/4920-1102-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4920-1103-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4920-1104-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4920-1105-0x0000000006430000-0x00000000064A6000-memory.dmp

    Filesize

    472KB

  • memory/4920-1106-0x00000000064B0000-0x0000000006500000-memory.dmp

    Filesize

    320KB

  • memory/4920-1107-0x0000000006540000-0x0000000006702000-memory.dmp

    Filesize

    1.8MB

  • memory/4920-1108-0x0000000006710000-0x0000000006C3C000-memory.dmp

    Filesize

    5.2MB

  • memory/4920-1109-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/5084-1115-0x0000000000C30000-0x0000000000C62000-memory.dmp

    Filesize

    200KB

  • memory/5084-1116-0x0000000005810000-0x0000000005820000-memory.dmp

    Filesize

    64KB

  • memory/5084-1117-0x0000000005670000-0x00000000056BB000-memory.dmp

    Filesize

    300KB