Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    82s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 01:51

General

  • Target

    68fd0e08402943806cd7df9c0e3302c054592154c27bdb2a1575fc5a39cf3c5b.exe

  • Size

    530KB

  • MD5

    84183a41c8400269383ad61a3385618e

  • SHA1

    7248e805ee3360b7a2c2044287e896231b395142

  • SHA256

    68fd0e08402943806cd7df9c0e3302c054592154c27bdb2a1575fc5a39cf3c5b

  • SHA512

    abc4a2e650e61ac2d254397fcd9b5b560953cf394d828e024418964e9107a42a8798b89edad90d3f8feb5a722cde5f46d4e5090b2d11b5bbd4b4e2531288d2e5

  • SSDEEP

    12288:YMr6y90DZJXLIMMXMQlIJOyyf5KXa/ufwwpzgqnSjIYvKMuZuJ:CySIIUNAZnpUwSXyMuUJ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68fd0e08402943806cd7df9c0e3302c054592154c27bdb2a1575fc5a39cf3c5b.exe
    "C:\Users\Admin\AppData\Local\Temp\68fd0e08402943806cd7df9c0e3302c054592154c27bdb2a1575fc5a39cf3c5b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYc7349.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYc7349.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr364059.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr364059.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku279947.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku279947.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1020
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 1980
          4⤵
          • Program crash
          PID:2920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr906567.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr906567.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4288
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1020 -ip 1020
    1⤵
      PID:1536

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr906567.exe

      Filesize

      176KB

      MD5

      130a2ddea46cf40afd8ade2416e53909

      SHA1

      37c5dd24753b170037f82a5b832273c380c425f4

      SHA256

      f5d7033bd1db7c110536c7b64b49ce0073d12ac70ef8545d117e2945639d22db

      SHA512

      26380082ce4131d30807bc6e147afdbd8903a58353a413bade60d1f152a9cf949f5b60e5c3c40de3bf2cf8dbe23364b6c43dcf6aa0f8b7c8756ab49dff281994

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr906567.exe

      Filesize

      176KB

      MD5

      130a2ddea46cf40afd8ade2416e53909

      SHA1

      37c5dd24753b170037f82a5b832273c380c425f4

      SHA256

      f5d7033bd1db7c110536c7b64b49ce0073d12ac70ef8545d117e2945639d22db

      SHA512

      26380082ce4131d30807bc6e147afdbd8903a58353a413bade60d1f152a9cf949f5b60e5c3c40de3bf2cf8dbe23364b6c43dcf6aa0f8b7c8756ab49dff281994

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYc7349.exe

      Filesize

      388KB

      MD5

      4244fd64e4808a6c478cdc97c27464e7

      SHA1

      1841661d35c040485bc669e9fa6b65d9843b3f77

      SHA256

      236610c1ed97137dee1e14782e2a09625c29944855fd538054001b0331f24764

      SHA512

      66fd87a222dff1c0a28641cce32737b9c92483496f2cff3dc98e7b629a7ccdcc5def86a86eb042f8de0958fbf6a8b8175c18c6746fee3957243f90c251f1e3ee

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYc7349.exe

      Filesize

      388KB

      MD5

      4244fd64e4808a6c478cdc97c27464e7

      SHA1

      1841661d35c040485bc669e9fa6b65d9843b3f77

      SHA256

      236610c1ed97137dee1e14782e2a09625c29944855fd538054001b0331f24764

      SHA512

      66fd87a222dff1c0a28641cce32737b9c92483496f2cff3dc98e7b629a7ccdcc5def86a86eb042f8de0958fbf6a8b8175c18c6746fee3957243f90c251f1e3ee

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr364059.exe

      Filesize

      12KB

      MD5

      f3d6faa289bef8560f30e04a9e46d3ea

      SHA1

      085f0ee273363955e353c79eb0c3e547d4d61a68

      SHA256

      200cb167ba253cbba789ebf9279fde649f2d33babb11233bc1ad8ec96723a828

      SHA512

      2612381c78a19e93d3d47c948f42f85acf1f9d6127ed912d06b3c9d8cd2a455407c39ab5d8277aa520f1b28740b3ba34b0250770de243ee86292c3b9bc67cfd3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr364059.exe

      Filesize

      12KB

      MD5

      f3d6faa289bef8560f30e04a9e46d3ea

      SHA1

      085f0ee273363955e353c79eb0c3e547d4d61a68

      SHA256

      200cb167ba253cbba789ebf9279fde649f2d33babb11233bc1ad8ec96723a828

      SHA512

      2612381c78a19e93d3d47c948f42f85acf1f9d6127ed912d06b3c9d8cd2a455407c39ab5d8277aa520f1b28740b3ba34b0250770de243ee86292c3b9bc67cfd3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku279947.exe

      Filesize

      434KB

      MD5

      1045e68d77cdaa642d33332422a5f0c8

      SHA1

      c92f7043675ac5ff7963aab3f930e512795e378c

      SHA256

      2c8fdd40b6b3aaa439be5204edc0d46511132fc052e8dd827352632ef22de83c

      SHA512

      f0370e88d2ab6a409bd8522e2be6e73e339bcb43158f73e61a644762d66fd65c9b4f322c283f3c702cc575443f190e546de31e73357c7cb7ada0b0d95d342cca

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku279947.exe

      Filesize

      434KB

      MD5

      1045e68d77cdaa642d33332422a5f0c8

      SHA1

      c92f7043675ac5ff7963aab3f930e512795e378c

      SHA256

      2c8fdd40b6b3aaa439be5204edc0d46511132fc052e8dd827352632ef22de83c

      SHA512

      f0370e88d2ab6a409bd8522e2be6e73e339bcb43158f73e61a644762d66fd65c9b4f322c283f3c702cc575443f190e546de31e73357c7cb7ada0b0d95d342cca

    • memory/1020-153-0x0000000000730000-0x000000000077B000-memory.dmp

      Filesize

      300KB

    • memory/1020-154-0x0000000004DF0000-0x0000000005394000-memory.dmp

      Filesize

      5.6MB

    • memory/1020-155-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-160-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-158-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-162-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-164-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-165-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

      Filesize

      64KB

    • memory/1020-167-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

      Filesize

      64KB

    • memory/1020-169-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

      Filesize

      64KB

    • memory/1020-171-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-173-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-181-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-179-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-187-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-185-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-189-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-191-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-195-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-199-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-197-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-193-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-205-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-207-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-211-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-213-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-219-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-221-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-217-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-215-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-209-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-203-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-201-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-183-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-177-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-175-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-168-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-156-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

      Filesize

      252KB

    • memory/1020-1064-0x00000000053A0000-0x00000000059B8000-memory.dmp

      Filesize

      6.1MB

    • memory/1020-1065-0x00000000059C0000-0x0000000005ACA000-memory.dmp

      Filesize

      1.0MB

    • memory/1020-1066-0x0000000005AE0000-0x0000000005AF2000-memory.dmp

      Filesize

      72KB

    • memory/1020-1067-0x0000000005B00000-0x0000000005B3C000-memory.dmp

      Filesize

      240KB

    • memory/1020-1068-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

      Filesize

      64KB

    • memory/1020-1070-0x0000000005DF0000-0x0000000005E56000-memory.dmp

      Filesize

      408KB

    • memory/1020-1071-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

      Filesize

      64KB

    • memory/1020-1072-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

      Filesize

      64KB

    • memory/1020-1073-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

      Filesize

      64KB

    • memory/1020-1074-0x00000000064B0000-0x0000000006542000-memory.dmp

      Filesize

      584KB

    • memory/1020-1075-0x0000000007AB0000-0x0000000007B26000-memory.dmp

      Filesize

      472KB

    • memory/1020-1076-0x0000000007B30000-0x0000000007B80000-memory.dmp

      Filesize

      320KB

    • memory/1020-1077-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

      Filesize

      64KB

    • memory/1020-1078-0x0000000007BC0000-0x0000000007D82000-memory.dmp

      Filesize

      1.8MB

    • memory/1020-1079-0x0000000007D90000-0x00000000082BC000-memory.dmp

      Filesize

      5.2MB

    • memory/3844-147-0x00000000005F0000-0x00000000005FA000-memory.dmp

      Filesize

      40KB

    • memory/4288-1085-0x0000000000050000-0x0000000000082000-memory.dmp

      Filesize

      200KB

    • memory/4288-1086-0x0000000004900000-0x0000000004910000-memory.dmp

      Filesize

      64KB

    • memory/4288-1087-0x0000000004900000-0x0000000004910000-memory.dmp

      Filesize

      64KB