Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 02:52

General

  • Target

    ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe

  • Size

    674KB

  • MD5

    d6f7bafa4f2740e6f2be92ce02805ce0

  • SHA1

    c084741df0bb3a677e05d19981f7b87a0834fa24

  • SHA256

    ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe

  • SHA512

    6adf0a26bc018ee4aa430da87cff79242c1296f89e0010a9a103f09eb6df682d3668a969cd03520c05ab81e0ac0c373b0dbc34908d8fd14819e4d853d0c6aa21

  • SSDEEP

    12288:UMrEy90FnNSufKVh173uzGhN1rvRPIaxfeuUuXe42aljC6gBD:QyMn4wKVhBoGhrjRcn/42p6uD

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe
    "C:\Users\Admin\AppData\Local\Temp\ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477119.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477119.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4618.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4618.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6715.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6715.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si379893.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si379893.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si379893.exe

    Filesize

    176KB

    MD5

    cc158400595da2253853c340d4a6777c

    SHA1

    005b478b20ecaf04162b5f2807ff87ebfb4244a2

    SHA256

    72d59d952b9e6aa2f5578f2745965b405fca5edde6354a4e619d71dfabb57fbc

    SHA512

    0dc2ca487643274db8480d475734f305372a75c590dee5155221ef0526fca8bab8f12df0d0def9a159b0dcccb1edaf6216338f6adb157e2cf872892cb92bacef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si379893.exe

    Filesize

    176KB

    MD5

    cc158400595da2253853c340d4a6777c

    SHA1

    005b478b20ecaf04162b5f2807ff87ebfb4244a2

    SHA256

    72d59d952b9e6aa2f5578f2745965b405fca5edde6354a4e619d71dfabb57fbc

    SHA512

    0dc2ca487643274db8480d475734f305372a75c590dee5155221ef0526fca8bab8f12df0d0def9a159b0dcccb1edaf6216338f6adb157e2cf872892cb92bacef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477119.exe

    Filesize

    533KB

    MD5

    f36c895dc40e44652ea1e210bdc00030

    SHA1

    e4c66e51a5b2041ece3be9ce5800038d9ec61576

    SHA256

    1d8db4919296110af2fd1d22e03d0f2891000b50d38af0746659442dfc97462a

    SHA512

    ede75117705a08e2045b0e3bc38b842f7f4f10ce135f0a7365656e262aede46c2f9913278b8b962bc8c265eddc8ae0574a26f926f361a51ed10efbd254fc3786

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477119.exe

    Filesize

    533KB

    MD5

    f36c895dc40e44652ea1e210bdc00030

    SHA1

    e4c66e51a5b2041ece3be9ce5800038d9ec61576

    SHA256

    1d8db4919296110af2fd1d22e03d0f2891000b50d38af0746659442dfc97462a

    SHA512

    ede75117705a08e2045b0e3bc38b842f7f4f10ce135f0a7365656e262aede46c2f9913278b8b962bc8c265eddc8ae0574a26f926f361a51ed10efbd254fc3786

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4618.exe

    Filesize

    376KB

    MD5

    7aa1902df392aebe8e51edf0593c59f5

    SHA1

    9ea4a83b9d83f05938218aa6aa63cf16c08e642a

    SHA256

    e31f8bd007197c2e94a3d87e02ee93c230167cb140e9a66fca53ef385aa3554e

    SHA512

    dbc1c0bf9d584d98bede9eaaec866b7ae3f946bde70810344b773a5fe36a07feadc11a60432411255fd375de1c1fc787a3eab73a0345d7c83f13f569b299986d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4618.exe

    Filesize

    376KB

    MD5

    7aa1902df392aebe8e51edf0593c59f5

    SHA1

    9ea4a83b9d83f05938218aa6aa63cf16c08e642a

    SHA256

    e31f8bd007197c2e94a3d87e02ee93c230167cb140e9a66fca53ef385aa3554e

    SHA512

    dbc1c0bf9d584d98bede9eaaec866b7ae3f946bde70810344b773a5fe36a07feadc11a60432411255fd375de1c1fc787a3eab73a0345d7c83f13f569b299986d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6715.exe

    Filesize

    435KB

    MD5

    a985a8e5ee5a4a3bd48be785c606c137

    SHA1

    9c9e73e2ac001a956e3a03aa25610e04842a4d3b

    SHA256

    819d0a45a873bf6aa67c8df2f1a8e260c5ea2e13349b5495e47f6a482569fdfb

    SHA512

    0f4bc5caa774c30738e1c4c9cecf3cb7942774c146ece0ad7c688f1caed4ef62400898e60d663ddaae6167f840446079e6f818649e02199d364207bdc518f6a6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6715.exe

    Filesize

    435KB

    MD5

    a985a8e5ee5a4a3bd48be785c606c137

    SHA1

    9c9e73e2ac001a956e3a03aa25610e04842a4d3b

    SHA256

    819d0a45a873bf6aa67c8df2f1a8e260c5ea2e13349b5495e47f6a482569fdfb

    SHA512

    0f4bc5caa774c30738e1c4c9cecf3cb7942774c146ece0ad7c688f1caed4ef62400898e60d663ddaae6167f840446079e6f818649e02199d364207bdc518f6a6

  • memory/4460-134-0x00000000020F0000-0x000000000210A000-memory.dmp

    Filesize

    104KB

  • memory/4460-135-0x0000000004D90000-0x000000000528E000-memory.dmp

    Filesize

    5.0MB

  • memory/4460-136-0x0000000002560000-0x0000000002578000-memory.dmp

    Filesize

    96KB

  • memory/4460-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4460-138-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/4460-139-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/4460-140-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/4460-141-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-142-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-144-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-146-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-148-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-150-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-152-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-154-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-156-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-158-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-160-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-162-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-164-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-166-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-168-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/4460-169-0x0000000000400000-0x00000000005A3000-memory.dmp

    Filesize

    1.6MB

  • memory/4460-170-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/4460-171-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/4460-172-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/4460-174-0x0000000000400000-0x00000000005A3000-memory.dmp

    Filesize

    1.6MB

  • memory/4744-179-0x0000000004060000-0x00000000040A6000-memory.dmp

    Filesize

    280KB

  • memory/4744-180-0x0000000004280000-0x00000000042C4000-memory.dmp

    Filesize

    272KB

  • memory/4744-181-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-182-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-188-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-186-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-184-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-190-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-192-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-194-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-196-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-198-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-200-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-202-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-204-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-206-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-208-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-210-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-212-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-214-0x0000000004280000-0x00000000042BF000-memory.dmp

    Filesize

    252KB

  • memory/4744-393-0x00000000023B0000-0x00000000023FB000-memory.dmp

    Filesize

    300KB

  • memory/4744-395-0x0000000006840000-0x0000000006850000-memory.dmp

    Filesize

    64KB

  • memory/4744-399-0x0000000006840000-0x0000000006850000-memory.dmp

    Filesize

    64KB

  • memory/4744-397-0x0000000006840000-0x0000000006850000-memory.dmp

    Filesize

    64KB

  • memory/4744-1091-0x0000000006F50000-0x0000000007556000-memory.dmp

    Filesize

    6.0MB

  • memory/4744-1092-0x00000000075C0000-0x00000000076CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4744-1093-0x0000000007700000-0x0000000007712000-memory.dmp

    Filesize

    72KB

  • memory/4744-1095-0x0000000007720000-0x000000000775E000-memory.dmp

    Filesize

    248KB

  • memory/4744-1094-0x0000000006840000-0x0000000006850000-memory.dmp

    Filesize

    64KB

  • memory/4744-1096-0x0000000007870000-0x00000000078BB000-memory.dmp

    Filesize

    300KB

  • memory/4744-1097-0x0000000007A00000-0x0000000007A66000-memory.dmp

    Filesize

    408KB

  • memory/4744-1098-0x00000000080C0000-0x0000000008152000-memory.dmp

    Filesize

    584KB

  • memory/4744-1099-0x0000000008190000-0x0000000008206000-memory.dmp

    Filesize

    472KB

  • memory/4744-1100-0x0000000008210000-0x0000000008260000-memory.dmp

    Filesize

    320KB

  • memory/4744-1102-0x0000000006840000-0x0000000006850000-memory.dmp

    Filesize

    64KB

  • memory/4744-1103-0x0000000006840000-0x0000000006850000-memory.dmp

    Filesize

    64KB

  • memory/4744-1104-0x0000000006840000-0x0000000006850000-memory.dmp

    Filesize

    64KB

  • memory/4744-1105-0x0000000008380000-0x0000000008542000-memory.dmp

    Filesize

    1.8MB

  • memory/4744-1106-0x0000000008570000-0x0000000008A9C000-memory.dmp

    Filesize

    5.2MB

  • memory/4744-1107-0x0000000006840000-0x0000000006850000-memory.dmp

    Filesize

    64KB

  • memory/4752-1113-0x0000000000EB0000-0x0000000000EE2000-memory.dmp

    Filesize

    200KB

  • memory/4752-1114-0x00000000058F0000-0x000000000593B000-memory.dmp

    Filesize

    300KB

  • memory/4752-1115-0x0000000005AD0000-0x0000000005AE0000-memory.dmp

    Filesize

    64KB