Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 03:54

General

  • Target

    93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe

  • Size

    677KB

  • MD5

    081d63a9f21a400c1e9272ff3d7f7771

  • SHA1

    3c9ffebf208f002744128f3fc9a9d6c99610e438

  • SHA256

    93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1

  • SHA512

    f692a77cfd887325e052e35c94580edd15d3f9b37344ca18eb48ec7051d9cf5d3f3f544a84124edd80e289b4eb7666c63ac203b437b42690ab9703f619108c12

  • SSDEEP

    12288:7Mr2y90Rpq5LJ2qO7qs6Ks43eMSMFSNUs33z5r7mhkuX142OlIvTJoJ:xywmJbMC43eMnux5rSC842OWvTeJ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe
    "C:\Users\Admin\AppData\Local\Temp\93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un342604.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un342604.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3734.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3734.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 1084
          4⤵
          • Program crash
          PID:2216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0614.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0614.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 1340
          4⤵
          • Program crash
          PID:1600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si254276.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si254276.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3228
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1516 -ip 1516
    1⤵
      PID:3600
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4344 -ip 4344
      1⤵
        PID:1856

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si254276.exe

        Filesize

        176KB

        MD5

        3b5ca8e0cbfe7acf6bf2586d329229d6

        SHA1

        4d30bc7457422a87d6dea9c982a767a01985853e

        SHA256

        ac844ee5277b029013b15119548998855f646a19b8ca23bf4b952db60310f60e

        SHA512

        6e5e5c18ddf0d1c3553a8d76f07d039e259e109d38c8f992e5db4af5c5b708b5874e2c891338b8cbd276b267f886288241797336638a64468a3088c4867eee89

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si254276.exe

        Filesize

        176KB

        MD5

        3b5ca8e0cbfe7acf6bf2586d329229d6

        SHA1

        4d30bc7457422a87d6dea9c982a767a01985853e

        SHA256

        ac844ee5277b029013b15119548998855f646a19b8ca23bf4b952db60310f60e

        SHA512

        6e5e5c18ddf0d1c3553a8d76f07d039e259e109d38c8f992e5db4af5c5b708b5874e2c891338b8cbd276b267f886288241797336638a64468a3088c4867eee89

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un342604.exe

        Filesize

        535KB

        MD5

        ca69258622b060e74319ec8ba9ca26fa

        SHA1

        80c70796a79e5157fec9d512646f012cb1ea78b4

        SHA256

        8ac0e19777db507f976eb8f5780f9fbf0487ad1138157a3fe656ca8338fb71b1

        SHA512

        fc1c24c7d601e8533ab0791953b4e83edf7889c4f9aa55b5caf7943cf4e45923dfb36189318cc09541b0f6d8d5c6723fa385ed288a24fe56bfd64265e4002791

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un342604.exe

        Filesize

        535KB

        MD5

        ca69258622b060e74319ec8ba9ca26fa

        SHA1

        80c70796a79e5157fec9d512646f012cb1ea78b4

        SHA256

        8ac0e19777db507f976eb8f5780f9fbf0487ad1138157a3fe656ca8338fb71b1

        SHA512

        fc1c24c7d601e8533ab0791953b4e83edf7889c4f9aa55b5caf7943cf4e45923dfb36189318cc09541b0f6d8d5c6723fa385ed288a24fe56bfd64265e4002791

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3734.exe

        Filesize

        376KB

        MD5

        6bfb3db5f44d8a643f7ff7ecc40c391f

        SHA1

        d638f14e05ed4677e3d99cd11687ff4ec8db026a

        SHA256

        10b51daa894a51b1a973afbe85c1c5658bcc0dcf05da0b555c40c2d3190524da

        SHA512

        89b85fc20dda5964c157cfdf13763b7649c04e5859fdd42a3839226069da6eff0cdd1bd61c38f6de22c0cd7681e85ad87fc8e28f0028476356cbcf05d7256ef2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3734.exe

        Filesize

        376KB

        MD5

        6bfb3db5f44d8a643f7ff7ecc40c391f

        SHA1

        d638f14e05ed4677e3d99cd11687ff4ec8db026a

        SHA256

        10b51daa894a51b1a973afbe85c1c5658bcc0dcf05da0b555c40c2d3190524da

        SHA512

        89b85fc20dda5964c157cfdf13763b7649c04e5859fdd42a3839226069da6eff0cdd1bd61c38f6de22c0cd7681e85ad87fc8e28f0028476356cbcf05d7256ef2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0614.exe

        Filesize

        435KB

        MD5

        4408ae31dc0cbaeefd5f17c7ed2b937d

        SHA1

        358b18f4311c24c7fa2eb190b7d24155ac883640

        SHA256

        a3a5967c5da9d6e257c83025a20d5e6851b9c48f6fbcacb82f42bb63d9540780

        SHA512

        e58f56a2d48f867d694d952a4068acb72c825c4c069824ee990cc3d5de9b04953d71b667a88ec5b0fe2bd7c4ad498ad3ca61758d5acc4c5f6be20d659ab6ce27

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0614.exe

        Filesize

        435KB

        MD5

        4408ae31dc0cbaeefd5f17c7ed2b937d

        SHA1

        358b18f4311c24c7fa2eb190b7d24155ac883640

        SHA256

        a3a5967c5da9d6e257c83025a20d5e6851b9c48f6fbcacb82f42bb63d9540780

        SHA512

        e58f56a2d48f867d694d952a4068acb72c825c4c069824ee990cc3d5de9b04953d71b667a88ec5b0fe2bd7c4ad498ad3ca61758d5acc4c5f6be20d659ab6ce27

      • memory/1516-148-0x0000000004DE0000-0x0000000005384000-memory.dmp

        Filesize

        5.6MB

      • memory/1516-150-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/1516-149-0x00000000021F0000-0x000000000221D000-memory.dmp

        Filesize

        180KB

      • memory/1516-151-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/1516-152-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/1516-153-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-154-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-156-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-158-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-160-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-162-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-164-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-166-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-168-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-170-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-172-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-174-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-176-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-178-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-180-0x00000000025A0000-0x00000000025B2000-memory.dmp

        Filesize

        72KB

      • memory/1516-181-0x0000000000400000-0x00000000005A3000-memory.dmp

        Filesize

        1.6MB

      • memory/1516-182-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/1516-183-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/1516-184-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/1516-186-0x0000000000400000-0x00000000005A3000-memory.dmp

        Filesize

        1.6MB

      • memory/3228-1122-0x0000000000800000-0x0000000000832000-memory.dmp

        Filesize

        200KB

      • memory/3228-1124-0x0000000005460000-0x0000000005470000-memory.dmp

        Filesize

        64KB

      • memory/3228-1123-0x0000000005460000-0x0000000005470000-memory.dmp

        Filesize

        64KB

      • memory/4344-191-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-277-0x00000000041E0000-0x00000000041F0000-memory.dmp

        Filesize

        64KB

      • memory/4344-198-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-200-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-202-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-204-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-206-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-208-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-210-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-212-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-214-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-216-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-218-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-220-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-222-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-224-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-272-0x0000000003F40000-0x0000000003F8B000-memory.dmp

        Filesize

        300KB

      • memory/4344-276-0x00000000041E0000-0x00000000041F0000-memory.dmp

        Filesize

        64KB

      • memory/4344-273-0x00000000041E0000-0x00000000041F0000-memory.dmp

        Filesize

        64KB

      • memory/4344-196-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-1101-0x0000000007020000-0x0000000007638000-memory.dmp

        Filesize

        6.1MB

      • memory/4344-1102-0x00000000076C0000-0x00000000077CA000-memory.dmp

        Filesize

        1.0MB

      • memory/4344-1103-0x0000000007800000-0x0000000007812000-memory.dmp

        Filesize

        72KB

      • memory/4344-1104-0x00000000041E0000-0x00000000041F0000-memory.dmp

        Filesize

        64KB

      • memory/4344-1105-0x0000000007820000-0x000000000785C000-memory.dmp

        Filesize

        240KB

      • memory/4344-1106-0x0000000007B10000-0x0000000007BA2000-memory.dmp

        Filesize

        584KB

      • memory/4344-1107-0x0000000007BB0000-0x0000000007C16000-memory.dmp

        Filesize

        408KB

      • memory/4344-1108-0x00000000082D0000-0x0000000008492000-memory.dmp

        Filesize

        1.8MB

      • memory/4344-1110-0x00000000084B0000-0x00000000089DC000-memory.dmp

        Filesize

        5.2MB

      • memory/4344-1111-0x00000000041E0000-0x00000000041F0000-memory.dmp

        Filesize

        64KB

      • memory/4344-1112-0x00000000041E0000-0x00000000041F0000-memory.dmp

        Filesize

        64KB

      • memory/4344-1113-0x00000000041E0000-0x00000000041F0000-memory.dmp

        Filesize

        64KB

      • memory/4344-194-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-192-0x0000000006E40000-0x0000000006E7F000-memory.dmp

        Filesize

        252KB

      • memory/4344-1114-0x00000000041E0000-0x00000000041F0000-memory.dmp

        Filesize

        64KB

      • memory/4344-1115-0x0000000008E90000-0x0000000008F06000-memory.dmp

        Filesize

        472KB

      • memory/4344-1116-0x0000000008F20000-0x0000000008F70000-memory.dmp

        Filesize

        320KB