Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 04:23

General

  • Target

    f4d6e9f39910fc36797c5f6b42a2e51cf0bfaef5660c982402f628640abdbb95.exe

  • Size

    674KB

  • MD5

    425fd6301033c70fd49857b065a9d956

  • SHA1

    d8cc8504a0dc0f4704e9da605c98d685b447d545

  • SHA256

    f4d6e9f39910fc36797c5f6b42a2e51cf0bfaef5660c982402f628640abdbb95

  • SHA512

    88147d2ae70b582c2643b24923f89e38a6632c198f05ecb0f12a06804330aa8cadcf24d0b159186f23178e42ac2a6566f42104c2ba20abbd4e4bb1dac38cc88d

  • SSDEEP

    12288:eMrcy90XBbpT79mE1V5PzHxg3WcTBczyxrhuCuXI42jg9hLWPqyZJjB:Oy8hhhB1V5PzHujNNF42jTSyvjB

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4d6e9f39910fc36797c5f6b42a2e51cf0bfaef5660c982402f628640abdbb95.exe
    "C:\Users\Admin\AppData\Local\Temp\f4d6e9f39910fc36797c5f6b42a2e51cf0bfaef5660c982402f628640abdbb95.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un597067.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un597067.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6991.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6991.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4200
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 1080
          4⤵
          • Program crash
          PID:1148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8755.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8755.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1372
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 1344
          4⤵
          • Program crash
          PID:3468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si882376.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si882376.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3004
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4200 -ip 4200
    1⤵
      PID:4436
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1372 -ip 1372
      1⤵
        PID:3760

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si882376.exe

        Filesize

        176KB

        MD5

        4086cca94ce932e90d085b65a920707a

        SHA1

        9851e4bb3c55d0f86b7d12bcf3fea50e19cd4a45

        SHA256

        a15c94098c20f8690d32e1b742b1eb19ba1673d4cdc9fe8a3c64a9cb69917891

        SHA512

        9f59164142d51d8004b6c76e56cd2a1afe8d3f1d64070e206386f896909da325211a4a80951c7638adc09a4d5bf90069456736c2029aa4dd42498877377b2e21

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si882376.exe

        Filesize

        176KB

        MD5

        4086cca94ce932e90d085b65a920707a

        SHA1

        9851e4bb3c55d0f86b7d12bcf3fea50e19cd4a45

        SHA256

        a15c94098c20f8690d32e1b742b1eb19ba1673d4cdc9fe8a3c64a9cb69917891

        SHA512

        9f59164142d51d8004b6c76e56cd2a1afe8d3f1d64070e206386f896909da325211a4a80951c7638adc09a4d5bf90069456736c2029aa4dd42498877377b2e21

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un597067.exe

        Filesize

        533KB

        MD5

        7da8cb3775cd885caec803ca62a74364

        SHA1

        33c5c29707fbaa2807b713811a304307bbf921ac

        SHA256

        ca0fa59d32addf3f9bff5ce043ce956120f3f0cc6e23fa3c651c22e5bccc3135

        SHA512

        95af227da55b2f0b1cd5693a5ee529fc2bc27c166ae824a48aaaa67572d5ae9a8b24f12b1fabde3777e763bf3749b2f833fe428b2db7b39ea925ca6fae23d219

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un597067.exe

        Filesize

        533KB

        MD5

        7da8cb3775cd885caec803ca62a74364

        SHA1

        33c5c29707fbaa2807b713811a304307bbf921ac

        SHA256

        ca0fa59d32addf3f9bff5ce043ce956120f3f0cc6e23fa3c651c22e5bccc3135

        SHA512

        95af227da55b2f0b1cd5693a5ee529fc2bc27c166ae824a48aaaa67572d5ae9a8b24f12b1fabde3777e763bf3749b2f833fe428b2db7b39ea925ca6fae23d219

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6991.exe

        Filesize

        376KB

        MD5

        c2fc7f54e770ba60d10de24efd25dcb2

        SHA1

        e70181172bbf4f8b3e44b8ab3ce39e631175ed72

        SHA256

        eedb06d4a27c5bc86ccb3bfffe7e422a5793722e17d44c0dde4fb7bdbc5ec34d

        SHA512

        d1929d8d74c64e304d478a81eefc8653ad95c53a8d73310463e283617af37bee68f291f0acbec16c2d212464f0660bf5a217f0a03668e2c0c838cb10953ffc5c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6991.exe

        Filesize

        376KB

        MD5

        c2fc7f54e770ba60d10de24efd25dcb2

        SHA1

        e70181172bbf4f8b3e44b8ab3ce39e631175ed72

        SHA256

        eedb06d4a27c5bc86ccb3bfffe7e422a5793722e17d44c0dde4fb7bdbc5ec34d

        SHA512

        d1929d8d74c64e304d478a81eefc8653ad95c53a8d73310463e283617af37bee68f291f0acbec16c2d212464f0660bf5a217f0a03668e2c0c838cb10953ffc5c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8755.exe

        Filesize

        435KB

        MD5

        ddc8d7b6724e233909ebd1cf411892b2

        SHA1

        b284c7cbaacfbd040bea5dbce61274994f5ee4b4

        SHA256

        be014b19afa06cd795d26392ac311598c901f1fbd87dee25d5d76108b9317bc9

        SHA512

        693ccafc6a6aa6153bd7336d60496b75baa7782ebc9be2bfc7ab7138564da5aeded549f7a1bf7ed0b702c89443f2a5cbb31ec77df9b4e4af599e3809847ba6dc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8755.exe

        Filesize

        435KB

        MD5

        ddc8d7b6724e233909ebd1cf411892b2

        SHA1

        b284c7cbaacfbd040bea5dbce61274994f5ee4b4

        SHA256

        be014b19afa06cd795d26392ac311598c901f1fbd87dee25d5d76108b9317bc9

        SHA512

        693ccafc6a6aa6153bd7336d60496b75baa7782ebc9be2bfc7ab7138564da5aeded549f7a1bf7ed0b702c89443f2a5cbb31ec77df9b4e4af599e3809847ba6dc

      • memory/1372-1102-0x00000000077C0000-0x00000000078CA000-memory.dmp

        Filesize

        1.0MB

      • memory/1372-1103-0x0000000006A10000-0x0000000006A22000-memory.dmp

        Filesize

        72KB

      • memory/1372-1116-0x0000000009130000-0x0000000009180000-memory.dmp

        Filesize

        320KB

      • memory/1372-1115-0x00000000090B0000-0x0000000009126000-memory.dmp

        Filesize

        472KB

      • memory/1372-1114-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

        Filesize

        64KB

      • memory/1372-1113-0x00000000086F0000-0x0000000008C1C000-memory.dmp

        Filesize

        5.2MB

      • memory/1372-1112-0x0000000008510000-0x00000000086D2000-memory.dmp

        Filesize

        1.8MB

      • memory/1372-1111-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

        Filesize

        64KB

      • memory/1372-1110-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

        Filesize

        64KB

      • memory/1372-1109-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

        Filesize

        64KB

      • memory/1372-1108-0x00000000081E0000-0x0000000008272000-memory.dmp

        Filesize

        584KB

      • memory/1372-1107-0x0000000007B10000-0x0000000007B76000-memory.dmp

        Filesize

        408KB

      • memory/1372-1105-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

        Filesize

        64KB

      • memory/1372-1104-0x0000000006A70000-0x0000000006AAC000-memory.dmp

        Filesize

        240KB

      • memory/1372-201-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-1101-0x00000000071A0000-0x00000000077B8000-memory.dmp

        Filesize

        6.1MB

      • memory/1372-431-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

        Filesize

        64KB

      • memory/1372-227-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-225-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-223-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-205-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-219-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-217-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-191-0x0000000003F20000-0x0000000003F6B000-memory.dmp

        Filesize

        300KB

      • memory/1372-192-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

        Filesize

        64KB

      • memory/1372-193-0x0000000006AE0000-0x0000000006AF0000-memory.dmp

        Filesize

        64KB

      • memory/1372-194-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-195-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-197-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-199-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-215-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-207-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-221-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-203-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-209-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-213-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/1372-211-0x0000000004330000-0x000000000436F000-memory.dmp

        Filesize

        252KB

      • memory/3004-1122-0x0000000000F90000-0x0000000000FC2000-memory.dmp

        Filesize

        200KB

      • memory/3004-1123-0x0000000005890000-0x00000000058A0000-memory.dmp

        Filesize

        64KB

      • memory/4200-155-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-149-0x0000000004B50000-0x00000000050F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4200-185-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4200-184-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4200-183-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4200-181-0x0000000000400000-0x00000000005A3000-memory.dmp

        Filesize

        1.6MB

      • memory/4200-180-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4200-150-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-179-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4200-157-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-178-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/4200-186-0x0000000000400000-0x00000000005A3000-memory.dmp

        Filesize

        1.6MB

      • memory/4200-171-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-175-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-173-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-167-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-165-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-163-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-159-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-161-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-169-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-177-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-148-0x0000000000750000-0x000000000077D000-memory.dmp

        Filesize

        180KB

      • memory/4200-153-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4200-151-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB