Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    55s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 18:09 UTC

General

  • Target

    1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe

  • Size

    666KB

  • MD5

    26b08dab33665b217dfa3648816c11c9

  • SHA1

    c4673b78bda3eed856228cd7c9cbb7a3e0fc947d

  • SHA256

    1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7

  • SHA512

    ed25070b1f386c5ab43ca41c8ce34e8e1c055cb8f25f5205636e6b58b3d3e4e70ffe0c6a8bad2fa4e3baf006610cefe3749cdc897ab9f2929e507e04d2fbd3a4

  • SSDEEP

    12288:7Mr7y90x/cDr+phlUh8FC0rlXbif+hAsMy6N2b9I6+517aqG0:sy80DrKlUf0rle2hAst6N2t+1n

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe
    "C:\Users\Admin\AppData\Local\Temp\1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992785.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992785.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8949.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8949.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6710.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6710.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820838.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820838.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1480

Network

  • flag-us
    DNS
    145.115.113.176.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    145.115.113.176.in-addr.arpa
    IN PTR
    Response
  • 176.113.115.145:4125
    qu6710.exe
    3.9MB
    47.1kB
    2850
    1023
  • 176.113.115.145:4125
    si820838.exe
    3.9MB
    52.2kB
    2836
    1152
  • 20.189.173.13:443
    322 B
    7
  • 8.8.8.8:53
    145.115.113.176.in-addr.arpa
    dns
    74 B
    134 B
    1
    1

    DNS Request

    145.115.113.176.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820838.exe

    Filesize

    175KB

    MD5

    3c585e68728b474d4117287610658fb0

    SHA1

    6eaa3c0b1fc21182094876640fa4724738c8a259

    SHA256

    adc14652878d37a8dd428fb3e63364113b14211d0be62658a050eb21621ac746

    SHA512

    a936b70ef0c11416956188df45de36573a32e2040cfd1788b5e8cb6d13fd773086ddf21e97beb5cef7ac1ba30b891a09c4e137ec25a56179be1026f7aa64ea21

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820838.exe

    Filesize

    175KB

    MD5

    3c585e68728b474d4117287610658fb0

    SHA1

    6eaa3c0b1fc21182094876640fa4724738c8a259

    SHA256

    adc14652878d37a8dd428fb3e63364113b14211d0be62658a050eb21621ac746

    SHA512

    a936b70ef0c11416956188df45de36573a32e2040cfd1788b5e8cb6d13fd773086ddf21e97beb5cef7ac1ba30b891a09c4e137ec25a56179be1026f7aa64ea21

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992785.exe

    Filesize

    523KB

    MD5

    b14adc1b64294eecc75988ae4ec38026

    SHA1

    e3f593874191bb58803146b6bc306f63c7c29bee

    SHA256

    0888395aecc646d9470a43e03b965cff8d896e5c3a498d69ad3ca9ca4c138b92

    SHA512

    3cfa9cb69bec7283b4e4ac58d94dd8cad0eab22f7673ae6fe64943f2839ec8f33268525ab6ab4cf69b2b72c63d0ebb5ab89dcb92bce58616ab59ef3ad06c78ed

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992785.exe

    Filesize

    523KB

    MD5

    b14adc1b64294eecc75988ae4ec38026

    SHA1

    e3f593874191bb58803146b6bc306f63c7c29bee

    SHA256

    0888395aecc646d9470a43e03b965cff8d896e5c3a498d69ad3ca9ca4c138b92

    SHA512

    3cfa9cb69bec7283b4e4ac58d94dd8cad0eab22f7673ae6fe64943f2839ec8f33268525ab6ab4cf69b2b72c63d0ebb5ab89dcb92bce58616ab59ef3ad06c78ed

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8949.exe

    Filesize

    294KB

    MD5

    3f140e96e2ca6481273ac6141c5071a2

    SHA1

    f2471046446c5ba197f8373805de9c9e602af157

    SHA256

    dde2498dcb9c6b8b263d71a7036dc7228c8c658af133b8e778a2d74423d66fab

    SHA512

    fa1668ae0c09d16f528cd228711334fe007833d01ee84aaa897742f14c4d2aa058edc21719e5a0c99f574d2e12a4264d2b72f94f7a2c1417cff9147e0359fb0e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8949.exe

    Filesize

    294KB

    MD5

    3f140e96e2ca6481273ac6141c5071a2

    SHA1

    f2471046446c5ba197f8373805de9c9e602af157

    SHA256

    dde2498dcb9c6b8b263d71a7036dc7228c8c658af133b8e778a2d74423d66fab

    SHA512

    fa1668ae0c09d16f528cd228711334fe007833d01ee84aaa897742f14c4d2aa058edc21719e5a0c99f574d2e12a4264d2b72f94f7a2c1417cff9147e0359fb0e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6710.exe

    Filesize

    353KB

    MD5

    7b46e26e4ddd3517ad298bd0f0a67da9

    SHA1

    c287a02a2d49bf3dc460b3c7d88209711d9a3548

    SHA256

    96a2c636dabf871607fec4948a169bdc4291049ce256e3a01330475b88b31823

    SHA512

    629864ae5202176cc82783d98250867cc53bb96c3711340a9b4f2e215641a34defa12de7ca671aeb13bbed826859a07f8053ab31605938b2878913e4bb347a65

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6710.exe

    Filesize

    353KB

    MD5

    7b46e26e4ddd3517ad298bd0f0a67da9

    SHA1

    c287a02a2d49bf3dc460b3c7d88209711d9a3548

    SHA256

    96a2c636dabf871607fec4948a169bdc4291049ce256e3a01330475b88b31823

    SHA512

    629864ae5202176cc82783d98250867cc53bb96c3711340a9b4f2e215641a34defa12de7ca671aeb13bbed826859a07f8053ab31605938b2878913e4bb347a65

  • memory/1480-1114-0x00000000051F0000-0x0000000005200000-memory.dmp

    Filesize

    64KB

  • memory/1480-1113-0x00000000051F0000-0x0000000005200000-memory.dmp

    Filesize

    64KB

  • memory/1480-1112-0x0000000005050000-0x000000000509B000-memory.dmp

    Filesize

    300KB

  • memory/1480-1111-0x0000000000610000-0x0000000000642000-memory.dmp

    Filesize

    200KB

  • memory/3828-1091-0x00000000054E0000-0x00000000054F2000-memory.dmp

    Filesize

    72KB

  • memory/3828-1096-0x00000000057E0000-0x0000000005846000-memory.dmp

    Filesize

    408KB

  • memory/3828-1105-0x0000000006780000-0x00000000067D0000-memory.dmp

    Filesize

    320KB

  • memory/3828-1104-0x00000000066E0000-0x0000000006756000-memory.dmp

    Filesize

    472KB

  • memory/3828-1103-0x0000000007C10000-0x000000000813C000-memory.dmp

    Filesize

    5.2MB

  • memory/3828-1102-0x0000000007A40000-0x0000000007C02000-memory.dmp

    Filesize

    1.8MB

  • memory/3828-1101-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-1100-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-1099-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-1098-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-1097-0x0000000006390000-0x0000000006422000-memory.dmp

    Filesize

    584KB

  • memory/3828-1094-0x0000000005650000-0x000000000569B000-memory.dmp

    Filesize

    300KB

  • memory/3828-1093-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-1092-0x0000000005500000-0x000000000553E000-memory.dmp

    Filesize

    248KB

  • memory/3828-1090-0x0000000004E90000-0x0000000004F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3828-1089-0x0000000005AF0000-0x00000000060F6000-memory.dmp

    Filesize

    6.0MB

  • memory/3828-395-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-397-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-392-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-177-0x0000000002610000-0x0000000002656000-memory.dmp

    Filesize

    280KB

  • memory/3828-178-0x00000000028B0000-0x00000000028F4000-memory.dmp

    Filesize

    272KB

  • memory/3828-179-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-180-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-182-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-184-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-186-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-190-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-192-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-188-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-194-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-196-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-200-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-202-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-204-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-198-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-206-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-208-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-210-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-212-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-391-0x0000000000810000-0x000000000085B000-memory.dmp

    Filesize

    300KB

  • memory/4124-159-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-137-0x00000000025A0000-0x00000000025B0000-memory.dmp

    Filesize

    64KB

  • memory/4124-172-0x0000000000400000-0x00000000007FE000-memory.dmp

    Filesize

    4.0MB

  • memory/4124-170-0x00000000025A0000-0x00000000025B0000-memory.dmp

    Filesize

    64KB

  • memory/4124-169-0x00000000025A0000-0x00000000025B0000-memory.dmp

    Filesize

    64KB

  • memory/4124-140-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-168-0x0000000000400000-0x00000000007FE000-memory.dmp

    Filesize

    4.0MB

  • memory/4124-167-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-165-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-145-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-163-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-161-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-143-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-155-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-141-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-153-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-151-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-149-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-147-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-139-0x00000000024F0000-0x0000000002508000-memory.dmp

    Filesize

    96KB

  • memory/4124-138-0x0000000004E40000-0x000000000533E000-memory.dmp

    Filesize

    5.0MB

  • memory/4124-157-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-136-0x00000000025A0000-0x00000000025B0000-memory.dmp

    Filesize

    64KB

  • memory/4124-135-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4124-134-0x0000000000D30000-0x0000000000D4A000-memory.dmp

    Filesize

    104KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.