Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    55s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 18:09

General

  • Target

    1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe

  • Size

    666KB

  • MD5

    26b08dab33665b217dfa3648816c11c9

  • SHA1

    c4673b78bda3eed856228cd7c9cbb7a3e0fc947d

  • SHA256

    1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7

  • SHA512

    ed25070b1f386c5ab43ca41c8ce34e8e1c055cb8f25f5205636e6b58b3d3e4e70ffe0c6a8bad2fa4e3baf006610cefe3749cdc897ab9f2929e507e04d2fbd3a4

  • SSDEEP

    12288:7Mr7y90x/cDr+phlUh8FC0rlXbif+hAsMy6N2b9I6+517aqG0:sy80DrKlUf0rle2hAst6N2t+1n

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe
    "C:\Users\Admin\AppData\Local\Temp\1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992785.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992785.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8949.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8949.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6710.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6710.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820838.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820838.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1480

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820838.exe

    Filesize

    175KB

    MD5

    3c585e68728b474d4117287610658fb0

    SHA1

    6eaa3c0b1fc21182094876640fa4724738c8a259

    SHA256

    adc14652878d37a8dd428fb3e63364113b14211d0be62658a050eb21621ac746

    SHA512

    a936b70ef0c11416956188df45de36573a32e2040cfd1788b5e8cb6d13fd773086ddf21e97beb5cef7ac1ba30b891a09c4e137ec25a56179be1026f7aa64ea21

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820838.exe

    Filesize

    175KB

    MD5

    3c585e68728b474d4117287610658fb0

    SHA1

    6eaa3c0b1fc21182094876640fa4724738c8a259

    SHA256

    adc14652878d37a8dd428fb3e63364113b14211d0be62658a050eb21621ac746

    SHA512

    a936b70ef0c11416956188df45de36573a32e2040cfd1788b5e8cb6d13fd773086ddf21e97beb5cef7ac1ba30b891a09c4e137ec25a56179be1026f7aa64ea21

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992785.exe

    Filesize

    523KB

    MD5

    b14adc1b64294eecc75988ae4ec38026

    SHA1

    e3f593874191bb58803146b6bc306f63c7c29bee

    SHA256

    0888395aecc646d9470a43e03b965cff8d896e5c3a498d69ad3ca9ca4c138b92

    SHA512

    3cfa9cb69bec7283b4e4ac58d94dd8cad0eab22f7673ae6fe64943f2839ec8f33268525ab6ab4cf69b2b72c63d0ebb5ab89dcb92bce58616ab59ef3ad06c78ed

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992785.exe

    Filesize

    523KB

    MD5

    b14adc1b64294eecc75988ae4ec38026

    SHA1

    e3f593874191bb58803146b6bc306f63c7c29bee

    SHA256

    0888395aecc646d9470a43e03b965cff8d896e5c3a498d69ad3ca9ca4c138b92

    SHA512

    3cfa9cb69bec7283b4e4ac58d94dd8cad0eab22f7673ae6fe64943f2839ec8f33268525ab6ab4cf69b2b72c63d0ebb5ab89dcb92bce58616ab59ef3ad06c78ed

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8949.exe

    Filesize

    294KB

    MD5

    3f140e96e2ca6481273ac6141c5071a2

    SHA1

    f2471046446c5ba197f8373805de9c9e602af157

    SHA256

    dde2498dcb9c6b8b263d71a7036dc7228c8c658af133b8e778a2d74423d66fab

    SHA512

    fa1668ae0c09d16f528cd228711334fe007833d01ee84aaa897742f14c4d2aa058edc21719e5a0c99f574d2e12a4264d2b72f94f7a2c1417cff9147e0359fb0e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8949.exe

    Filesize

    294KB

    MD5

    3f140e96e2ca6481273ac6141c5071a2

    SHA1

    f2471046446c5ba197f8373805de9c9e602af157

    SHA256

    dde2498dcb9c6b8b263d71a7036dc7228c8c658af133b8e778a2d74423d66fab

    SHA512

    fa1668ae0c09d16f528cd228711334fe007833d01ee84aaa897742f14c4d2aa058edc21719e5a0c99f574d2e12a4264d2b72f94f7a2c1417cff9147e0359fb0e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6710.exe

    Filesize

    353KB

    MD5

    7b46e26e4ddd3517ad298bd0f0a67da9

    SHA1

    c287a02a2d49bf3dc460b3c7d88209711d9a3548

    SHA256

    96a2c636dabf871607fec4948a169bdc4291049ce256e3a01330475b88b31823

    SHA512

    629864ae5202176cc82783d98250867cc53bb96c3711340a9b4f2e215641a34defa12de7ca671aeb13bbed826859a07f8053ab31605938b2878913e4bb347a65

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6710.exe

    Filesize

    353KB

    MD5

    7b46e26e4ddd3517ad298bd0f0a67da9

    SHA1

    c287a02a2d49bf3dc460b3c7d88209711d9a3548

    SHA256

    96a2c636dabf871607fec4948a169bdc4291049ce256e3a01330475b88b31823

    SHA512

    629864ae5202176cc82783d98250867cc53bb96c3711340a9b4f2e215641a34defa12de7ca671aeb13bbed826859a07f8053ab31605938b2878913e4bb347a65

  • memory/1480-1114-0x00000000051F0000-0x0000000005200000-memory.dmp

    Filesize

    64KB

  • memory/1480-1113-0x00000000051F0000-0x0000000005200000-memory.dmp

    Filesize

    64KB

  • memory/1480-1112-0x0000000005050000-0x000000000509B000-memory.dmp

    Filesize

    300KB

  • memory/1480-1111-0x0000000000610000-0x0000000000642000-memory.dmp

    Filesize

    200KB

  • memory/3828-1091-0x00000000054E0000-0x00000000054F2000-memory.dmp

    Filesize

    72KB

  • memory/3828-1096-0x00000000057E0000-0x0000000005846000-memory.dmp

    Filesize

    408KB

  • memory/3828-1105-0x0000000006780000-0x00000000067D0000-memory.dmp

    Filesize

    320KB

  • memory/3828-1104-0x00000000066E0000-0x0000000006756000-memory.dmp

    Filesize

    472KB

  • memory/3828-1103-0x0000000007C10000-0x000000000813C000-memory.dmp

    Filesize

    5.2MB

  • memory/3828-1102-0x0000000007A40000-0x0000000007C02000-memory.dmp

    Filesize

    1.8MB

  • memory/3828-1101-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-1100-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-1099-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-1098-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-1097-0x0000000006390000-0x0000000006422000-memory.dmp

    Filesize

    584KB

  • memory/3828-1094-0x0000000005650000-0x000000000569B000-memory.dmp

    Filesize

    300KB

  • memory/3828-1093-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-1092-0x0000000005500000-0x000000000553E000-memory.dmp

    Filesize

    248KB

  • memory/3828-1090-0x0000000004E90000-0x0000000004F9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3828-1089-0x0000000005AF0000-0x00000000060F6000-memory.dmp

    Filesize

    6.0MB

  • memory/3828-395-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-397-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-392-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/3828-177-0x0000000002610000-0x0000000002656000-memory.dmp

    Filesize

    280KB

  • memory/3828-178-0x00000000028B0000-0x00000000028F4000-memory.dmp

    Filesize

    272KB

  • memory/3828-179-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-180-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-182-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-184-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-186-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-190-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-192-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-188-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-194-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-196-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-200-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-202-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-204-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-198-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-206-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-208-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-210-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-212-0x00000000028B0000-0x00000000028EF000-memory.dmp

    Filesize

    252KB

  • memory/3828-391-0x0000000000810000-0x000000000085B000-memory.dmp

    Filesize

    300KB

  • memory/4124-159-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-137-0x00000000025A0000-0x00000000025B0000-memory.dmp

    Filesize

    64KB

  • memory/4124-172-0x0000000000400000-0x00000000007FE000-memory.dmp

    Filesize

    4.0MB

  • memory/4124-170-0x00000000025A0000-0x00000000025B0000-memory.dmp

    Filesize

    64KB

  • memory/4124-169-0x00000000025A0000-0x00000000025B0000-memory.dmp

    Filesize

    64KB

  • memory/4124-140-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-168-0x0000000000400000-0x00000000007FE000-memory.dmp

    Filesize

    4.0MB

  • memory/4124-167-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-165-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-145-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-163-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-161-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-143-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-155-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-141-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-153-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-151-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-149-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-147-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-139-0x00000000024F0000-0x0000000002508000-memory.dmp

    Filesize

    96KB

  • memory/4124-138-0x0000000004E40000-0x000000000533E000-memory.dmp

    Filesize

    5.0MB

  • memory/4124-157-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4124-136-0x00000000025A0000-0x00000000025B0000-memory.dmp

    Filesize

    64KB

  • memory/4124-135-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4124-134-0x0000000000D30000-0x0000000000D4A000-memory.dmp

    Filesize

    104KB