Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    88s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 19:08

General

  • Target

    9c2238a79590ec3a91f5d068fdb572de5d67b7c32cb54580ce7ebfff4aa52b9f.exe

  • Size

    665KB

  • MD5

    692d72dcdb58a8d9fd4002de2bcfbdf0

  • SHA1

    8d7ebb98aa90e6ef3ba839f8b4df5246abea3724

  • SHA256

    9c2238a79590ec3a91f5d068fdb572de5d67b7c32cb54580ce7ebfff4aa52b9f

  • SHA512

    fb6a26eace90b193a60c096fa43a694359d84594739d30274510da227593e4bfae0b9a2bfa28c03f8fde2dfc31c5a2d0eec36b2872a144832aea4bfe8f51f0f3

  • SSDEEP

    12288:QMr5y90h5yfNUN956x83t/t+W2oh0NRbg2U4L2INaT:5yiqUNr3t/32LNR24aINaT

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c2238a79590ec3a91f5d068fdb572de5d67b7c32cb54580ce7ebfff4aa52b9f.exe
    "C:\Users\Admin\AppData\Local\Temp\9c2238a79590ec3a91f5d068fdb572de5d67b7c32cb54580ce7ebfff4aa52b9f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778089.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778089.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0508.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0508.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1220
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 1088
          4⤵
          • Program crash
          PID:4540
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4091.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4091.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4260
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 1800
          4⤵
          • Program crash
          PID:2252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016684.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016684.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2212
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1220 -ip 1220
    1⤵
      PID:4624
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4260 -ip 4260
      1⤵
        PID:1504

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016684.exe

        Filesize

        175KB

        MD5

        bc9542a8171048ac3847e3cf09aa1748

        SHA1

        42121616e2819ac5388980dbc0d284fa812b271d

        SHA256

        d2b57d3173157bfa5d8ba326a0a1a407c73cf518f3dda984295bbd8113a34e40

        SHA512

        61015035e65007bae1c075adbc83aac31761df4ebc7b5f34f09246b754c769f149938257de32416c836fa9d538a8f8892934c1831dd0dc884b26e09b16a23568

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016684.exe

        Filesize

        175KB

        MD5

        bc9542a8171048ac3847e3cf09aa1748

        SHA1

        42121616e2819ac5388980dbc0d284fa812b271d

        SHA256

        d2b57d3173157bfa5d8ba326a0a1a407c73cf518f3dda984295bbd8113a34e40

        SHA512

        61015035e65007bae1c075adbc83aac31761df4ebc7b5f34f09246b754c769f149938257de32416c836fa9d538a8f8892934c1831dd0dc884b26e09b16a23568

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778089.exe

        Filesize

        523KB

        MD5

        fbddcd065e08da9aa7e82e77bffecd0d

        SHA1

        c948d6e36b153736c32e36ebcfde2089eaabf2fa

        SHA256

        33f56d6c973c74aeda050f71af892bac579e0c835175946ba0a188bd511facd4

        SHA512

        5860950699e3d641b8815951d90d2d9640a505c78c3fd9937521ccc771c7bb0c9c199d5262625bd2e3bc12fb5880c1b40bbe42afc7dcf4ce3ac8edf67aea9597

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778089.exe

        Filesize

        523KB

        MD5

        fbddcd065e08da9aa7e82e77bffecd0d

        SHA1

        c948d6e36b153736c32e36ebcfde2089eaabf2fa

        SHA256

        33f56d6c973c74aeda050f71af892bac579e0c835175946ba0a188bd511facd4

        SHA512

        5860950699e3d641b8815951d90d2d9640a505c78c3fd9937521ccc771c7bb0c9c199d5262625bd2e3bc12fb5880c1b40bbe42afc7dcf4ce3ac8edf67aea9597

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0508.exe

        Filesize

        294KB

        MD5

        8644ff4c84354eade88faacf576792e3

        SHA1

        124dbbac88a3aad6b9d433c9c9f1ed3d54ca9fc3

        SHA256

        64ef702c7f55c6c5b9a1ec7878243d3fc4c11fd6f2fcf605d5af138a6419aa8d

        SHA512

        4aee8ce9c620437367878f1ac30e8e18766121468e8c02dba9ea8a1bc844b8dfb541a316580a9729122c3d6570404d630954556795dfc5fd5509073b8ec3d5fe

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0508.exe

        Filesize

        294KB

        MD5

        8644ff4c84354eade88faacf576792e3

        SHA1

        124dbbac88a3aad6b9d433c9c9f1ed3d54ca9fc3

        SHA256

        64ef702c7f55c6c5b9a1ec7878243d3fc4c11fd6f2fcf605d5af138a6419aa8d

        SHA512

        4aee8ce9c620437367878f1ac30e8e18766121468e8c02dba9ea8a1bc844b8dfb541a316580a9729122c3d6570404d630954556795dfc5fd5509073b8ec3d5fe

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4091.exe

        Filesize

        353KB

        MD5

        14fea90f5701776761f9107c37240184

        SHA1

        59fb36609ba6f23a38f6945f043078bedc9ad874

        SHA256

        56ee293725159cf835ba53a3c84eee7cd93429f77b7e00a83939837f5e5fa4c2

        SHA512

        ca53d0d95dced2e19f88ff8a7acfa80ace5d54527066be15e287f5e911d4ec8f91e9c782ac6545c833ab3302c641c99f05dfe5bc42afb8a4686ac35023fe3bf8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4091.exe

        Filesize

        353KB

        MD5

        14fea90f5701776761f9107c37240184

        SHA1

        59fb36609ba6f23a38f6945f043078bedc9ad874

        SHA256

        56ee293725159cf835ba53a3c84eee7cd93429f77b7e00a83939837f5e5fa4c2

        SHA512

        ca53d0d95dced2e19f88ff8a7acfa80ace5d54527066be15e287f5e911d4ec8f91e9c782ac6545c833ab3302c641c99f05dfe5bc42afb8a4686ac35023fe3bf8

      • memory/1220-148-0x0000000000A90000-0x0000000000ABD000-memory.dmp

        Filesize

        180KB

      • memory/1220-149-0x0000000004E10000-0x00000000053B4000-memory.dmp

        Filesize

        5.6MB

      • memory/1220-150-0x0000000002830000-0x0000000002840000-memory.dmp

        Filesize

        64KB

      • memory/1220-151-0x0000000002830000-0x0000000002840000-memory.dmp

        Filesize

        64KB

      • memory/1220-152-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-153-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-157-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-155-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-159-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-161-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-163-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-165-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-167-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-169-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-171-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-173-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-175-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-177-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-179-0x0000000002930000-0x0000000002942000-memory.dmp

        Filesize

        72KB

      • memory/1220-180-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/1220-181-0x0000000002830000-0x0000000002840000-memory.dmp

        Filesize

        64KB

      • memory/1220-182-0x0000000002830000-0x0000000002840000-memory.dmp

        Filesize

        64KB

      • memory/1220-183-0x0000000002830000-0x0000000002840000-memory.dmp

        Filesize

        64KB

      • memory/1220-185-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/2212-1122-0x0000000000350000-0x0000000000382000-memory.dmp

        Filesize

        200KB

      • memory/2212-1124-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/2212-1123-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/4260-193-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-314-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/4260-194-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-196-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-198-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-200-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-202-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-204-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-206-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-208-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-210-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-212-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-214-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-216-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-218-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-220-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-222-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-224-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-226-0x00000000028C0000-0x00000000028FF000-memory.dmp

        Filesize

        252KB

      • memory/4260-190-0x0000000000960000-0x00000000009AB000-memory.dmp

        Filesize

        300KB

      • memory/4260-1100-0x0000000005490000-0x0000000005AA8000-memory.dmp

        Filesize

        6.1MB

      • memory/4260-1101-0x0000000005AB0000-0x0000000005BBA000-memory.dmp

        Filesize

        1.0MB

      • memory/4260-1102-0x0000000005BF0000-0x0000000005C02000-memory.dmp

        Filesize

        72KB

      • memory/4260-1103-0x0000000005C10000-0x0000000005C4C000-memory.dmp

        Filesize

        240KB

      • memory/4260-1104-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/4260-1106-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/4260-1107-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/4260-1108-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/4260-1109-0x0000000005F00000-0x0000000005F66000-memory.dmp

        Filesize

        408KB

      • memory/4260-1110-0x00000000065C0000-0x0000000006652000-memory.dmp

        Filesize

        584KB

      • memory/4260-1111-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/4260-1112-0x0000000006800000-0x00000000069C2000-memory.dmp

        Filesize

        1.8MB

      • memory/4260-192-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/4260-191-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/4260-1113-0x00000000069D0000-0x0000000006EFC000-memory.dmp

        Filesize

        5.2MB

      • memory/4260-1114-0x0000000006FA0000-0x0000000007016000-memory.dmp

        Filesize

        472KB

      • memory/4260-1115-0x0000000007040000-0x0000000007090000-memory.dmp

        Filesize

        320KB