Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    101s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 00:20

General

  • Target

    cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe

  • Size

    537KB

  • MD5

    4137c3abcce8d3911920a8b52aae17a8

  • SHA1

    8afed504eedd73a1d5851bc92f8af1108f6720ad

  • SHA256

    cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b

  • SHA512

    5fbc8133bd8d604d4b2c4a7cfc597ef86048847e5de96602ba5c9ddab436bd716d5d7786784e08bf16ed6f974cd976686c8150c5472f85ab19b9cbc3a0fa5b76

  • SSDEEP

    12288:MMrGy90ry8k9yFZq+rKovBl3HrUNcHcwQsotSogV/RJkV:Cyw9k94Z1z/rH8wzaNgV/i

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe
    "C:\Users\Admin\AppData\Local\Temp\cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVe9591.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVe9591.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr409696.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr409696.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku542268.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku542268.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1164
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 1336
          4⤵
          • Program crash
          PID:640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742189.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742189.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4004
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1164 -ip 1164
    1⤵
      PID:4220

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742189.exe

      Filesize

      176KB

      MD5

      710bc0812e3abeb3edc9d27f6605e179

      SHA1

      c769be7e1d245bc408ddfca4ef9394c06400120c

      SHA256

      e53e1d752f11d83a4451d39c0ce79e438a594560809ee4a76ce00acf8a556848

      SHA512

      3c12f6d91eb28c13650c8b2ca46f77042cc50a8e4cbf408358843a07e8e78b645c3bdbc40b004fcd90be11f1949b2bd6d478ea406bb66b76eb724305e2cce260

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742189.exe

      Filesize

      176KB

      MD5

      710bc0812e3abeb3edc9d27f6605e179

      SHA1

      c769be7e1d245bc408ddfca4ef9394c06400120c

      SHA256

      e53e1d752f11d83a4451d39c0ce79e438a594560809ee4a76ce00acf8a556848

      SHA512

      3c12f6d91eb28c13650c8b2ca46f77042cc50a8e4cbf408358843a07e8e78b645c3bdbc40b004fcd90be11f1949b2bd6d478ea406bb66b76eb724305e2cce260

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVe9591.exe

      Filesize

      395KB

      MD5

      99bb8231e819e44f5d3f5b47394f0acd

      SHA1

      fc5e5d983b92779b6559c83610173354aa81a7ab

      SHA256

      059e869ed841670192ab3dd89e44f857a21e75275d1a1d4d20e7b299473a58e1

      SHA512

      f2fe98361270263100b9ec6c15bfe71b0b860263fa0c535bbc3b7839d5143c75861588a32744f39779b21defc5cd7bda96c57f4af959142277c2dc6b344e418c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVe9591.exe

      Filesize

      395KB

      MD5

      99bb8231e819e44f5d3f5b47394f0acd

      SHA1

      fc5e5d983b92779b6559c83610173354aa81a7ab

      SHA256

      059e869ed841670192ab3dd89e44f857a21e75275d1a1d4d20e7b299473a58e1

      SHA512

      f2fe98361270263100b9ec6c15bfe71b0b860263fa0c535bbc3b7839d5143c75861588a32744f39779b21defc5cd7bda96c57f4af959142277c2dc6b344e418c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr409696.exe

      Filesize

      14KB

      MD5

      1773c9f85913e8fbfbb70603455f9844

      SHA1

      922702cce7fbb429f269b2fbd4307d4e3ca8a728

      SHA256

      a2a0de4de489c3734fecab21da431f29ab336d646674cb72047ab52a5432db82

      SHA512

      303306573fdd5c193f58bc2aaaafd02dc351b030d56f019dc67b1506981859a8a187a56b3d4d42390bf3d9743dfe0de5f7a04d2cf96d12971ebaee6c4423e384

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr409696.exe

      Filesize

      14KB

      MD5

      1773c9f85913e8fbfbb70603455f9844

      SHA1

      922702cce7fbb429f269b2fbd4307d4e3ca8a728

      SHA256

      a2a0de4de489c3734fecab21da431f29ab336d646674cb72047ab52a5432db82

      SHA512

      303306573fdd5c193f58bc2aaaafd02dc351b030d56f019dc67b1506981859a8a187a56b3d4d42390bf3d9743dfe0de5f7a04d2cf96d12971ebaee6c4423e384

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku542268.exe

      Filesize

      352KB

      MD5

      d667283901f2c7c9d8b71d7be922992d

      SHA1

      99717cf59c93632d165cf9a91ef15afc38926bd8

      SHA256

      aaa2ccb3a6d1c74183cbaeba1cac68312bdb4a0723db7a6a2f7f36647c6ac33f

      SHA512

      9880a4abc28ab048e3f076c6015029ca204b927236144565b55d331d3a3e65d93805d1c322cb7928704a3bc71708da918bba2d600471f6ee5d9201470cdad606

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku542268.exe

      Filesize

      352KB

      MD5

      d667283901f2c7c9d8b71d7be922992d

      SHA1

      99717cf59c93632d165cf9a91ef15afc38926bd8

      SHA256

      aaa2ccb3a6d1c74183cbaeba1cac68312bdb4a0723db7a6a2f7f36647c6ac33f

      SHA512

      9880a4abc28ab048e3f076c6015029ca204b927236144565b55d331d3a3e65d93805d1c322cb7928704a3bc71708da918bba2d600471f6ee5d9201470cdad606

    • memory/1164-153-0x0000000000990000-0x00000000009DB000-memory.dmp

      Filesize

      300KB

    • memory/1164-154-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

      Filesize

      64KB

    • memory/1164-155-0x0000000004EF0000-0x0000000005494000-memory.dmp

      Filesize

      5.6MB

    • memory/1164-156-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-159-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-157-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-161-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-163-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-165-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-167-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-169-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-171-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-173-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-175-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-177-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-179-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-181-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-183-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-185-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-187-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-191-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

      Filesize

      64KB

    • memory/1164-189-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

      Filesize

      64KB

    • memory/1164-190-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-193-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-195-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-197-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-199-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-201-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-203-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-205-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-207-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-209-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-211-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-213-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-215-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-217-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-219-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-221-0x0000000004DF0000-0x0000000004E2F000-memory.dmp

      Filesize

      252KB

    • memory/1164-1064-0x00000000055A0000-0x0000000005BB8000-memory.dmp

      Filesize

      6.1MB

    • memory/1164-1065-0x0000000005BF0000-0x0000000005CFA000-memory.dmp

      Filesize

      1.0MB

    • memory/1164-1066-0x0000000005D30000-0x0000000005D42000-memory.dmp

      Filesize

      72KB

    • memory/1164-1067-0x0000000005D50000-0x0000000005D8C000-memory.dmp

      Filesize

      240KB

    • memory/1164-1068-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

      Filesize

      64KB

    • memory/1164-1070-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

      Filesize

      64KB

    • memory/1164-1071-0x0000000006040000-0x00000000060A6000-memory.dmp

      Filesize

      408KB

    • memory/1164-1072-0x0000000006700000-0x0000000006792000-memory.dmp

      Filesize

      584KB

    • memory/1164-1073-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

      Filesize

      64KB

    • memory/1164-1074-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

      Filesize

      64KB

    • memory/1164-1075-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

      Filesize

      64KB

    • memory/1164-1076-0x0000000006A40000-0x0000000006AB6000-memory.dmp

      Filesize

      472KB

    • memory/1164-1077-0x0000000006AE0000-0x0000000006B30000-memory.dmp

      Filesize

      320KB

    • memory/1164-1078-0x0000000006B60000-0x0000000006D22000-memory.dmp

      Filesize

      1.8MB

    • memory/1164-1079-0x0000000006D30000-0x000000000725C000-memory.dmp

      Filesize

      5.2MB

    • memory/2104-147-0x0000000000DC0000-0x0000000000DCA000-memory.dmp

      Filesize

      40KB

    • memory/4004-1085-0x0000000000750000-0x0000000000782000-memory.dmp

      Filesize

      200KB

    • memory/4004-1086-0x0000000005320000-0x0000000005330000-memory.dmp

      Filesize

      64KB