Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    74s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 01:43

General

  • Target

    3d199f43500685e0567b9754ebd2e9f2fd7282abbd539584eba8906eae4de164.exe

  • Size

    538KB

  • MD5

    d36d939a079863da976a56bc1f29f100

  • SHA1

    1dda82455a309ee82bd4ce5b5a94486b40863052

  • SHA256

    3d199f43500685e0567b9754ebd2e9f2fd7282abbd539584eba8906eae4de164

  • SHA512

    b02e401ca724c704c69ab11aad9a10c5df3aadd5c6bb52b89c9edbe2adcc2aeb4fdd2cb9da9c701477ed0cdeed7e6cbc0a505960c0f20dbce696d6147376d1cc

  • SSDEEP

    12288:+Mr5y90EoPeSwkf/6CjVX1aEb/UHvH6w0PWT/BIbSe6Pm:DyYxP36CjR1H/qawF/SblZ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d199f43500685e0567b9754ebd2e9f2fd7282abbd539584eba8906eae4de164.exe
    "C:\Users\Admin\AppData\Local\Temp\3d199f43500685e0567b9754ebd2e9f2fd7282abbd539584eba8906eae4de164.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziva8651.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziva8651.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr937140.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr937140.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku121268.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku121268.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 1544
          4⤵
          • Program crash
          PID:1500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr137113.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr137113.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4748
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5112 -ip 5112
    1⤵
      PID:4684

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr137113.exe

      Filesize

      176KB

      MD5

      96d75f711737fe6dbfe9932f93345935

      SHA1

      998a207949cb370ba73979eb43be9e67c56fd41c

      SHA256

      8aef99d47ec30367274feca3a004eb79bbc462d6a55c009ef6ebd9fbca8d7902

      SHA512

      8c8edc5cc659af30933dc76670beaf526821a1e5987e0b81ffb53d6044d8af660720aed158acf61dce24be3406a4f3287e8fbcfc61d855ab357a6d08e36d8346

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr137113.exe

      Filesize

      176KB

      MD5

      96d75f711737fe6dbfe9932f93345935

      SHA1

      998a207949cb370ba73979eb43be9e67c56fd41c

      SHA256

      8aef99d47ec30367274feca3a004eb79bbc462d6a55c009ef6ebd9fbca8d7902

      SHA512

      8c8edc5cc659af30933dc76670beaf526821a1e5987e0b81ffb53d6044d8af660720aed158acf61dce24be3406a4f3287e8fbcfc61d855ab357a6d08e36d8346

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziva8651.exe

      Filesize

      395KB

      MD5

      b317df4bf0383f02930255650fad5a0e

      SHA1

      16433c5786b95b0bedb2581104a6be5a0860d2bd

      SHA256

      eec49a98cbf0e01d3b0d89b3a1a00613c81c507df646720228782038a771af21

      SHA512

      d8e010e64672aec30f029739d6cbf905da8ff01773058a0728388665078ddce6fe6f58476ae0c985a9d6867640a1d6dfc3c2ea2352a15a39dc21b1b22dd9fd49

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziva8651.exe

      Filesize

      395KB

      MD5

      b317df4bf0383f02930255650fad5a0e

      SHA1

      16433c5786b95b0bedb2581104a6be5a0860d2bd

      SHA256

      eec49a98cbf0e01d3b0d89b3a1a00613c81c507df646720228782038a771af21

      SHA512

      d8e010e64672aec30f029739d6cbf905da8ff01773058a0728388665078ddce6fe6f58476ae0c985a9d6867640a1d6dfc3c2ea2352a15a39dc21b1b22dd9fd49

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr937140.exe

      Filesize

      14KB

      MD5

      cdc21ff27371bbeea7aea0bead8ef3f1

      SHA1

      e0203ccfd24979dddff009a73a903b7a1fd53cec

      SHA256

      c4d90f1b640a3009c44109bd324213fa6a6b8e4699814145c980eaea743e5295

      SHA512

      2d2a5fc40d1b96060f7b54ef63ad5814cdd009525949211592a7984f20a0923353450e0507c6000d891836ca91c0fb91a144490991e82131fe55aff116a2910f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr937140.exe

      Filesize

      14KB

      MD5

      cdc21ff27371bbeea7aea0bead8ef3f1

      SHA1

      e0203ccfd24979dddff009a73a903b7a1fd53cec

      SHA256

      c4d90f1b640a3009c44109bd324213fa6a6b8e4699814145c980eaea743e5295

      SHA512

      2d2a5fc40d1b96060f7b54ef63ad5814cdd009525949211592a7984f20a0923353450e0507c6000d891836ca91c0fb91a144490991e82131fe55aff116a2910f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku121268.exe

      Filesize

      352KB

      MD5

      447055db7c874a76b9d37898560d95dc

      SHA1

      98b362ac1366f00fea00491689e8cd0b3d3baa25

      SHA256

      f232e54e79e0eda7723ed0793fd6a53a99fc1f1003450a946b427b93161a3195

      SHA512

      40504d14feb399a1896e268c4438fc10ff74ffc034bcb4c78bce4ad40f129bada90a2a175b25c4e1c0e285df8a2818929ac798768b3dd5c126b17850981f8f3d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku121268.exe

      Filesize

      352KB

      MD5

      447055db7c874a76b9d37898560d95dc

      SHA1

      98b362ac1366f00fea00491689e8cd0b3d3baa25

      SHA256

      f232e54e79e0eda7723ed0793fd6a53a99fc1f1003450a946b427b93161a3195

      SHA512

      40504d14feb399a1896e268c4438fc10ff74ffc034bcb4c78bce4ad40f129bada90a2a175b25c4e1c0e285df8a2818929ac798768b3dd5c126b17850981f8f3d

    • memory/4228-147-0x0000000000860000-0x000000000086A000-memory.dmp

      Filesize

      40KB

    • memory/4748-1085-0x0000000000280000-0x00000000002B2000-memory.dmp

      Filesize

      200KB

    • memory/4748-1086-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

      Filesize

      64KB

    • memory/5112-191-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-203-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-156-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-158-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-160-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-162-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-163-0x00000000025B0000-0x00000000025C0000-memory.dmp

      Filesize

      64KB

    • memory/5112-164-0x00000000025B0000-0x00000000025C0000-memory.dmp

      Filesize

      64KB

    • memory/5112-166-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-168-0x00000000025B0000-0x00000000025C0000-memory.dmp

      Filesize

      64KB

    • memory/5112-171-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-169-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-173-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-175-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-177-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-179-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-181-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-183-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-185-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-187-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-189-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-154-0x0000000004D70000-0x0000000005314000-memory.dmp

      Filesize

      5.6MB

    • memory/5112-193-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-195-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-197-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-199-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-201-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-155-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-205-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-207-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-209-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-211-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-213-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-215-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-217-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-219-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-221-0x0000000005370000-0x00000000053AF000-memory.dmp

      Filesize

      252KB

    • memory/5112-1064-0x0000000005410000-0x0000000005A28000-memory.dmp

      Filesize

      6.1MB

    • memory/5112-1065-0x0000000005AB0000-0x0000000005BBA000-memory.dmp

      Filesize

      1.0MB

    • memory/5112-1066-0x0000000005BF0000-0x0000000005C02000-memory.dmp

      Filesize

      72KB

    • memory/5112-1067-0x0000000005C10000-0x0000000005C4C000-memory.dmp

      Filesize

      240KB

    • memory/5112-1068-0x00000000025B0000-0x00000000025C0000-memory.dmp

      Filesize

      64KB

    • memory/5112-1070-0x0000000005F00000-0x0000000005F92000-memory.dmp

      Filesize

      584KB

    • memory/5112-1071-0x0000000005FA0000-0x0000000006006000-memory.dmp

      Filesize

      408KB

    • memory/5112-1072-0x00000000025B0000-0x00000000025C0000-memory.dmp

      Filesize

      64KB

    • memory/5112-1073-0x00000000025B0000-0x00000000025C0000-memory.dmp

      Filesize

      64KB

    • memory/5112-1074-0x00000000025B0000-0x00000000025C0000-memory.dmp

      Filesize

      64KB

    • memory/5112-1075-0x00000000067D0000-0x0000000006992000-memory.dmp

      Filesize

      1.8MB

    • memory/5112-1076-0x00000000069A0000-0x0000000006ECC000-memory.dmp

      Filesize

      5.2MB

    • memory/5112-153-0x0000000000C00000-0x0000000000C4B000-memory.dmp

      Filesize

      300KB

    • memory/5112-1077-0x00000000025B0000-0x00000000025C0000-memory.dmp

      Filesize

      64KB

    • memory/5112-1078-0x0000000007140000-0x00000000071B6000-memory.dmp

      Filesize

      472KB

    • memory/5112-1079-0x00000000071D0000-0x0000000007220000-memory.dmp

      Filesize

      320KB