Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    84s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 03:07

General

  • Target

    15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe

  • Size

    666KB

  • MD5

    6d2376fb22162ee60442986367b5a27e

  • SHA1

    108e1b97aeb2cea363fab766cc99e8a286ae66b8

  • SHA256

    15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7

  • SHA512

    a1c2f654e1371e8dc2c6d63578494616456aa9046bd85bb3e5dd35e8b5e5ce05a62c1c82eafd05ce40f1d7e48e2fd1e0ec09794942a2feb03921bd92c1a37596

  • SSDEEP

    12288:EMrQy907BAVm5OXS4Nkn67gro1N6gywGrUVMr/wvm/e8bu82jt:Eyst5h4NkygSwhwGrfzwv8z6xt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe
    "C:\Users\Admin\AppData\Local\Temp\15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045828.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045828.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6692.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6692.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2296
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 1080
          4⤵
          • Program crash
          PID:4436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5147.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5147.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1096
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 1328
          4⤵
          • Program crash
          PID:4020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si651576.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si651576.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4576
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2296 -ip 2296
    1⤵
      PID:2812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1096 -ip 1096
      1⤵
        PID:1268

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si651576.exe

        Filesize

        176KB

        MD5

        0f39a37a712d920291843fe6e73e1b91

        SHA1

        8128eb88fef521d251170eefa8bf8d6baf3bc20c

        SHA256

        e66feffd4e18b658ad7fbe97e78e1b2867123b797d04c1b39bc92f5b0659f898

        SHA512

        0f580d15550f97744f9e823f7d258f33471c4574dceabc41b6fd3f7437b1dcb78084242c7c0104ac1185bfed6b85d7df980323655b2e2db426e0af3f13b1b15d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si651576.exe

        Filesize

        176KB

        MD5

        0f39a37a712d920291843fe6e73e1b91

        SHA1

        8128eb88fef521d251170eefa8bf8d6baf3bc20c

        SHA256

        e66feffd4e18b658ad7fbe97e78e1b2867123b797d04c1b39bc92f5b0659f898

        SHA512

        0f580d15550f97744f9e823f7d258f33471c4574dceabc41b6fd3f7437b1dcb78084242c7c0104ac1185bfed6b85d7df980323655b2e2db426e0af3f13b1b15d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045828.exe

        Filesize

        524KB

        MD5

        45862cc7ec024921b94670d6ee27b453

        SHA1

        d2b4a839c8aa2ca6c6f52c5d5a08a59f7a221bcf

        SHA256

        68806092659f7cb2e1ea0184d330af83c34f049d588480b413dde06a190632d0

        SHA512

        95db386aff8033df251a16ca173537d414ac2464b656f0e8450010a54a41c77e77134362a8dc2da9c5bd1159deec6f2f66bfb27c8edd038cb8e611cf5862d831

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045828.exe

        Filesize

        524KB

        MD5

        45862cc7ec024921b94670d6ee27b453

        SHA1

        d2b4a839c8aa2ca6c6f52c5d5a08a59f7a221bcf

        SHA256

        68806092659f7cb2e1ea0184d330af83c34f049d588480b413dde06a190632d0

        SHA512

        95db386aff8033df251a16ca173537d414ac2464b656f0e8450010a54a41c77e77134362a8dc2da9c5bd1159deec6f2f66bfb27c8edd038cb8e611cf5862d831

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6692.exe

        Filesize

        294KB

        MD5

        0c40fc04556659e9432d09a02436d2b8

        SHA1

        b4d5a2be24e9d3387bbbe9dd3e743b404fbb0a1a

        SHA256

        680be2be8e0e71066901761ff0bfeb50b0aea043db39efea155d5593ec20a190

        SHA512

        415dfd16057062273b64813cd34132b88dea7d9bdfafb0c315fcdb5894f1adefa67d69ad6cd441a1907d018b39bc131daccc1d58bfa6eb927af7021b4ff5a870

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6692.exe

        Filesize

        294KB

        MD5

        0c40fc04556659e9432d09a02436d2b8

        SHA1

        b4d5a2be24e9d3387bbbe9dd3e743b404fbb0a1a

        SHA256

        680be2be8e0e71066901761ff0bfeb50b0aea043db39efea155d5593ec20a190

        SHA512

        415dfd16057062273b64813cd34132b88dea7d9bdfafb0c315fcdb5894f1adefa67d69ad6cd441a1907d018b39bc131daccc1d58bfa6eb927af7021b4ff5a870

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5147.exe

        Filesize

        352KB

        MD5

        806131470c64ec74d74f72b48c447a60

        SHA1

        24250cc6877430ea8a9ff365f448087c82ae40eb

        SHA256

        fc95935c20ec7ca1b4dc7c7bdfee50ae900895f832da10527cca4bc9bed6bc4f

        SHA512

        d10f372355d67cd4662d0f657f1ad039a6087383c3cf2c70cdc1252bb706f76132988c54e5f220d516ad7a3a053cd1db327c04e5be3f47bb1432ea423f514c49

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5147.exe

        Filesize

        352KB

        MD5

        806131470c64ec74d74f72b48c447a60

        SHA1

        24250cc6877430ea8a9ff365f448087c82ae40eb

        SHA256

        fc95935c20ec7ca1b4dc7c7bdfee50ae900895f832da10527cca4bc9bed6bc4f

        SHA512

        d10f372355d67cd4662d0f657f1ad039a6087383c3cf2c70cdc1252bb706f76132988c54e5f220d516ad7a3a053cd1db327c04e5be3f47bb1432ea423f514c49

      • memory/1096-1102-0x0000000005C00000-0x0000000005D0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1096-1103-0x0000000005D30000-0x0000000005D42000-memory.dmp

        Filesize

        72KB

      • memory/1096-1116-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/1096-1115-0x00000000071D0000-0x0000000007220000-memory.dmp

        Filesize

        320KB

      • memory/1096-1114-0x0000000007140000-0x00000000071B6000-memory.dmp

        Filesize

        472KB

      • memory/1096-1113-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/1096-1112-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/1096-1111-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/1096-1110-0x0000000006AE0000-0x000000000700C000-memory.dmp

        Filesize

        5.2MB

      • memory/1096-1109-0x0000000006900000-0x0000000006AC2000-memory.dmp

        Filesize

        1.8MB

      • memory/1096-1107-0x0000000006700000-0x0000000006792000-memory.dmp

        Filesize

        584KB

      • memory/1096-1106-0x0000000006040000-0x00000000060A6000-memory.dmp

        Filesize

        408KB

      • memory/1096-1105-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/1096-1104-0x0000000005D50000-0x0000000005D8C000-memory.dmp

        Filesize

        240KB

      • memory/1096-204-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-1101-0x00000000055E0000-0x0000000005BF8000-memory.dmp

        Filesize

        6.1MB

      • memory/1096-250-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/1096-247-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/1096-248-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/1096-245-0x00000000009A0000-0x00000000009EB000-memory.dmp

        Filesize

        300KB

      • memory/1096-208-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-222-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-220-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-191-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-192-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-194-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-196-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-198-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-200-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-202-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-218-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-210-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-224-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-206-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-212-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-214-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/1096-216-0x0000000002850000-0x000000000288F000-memory.dmp

        Filesize

        252KB

      • memory/2296-154-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-148-0x0000000004EC0000-0x0000000005464000-memory.dmp

        Filesize

        5.6MB

      • memory/2296-152-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/2296-172-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-184-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/2296-183-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/2296-182-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/2296-181-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/2296-176-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-150-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/2296-178-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-170-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-151-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/2296-180-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-153-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-168-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-166-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-164-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-162-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-160-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-158-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-156-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-174-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2296-149-0x0000000002440000-0x000000000246D000-memory.dmp

        Filesize

        180KB

      • memory/2296-186-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/4576-1122-0x00000000009C0000-0x00000000009F2000-memory.dmp

        Filesize

        200KB

      • memory/4576-1123-0x0000000005600000-0x0000000005610000-memory.dmp

        Filesize

        64KB