Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    52s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 13:36

General

  • Target

    e54ba9ba328541fbe58e822eef7d1b2603c43950cbd55c964e34feca96287b7b.exe

  • Size

    658KB

  • MD5

    2dde62b35cc102ef6e483bfadde17d3c

  • SHA1

    f3cf7931d2fa424e34ab5b3be988fe3ab1ed6f66

  • SHA256

    e54ba9ba328541fbe58e822eef7d1b2603c43950cbd55c964e34feca96287b7b

  • SHA512

    b4419e5469e7ca971747c05da062fa32a6177a08feb8c1c57859145e5ff9c469c6f4c67f483e974c9893490cb707493584cf431302d9ca84185e4cc67862aa9c

  • SSDEEP

    12288:bMr6y90oI05cZh+Bafv1b209ohUnGLcfSUUjpy0AvRiggs3Cr2iLjJa:ly8gFaf9CtuecqUUAZi3s3y2WI

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e54ba9ba328541fbe58e822eef7d1b2603c43950cbd55c964e34feca96287b7b.exe
    "C:\Users\Admin\AppData\Local\Temp\e54ba9ba328541fbe58e822eef7d1b2603c43950cbd55c964e34feca96287b7b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4360
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221023.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221023.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3252.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3252.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2972
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 1084
          4⤵
          • Program crash
          PID:4204
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1156.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1156.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 1104
          4⤵
          • Program crash
          PID:3916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si728840.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si728840.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4248
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2972 -ip 2972
    1⤵
      PID:1524
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4516 -ip 4516
      1⤵
        PID:4488

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si728840.exe

        Filesize

        175KB

        MD5

        bb6d43fa4ebafe62b98ec4dea4ff49d9

        SHA1

        d8188e664ac977f59d3ec26589e3cf67b1fab23b

        SHA256

        1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

        SHA512

        679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si728840.exe

        Filesize

        175KB

        MD5

        bb6d43fa4ebafe62b98ec4dea4ff49d9

        SHA1

        d8188e664ac977f59d3ec26589e3cf67b1fab23b

        SHA256

        1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

        SHA512

        679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221023.exe

        Filesize

        516KB

        MD5

        3294a30a49ec6332c27152a9726d5255

        SHA1

        bea735d464cbcc66f36b7cdc7a1c4db25c1c012f

        SHA256

        b5ee7e365ff9e1ce65a11ab4cbb58dec9a15ff1c76c7c4d7b43c197e3bc49792

        SHA512

        261ba93720e6246b132c8cf73b19e704afb30d3074ba9ffd0d4084f8a32a3bb2c193155945d04cb8268ff60d79e569b6951da85497085d2515221bf6263fe3bc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221023.exe

        Filesize

        516KB

        MD5

        3294a30a49ec6332c27152a9726d5255

        SHA1

        bea735d464cbcc66f36b7cdc7a1c4db25c1c012f

        SHA256

        b5ee7e365ff9e1ce65a11ab4cbb58dec9a15ff1c76c7c4d7b43c197e3bc49792

        SHA512

        261ba93720e6246b132c8cf73b19e704afb30d3074ba9ffd0d4084f8a32a3bb2c193155945d04cb8268ff60d79e569b6951da85497085d2515221bf6263fe3bc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3252.exe

        Filesize

        236KB

        MD5

        dc96435b07d48d27f6c9b2091c689e6a

        SHA1

        b6d194763ea9395f4aae965a8bbeed40bcb01837

        SHA256

        37d2a9bda3682dc0180e96414007e3f8a816be300f8e3ebbc842196bf31b6caa

        SHA512

        1570965e2cda210c977cc1e04cf6907ed5fcbcb9366927dda4a3036922607d7b649ddd5832833c016344dbd49cfbf7e4602262f311f9359aedf10dcb1d89d702

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3252.exe

        Filesize

        236KB

        MD5

        dc96435b07d48d27f6c9b2091c689e6a

        SHA1

        b6d194763ea9395f4aae965a8bbeed40bcb01837

        SHA256

        37d2a9bda3682dc0180e96414007e3f8a816be300f8e3ebbc842196bf31b6caa

        SHA512

        1570965e2cda210c977cc1e04cf6907ed5fcbcb9366927dda4a3036922607d7b649ddd5832833c016344dbd49cfbf7e4602262f311f9359aedf10dcb1d89d702

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1156.exe

        Filesize

        294KB

        MD5

        ef85a2c0f467aef205436aca5d972e53

        SHA1

        dba35f522e6bfd32e5f71ed3a7ee3f2525a081f7

        SHA256

        1d8f4353cfd850ff7cec6e0329969ea5389b28d1a5d944d828605069e191f776

        SHA512

        c8dda8936307ecc7b9d9c355b5663a23e9c5ed5f06acbf0efeeee94338f60ec5b411062d03f08611824a92b87d9972f1cb99eaaa08f5b4ac1f5c6ef745a51185

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1156.exe

        Filesize

        294KB

        MD5

        ef85a2c0f467aef205436aca5d972e53

        SHA1

        dba35f522e6bfd32e5f71ed3a7ee3f2525a081f7

        SHA256

        1d8f4353cfd850ff7cec6e0329969ea5389b28d1a5d944d828605069e191f776

        SHA512

        c8dda8936307ecc7b9d9c355b5663a23e9c5ed5f06acbf0efeeee94338f60ec5b411062d03f08611824a92b87d9972f1cb99eaaa08f5b4ac1f5c6ef745a51185

      • memory/2972-158-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-168-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-151-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/2972-150-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/2972-152-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/2972-153-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-154-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-156-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-148-0x0000000004CC0000-0x0000000005264000-memory.dmp

        Filesize

        5.6MB

      • memory/2972-160-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-162-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-164-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-166-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-149-0x0000000000810000-0x000000000083D000-memory.dmp

        Filesize

        180KB

      • memory/2972-170-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-172-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-174-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-176-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-178-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-180-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/2972-181-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/2972-182-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/2972-183-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/2972-184-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/2972-186-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4248-1122-0x0000000005400000-0x0000000005410000-memory.dmp

        Filesize

        64KB

      • memory/4248-1121-0x0000000000870000-0x00000000008A2000-memory.dmp

        Filesize

        200KB

      • memory/4516-193-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-334-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/4516-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-215-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-217-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-219-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-221-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-223-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-225-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-332-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/4516-1100-0x0000000005220000-0x0000000005838000-memory.dmp

        Filesize

        6.1MB

      • memory/4516-1101-0x0000000005840000-0x000000000594A000-memory.dmp

        Filesize

        1.0MB

      • memory/4516-1102-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

        Filesize

        72KB

      • memory/4516-1103-0x0000000004BD0000-0x0000000004C0C000-memory.dmp

        Filesize

        240KB

      • memory/4516-1104-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/4516-1106-0x0000000005BB0000-0x0000000005C16000-memory.dmp

        Filesize

        408KB

      • memory/4516-1107-0x0000000006270000-0x0000000006302000-memory.dmp

        Filesize

        584KB

      • memory/4516-1108-0x0000000006340000-0x00000000063B6000-memory.dmp

        Filesize

        472KB

      • memory/4516-1109-0x00000000063E0000-0x0000000006430000-memory.dmp

        Filesize

        320KB

      • memory/4516-1110-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/4516-1111-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/4516-1112-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/4516-1113-0x0000000006450000-0x0000000006612000-memory.dmp

        Filesize

        1.8MB

      • memory/4516-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp

        Filesize

        252KB

      • memory/4516-191-0x0000000000620000-0x000000000066B000-memory.dmp

        Filesize

        300KB

      • memory/4516-1114-0x0000000006620000-0x0000000006B4C000-memory.dmp

        Filesize

        5.2MB

      • memory/4516-1115-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB