Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 17:21

General

  • Target

    9746f0f7391dff4599e5e2c783bf44e9d9021a5f961296005261e6de69bf6f04.exe

  • Size

    521KB

  • MD5

    175b0fa6cdffd9401b790672025619d0

  • SHA1

    fb9e5eb6af611aba4aafd6a4095fd4b214a5dc5b

  • SHA256

    9746f0f7391dff4599e5e2c783bf44e9d9021a5f961296005261e6de69bf6f04

  • SHA512

    db654098d5e9d2a866046dc093c533ed9fa49dace7ad4f4754cc7839f9d39796a212ccb5918f0c8e1553b0827411edfa9bbe30a48a1ccb0af4f2ccab85ec6008

  • SSDEEP

    12288:vMrRy90r6MAJtRTKaE77jH05ZIQCs6rLi29IFMLAbuEub/7:my2M4aE3z0rIjs6629pAbuEubz

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9746f0f7391dff4599e5e2c783bf44e9d9021a5f961296005261e6de69bf6f04.exe
    "C:\Users\Admin\AppData\Local\Temp\9746f0f7391dff4599e5e2c783bf44e9d9021a5f961296005261e6de69bf6f04.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinV2539.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinV2539.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr237470.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr237470.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku830286.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku830286.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2904
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 1528
          4⤵
          • Program crash
          PID:5036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797773.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797773.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3456
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2904 -ip 2904
    1⤵
      PID:1828

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797773.exe

      Filesize

      175KB

      MD5

      bb6d43fa4ebafe62b98ec4dea4ff49d9

      SHA1

      d8188e664ac977f59d3ec26589e3cf67b1fab23b

      SHA256

      1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

      SHA512

      679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797773.exe

      Filesize

      175KB

      MD5

      bb6d43fa4ebafe62b98ec4dea4ff49d9

      SHA1

      d8188e664ac977f59d3ec26589e3cf67b1fab23b

      SHA256

      1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

      SHA512

      679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinV2539.exe

      Filesize

      379KB

      MD5

      a9e2d4d0d8327aa690fffcb072c035d4

      SHA1

      47e7342f1801c6a119cf386b09bad9f9b616842d

      SHA256

      d1f8de60741ec9aa9305846a47faed8017e488b52892dbd6ef6653a4cae0ace0

      SHA512

      531c3fe601dfe9fc46170df6e7bf210fcf24a1a171d7ea7b33db0f737a5f5c930a8fe9e8cd62f98c9271c6eb9f20970db5f664e31bafd04f8e4ae16d22f87944

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinV2539.exe

      Filesize

      379KB

      MD5

      a9e2d4d0d8327aa690fffcb072c035d4

      SHA1

      47e7342f1801c6a119cf386b09bad9f9b616842d

      SHA256

      d1f8de60741ec9aa9305846a47faed8017e488b52892dbd6ef6653a4cae0ace0

      SHA512

      531c3fe601dfe9fc46170df6e7bf210fcf24a1a171d7ea7b33db0f737a5f5c930a8fe9e8cd62f98c9271c6eb9f20970db5f664e31bafd04f8e4ae16d22f87944

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr237470.exe

      Filesize

      15KB

      MD5

      160d0c2c30e95d07fbba9d169afd28ee

      SHA1

      0a9246455a4a180d3044eef47233b0c9ab19a54f

      SHA256

      dd24dd359b03c8c50cf405496b8851aa757a9c21c6d361fcc48c9eb7637e0312

      SHA512

      106413001d3735b983a8bdca864f53987f9915aed33075c7c271968b1d5b1ae8f4e98df9e7ba06e768c614c02f1dc3afdd30446ac78bc0e58221d7c263e5e1d7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr237470.exe

      Filesize

      15KB

      MD5

      160d0c2c30e95d07fbba9d169afd28ee

      SHA1

      0a9246455a4a180d3044eef47233b0c9ab19a54f

      SHA256

      dd24dd359b03c8c50cf405496b8851aa757a9c21c6d361fcc48c9eb7637e0312

      SHA512

      106413001d3735b983a8bdca864f53987f9915aed33075c7c271968b1d5b1ae8f4e98df9e7ba06e768c614c02f1dc3afdd30446ac78bc0e58221d7c263e5e1d7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku830286.exe

      Filesize

      295KB

      MD5

      762e692b932f7853ad6e2587123e29d1

      SHA1

      e2124ca8e94c7bfe037c9c5bae01a50730e6c0f1

      SHA256

      a0a1ec615d015eb07e2a0119c557050153fd0dfc0b46ddb0ba31c8c5bba13f28

      SHA512

      a5818fbe14244a54075470e8fdf093d7a21f15cbea1af96cfd7d6be355e2350e7a7e2024a8898b66a746517e611fc7fd7c8a567d733401de799c72009ad1f157

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku830286.exe

      Filesize

      295KB

      MD5

      762e692b932f7853ad6e2587123e29d1

      SHA1

      e2124ca8e94c7bfe037c9c5bae01a50730e6c0f1

      SHA256

      a0a1ec615d015eb07e2a0119c557050153fd0dfc0b46ddb0ba31c8c5bba13f28

      SHA512

      a5818fbe14244a54075470e8fdf093d7a21f15cbea1af96cfd7d6be355e2350e7a7e2024a8898b66a746517e611fc7fd7c8a567d733401de799c72009ad1f157

    • memory/1368-147-0x00000000006B0000-0x00000000006BA000-memory.dmp

      Filesize

      40KB

    • memory/2904-153-0x0000000002180000-0x00000000021CB000-memory.dmp

      Filesize

      300KB

    • memory/2904-154-0x0000000004CA0000-0x0000000005244000-memory.dmp

      Filesize

      5.6MB

    • memory/2904-155-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-158-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-156-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-160-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-162-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-164-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-166-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-168-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-170-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-172-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-174-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-176-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-178-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-180-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-182-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-185-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-184-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2904-186-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2904-188-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-190-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-192-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-194-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-196-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-198-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-200-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-202-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-204-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-206-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-208-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-210-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-212-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-214-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-216-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-218-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-220-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/2904-1063-0x0000000005250000-0x0000000005868000-memory.dmp

      Filesize

      6.1MB

    • memory/2904-1064-0x0000000004B80000-0x0000000004C8A000-memory.dmp

      Filesize

      1.0MB

    • memory/2904-1065-0x00000000058A0000-0x00000000058B2000-memory.dmp

      Filesize

      72KB

    • memory/2904-1066-0x00000000058C0000-0x00000000058FC000-memory.dmp

      Filesize

      240KB

    • memory/2904-1067-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2904-1069-0x0000000005BB0000-0x0000000005C16000-memory.dmp

      Filesize

      408KB

    • memory/2904-1070-0x0000000006270000-0x0000000006302000-memory.dmp

      Filesize

      584KB

    • memory/2904-1071-0x0000000006370000-0x0000000006532000-memory.dmp

      Filesize

      1.8MB

    • memory/2904-1072-0x0000000006540000-0x0000000006A6C000-memory.dmp

      Filesize

      5.2MB

    • memory/2904-1073-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2904-1074-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2904-1075-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2904-1076-0x0000000006CC0000-0x0000000006D36000-memory.dmp

      Filesize

      472KB

    • memory/2904-1077-0x0000000006D40000-0x0000000006D90000-memory.dmp

      Filesize

      320KB

    • memory/2904-1078-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/3456-1085-0x0000000000A40000-0x0000000000A72000-memory.dmp

      Filesize

      200KB

    • memory/3456-1086-0x0000000005660000-0x0000000005670000-memory.dmp

      Filesize

      64KB

    • memory/3456-1087-0x0000000005660000-0x0000000005670000-memory.dmp

      Filesize

      64KB