Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/04/2023, 14:09

General

  • Target

    03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe

  • Size

    1.0MB

  • MD5

    fb5b9a86aae814f1733fe3c5ccf06776

  • SHA1

    0a3f267eff792f4aa08c078f0661f75b18d69d1d

  • SHA256

    03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e

  • SHA512

    029ea1e3337dd4efcd191be5f12b66bf023f364ab45c0a9bae610ce3c859e1329f06d6fd80663bc079ec27c1df7dc150dd2dcd6e171edc74e523b6291752783f

  • SSDEEP

    24576:YymQ5DwjxMQXMoOBOPGQbAPvp8PD15zGZXKGxuX9s2uis1:fmgEqQvOOPDbCvp8Zmduts3N

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe
    "C:\Users\Admin\AppData\Local\Temp\03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVj8809.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVj8809.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHg1407.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHg1407.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it097787.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it097787.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1620
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr745649.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr745649.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1772
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4476
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp053481.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp053481.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr498425.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr498425.exe
      2⤵
      • Executes dropped EXE
      PID:1368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 628
        3⤵
        • Program crash
        PID:4100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 704
        3⤵
        • Program crash
        PID:4040
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 776
        3⤵
        • Program crash
        PID:4824
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 856
        3⤵
        • Program crash
        PID:1104
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 880
        3⤵
        • Program crash
        PID:2124
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 816
        3⤵
        • Program crash
        PID:2860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 1036
        3⤵
        • Program crash
        PID:4836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr498425.exe

    Filesize

    394KB

    MD5

    430a80f73c8b5fe97d7599d09fe13970

    SHA1

    5eeab7a13bba2b953dd88b384b81b771a9e0db8f

    SHA256

    b02397ff98e7829a668e6441fdc8eb6a407a8e9c650e6e09952a1fbf58fa6740

    SHA512

    e75c7c248bf4a778f3694821cbaae358307082813279f2783e0f738380a94dff10fd72fb9b1fce0bd641cd2701193ba4f370e485c7963951ee690b60b0cc4220

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr498425.exe

    Filesize

    394KB

    MD5

    430a80f73c8b5fe97d7599d09fe13970

    SHA1

    5eeab7a13bba2b953dd88b384b81b771a9e0db8f

    SHA256

    b02397ff98e7829a668e6441fdc8eb6a407a8e9c650e6e09952a1fbf58fa6740

    SHA512

    e75c7c248bf4a778f3694821cbaae358307082813279f2783e0f738380a94dff10fd72fb9b1fce0bd641cd2701193ba4f370e485c7963951ee690b60b0cc4220

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVj8809.exe

    Filesize

    713KB

    MD5

    55c9722a25acff1d7fb0b0cadab9c488

    SHA1

    b2886173e1e46b9dd407afd8164b4068104afc18

    SHA256

    82a54bd36ca3ca73c2acf1ba6462f669c723731c87a93abe9f79925ce6e9b298

    SHA512

    ec2cfd7b5a60d5728cc1d5eee9f3e589f649a9412b3328a174aedc6a53b6b6a76ba545fa08e135e70c567239f91c0767c46537485ee9251cf24f2e8fd630b3fa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVj8809.exe

    Filesize

    713KB

    MD5

    55c9722a25acff1d7fb0b0cadab9c488

    SHA1

    b2886173e1e46b9dd407afd8164b4068104afc18

    SHA256

    82a54bd36ca3ca73c2acf1ba6462f669c723731c87a93abe9f79925ce6e9b298

    SHA512

    ec2cfd7b5a60d5728cc1d5eee9f3e589f649a9412b3328a174aedc6a53b6b6a76ba545fa08e135e70c567239f91c0767c46537485ee9251cf24f2e8fd630b3fa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp053481.exe

    Filesize

    168KB

    MD5

    c52ebada00a59ec1f651a0e9fbcef2eb

    SHA1

    e1941278df76616f1ca3202ef2a9f99d2592d52f

    SHA256

    35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

    SHA512

    6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp053481.exe

    Filesize

    168KB

    MD5

    c52ebada00a59ec1f651a0e9fbcef2eb

    SHA1

    e1941278df76616f1ca3202ef2a9f99d2592d52f

    SHA256

    35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

    SHA512

    6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHg1407.exe

    Filesize

    559KB

    MD5

    940e74f26325bf1a4f1c2fed7479e687

    SHA1

    43bbf9b9731ceda495bca3de4fe0652aff339030

    SHA256

    2a66ffa9698272bd17389be93af9cffbdfd048a16a5ea7c0e882db8a53d646e2

    SHA512

    8dbf8676738c32c1c730e3dd2581dca94cac1073af193fa9a6c0d3de11707ff823e232a95fa151375c4bebb8f91705d7894ecb470fee67ee81066e1c1a564941

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHg1407.exe

    Filesize

    559KB

    MD5

    940e74f26325bf1a4f1c2fed7479e687

    SHA1

    43bbf9b9731ceda495bca3de4fe0652aff339030

    SHA256

    2a66ffa9698272bd17389be93af9cffbdfd048a16a5ea7c0e882db8a53d646e2

    SHA512

    8dbf8676738c32c1c730e3dd2581dca94cac1073af193fa9a6c0d3de11707ff823e232a95fa151375c4bebb8f91705d7894ecb470fee67ee81066e1c1a564941

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it097787.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it097787.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr745649.exe

    Filesize

    586KB

    MD5

    333892d1726b6cbdb440ee63e1a8fbd4

    SHA1

    56c62eb4f9e56519f0d1dbbb6775e18beec8f255

    SHA256

    a88d89aedcafa959d036e5ca24761c428c483a3793c383955190379b4f2d25fa

    SHA512

    34c5f6fd4e27716a32b2c909c3c57d2bb5c4b3acca53b23bb45ce25c77640512230b9ef61950db4ec8aba905bd48bd2a0e5f92f415693ff7b9b29690b31419b9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr745649.exe

    Filesize

    586KB

    MD5

    333892d1726b6cbdb440ee63e1a8fbd4

    SHA1

    56c62eb4f9e56519f0d1dbbb6775e18beec8f255

    SHA256

    a88d89aedcafa959d036e5ca24761c428c483a3793c383955190379b4f2d25fa

    SHA512

    34c5f6fd4e27716a32b2c909c3c57d2bb5c4b3acca53b23bb45ce25c77640512230b9ef61950db4ec8aba905bd48bd2a0e5f92f415693ff7b9b29690b31419b9

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/1368-2335-0x0000000000AD0000-0x0000000000B0B000-memory.dmp

    Filesize

    236KB

  • memory/1368-2333-0x0000000000AD0000-0x0000000000B0B000-memory.dmp

    Filesize

    236KB

  • memory/1620-142-0x0000000000B60000-0x0000000000B6A000-memory.dmp

    Filesize

    40KB

  • memory/1772-192-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-208-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-154-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-156-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-158-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-160-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-162-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-164-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-166-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-168-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-170-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-172-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-174-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-176-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-178-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-180-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-182-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-184-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-186-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-188-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-190-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-152-0x0000000004DE0000-0x0000000004E46000-memory.dmp

    Filesize

    408KB

  • memory/1772-194-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-196-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-198-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-200-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-202-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-204-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-206-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-153-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-210-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-212-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-214-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-216-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/1772-2295-0x0000000005650000-0x0000000005682000-memory.dmp

    Filesize

    200KB

  • memory/1772-2298-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1772-148-0x0000000002360000-0x00000000023BB000-memory.dmp

    Filesize

    364KB

  • memory/1772-149-0x0000000002680000-0x00000000026E8000-memory.dmp

    Filesize

    416KB

  • memory/1772-150-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1772-151-0x0000000004FE0000-0x00000000054DE000-memory.dmp

    Filesize

    5.0MB

  • memory/4288-2321-0x000000000B120000-0x000000000B186000-memory.dmp

    Filesize

    408KB

  • memory/4288-2310-0x0000000000EB0000-0x0000000000EE0000-memory.dmp

    Filesize

    192KB

  • memory/4288-2311-0x0000000001600000-0x0000000001606000-memory.dmp

    Filesize

    24KB

  • memory/4288-2326-0x000000000C360000-0x000000000C3B0000-memory.dmp

    Filesize

    320KB

  • memory/4288-2325-0x0000000005740000-0x0000000005750000-memory.dmp

    Filesize

    64KB

  • memory/4288-2323-0x000000000CAC0000-0x000000000CFEC000-memory.dmp

    Filesize

    5.2MB

  • memory/4288-2318-0x0000000005740000-0x0000000005750000-memory.dmp

    Filesize

    64KB

  • memory/4476-2320-0x0000000004F70000-0x0000000005002000-memory.dmp

    Filesize

    584KB

  • memory/4476-2312-0x00000000050F0000-0x00000000056F6000-memory.dmp

    Filesize

    6.0MB

  • memory/4476-2319-0x0000000004E50000-0x0000000004EC6000-memory.dmp

    Filesize

    472KB

  • memory/4476-2322-0x0000000005EE0000-0x00000000060A2000-memory.dmp

    Filesize

    1.8MB

  • memory/4476-2317-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/4476-2324-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/4476-2316-0x0000000004B80000-0x0000000004BCB000-memory.dmp

    Filesize

    300KB

  • memory/4476-2315-0x0000000004B40000-0x0000000004B7E000-memory.dmp

    Filesize

    248KB

  • memory/4476-2309-0x00000000021B0000-0x00000000021B6000-memory.dmp

    Filesize

    24KB

  • memory/4476-2314-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

    Filesize

    72KB

  • memory/4476-2313-0x0000000004BF0000-0x0000000004CFA000-memory.dmp

    Filesize

    1.0MB

  • memory/4476-2305-0x00000000001C0000-0x00000000001EE000-memory.dmp

    Filesize

    184KB