Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    109s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/04/2023, 17:37

General

  • Target

    b45eb1f1b63e16b6843089f1f9a1ed693d9f7093e192462e0f97d97e838e4e5d.exe

  • Size

    1.1MB

  • MD5

    d84f4c2ae65ea3d0e8fe271391837237

  • SHA1

    c262ad01a0261b92ac38ef85fac583c5ae6204de

  • SHA256

    b45eb1f1b63e16b6843089f1f9a1ed693d9f7093e192462e0f97d97e838e4e5d

  • SHA512

    a56da3c9ce0ef6bafdb65425d3f4d7538e75d448edddb378f9786e8dd9669061c4b99ebb2e301a59f18e0630d33f35241e1be1d8e24f193ad1a5959068ddf36f

  • SSDEEP

    24576:wyaILrPl3ejVH8g7eMEXbTQNY+QpdEBJtg4to9QBZqIHy1fDqvI:3awx3epHCMyb8NYPIsFafUlO

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b45eb1f1b63e16b6843089f1f9a1ed693d9f7093e192462e0f97d97e838e4e5d.exe
    "C:\Users\Admin\AppData\Local\Temp\b45eb1f1b63e16b6843089f1f9a1ed693d9f7093e192462e0f97d97e838e4e5d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un035205.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un035205.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un536869.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un536869.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr917557.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr917557.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3812
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619552.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619552.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1456
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:876
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk206535.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk206535.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si069208.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si069208.exe
      2⤵
      • Executes dropped EXE
      PID:2484
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 628
        3⤵
        • Program crash
        PID:4904
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 704
        3⤵
        • Program crash
        PID:4276
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 804
        3⤵
        • Program crash
        PID:2072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 852
        3⤵
        • Program crash
        PID:1408
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 888
        3⤵
        • Program crash
        PID:2628
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 868
        3⤵
        • Program crash
        PID:4712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 1056
        3⤵
        • Program crash
        PID:4988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si069208.exe

    Filesize

    395KB

    MD5

    1d6ceca43b63d4a05a546644f680f28e

    SHA1

    c7b606759ed3c69d4288a6524fb4a42e439785da

    SHA256

    fde652c054954e5003a3c37ab2aa83e8a3305018b0f3ef5c0b29784af088256c

    SHA512

    8a8ea47baf07e59c2e62af762ac8b660ef4651ad01cdf810e965f807b0d0ec8e4dbf1f02cbcc8d1000491834a86224bee793b260cedd57815f703ee0fd6a735b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si069208.exe

    Filesize

    395KB

    MD5

    1d6ceca43b63d4a05a546644f680f28e

    SHA1

    c7b606759ed3c69d4288a6524fb4a42e439785da

    SHA256

    fde652c054954e5003a3c37ab2aa83e8a3305018b0f3ef5c0b29784af088256c

    SHA512

    8a8ea47baf07e59c2e62af762ac8b660ef4651ad01cdf810e965f807b0d0ec8e4dbf1f02cbcc8d1000491834a86224bee793b260cedd57815f703ee0fd6a735b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un035205.exe

    Filesize

    851KB

    MD5

    4b61ed141012c7de00efabab2efed471

    SHA1

    88b577e8185610c42ce96c2c9de8f419bfeaf5e8

    SHA256

    6ec2204a255d22326bc478b98211b75c4ae333a09b64296188b50b30f5648866

    SHA512

    4a8ce76d64298ba196639edd88e070035c790e933b77bb9921fb3e53ea39af06f67726e4c4959ff992fb4b1c8ef7f19cc169a1491ca79c63c3116bf13aa45fb8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un035205.exe

    Filesize

    851KB

    MD5

    4b61ed141012c7de00efabab2efed471

    SHA1

    88b577e8185610c42ce96c2c9de8f419bfeaf5e8

    SHA256

    6ec2204a255d22326bc478b98211b75c4ae333a09b64296188b50b30f5648866

    SHA512

    4a8ce76d64298ba196639edd88e070035c790e933b77bb9921fb3e53ea39af06f67726e4c4959ff992fb4b1c8ef7f19cc169a1491ca79c63c3116bf13aa45fb8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk206535.exe

    Filesize

    168KB

    MD5

    c52ebada00a59ec1f651a0e9fbcef2eb

    SHA1

    e1941278df76616f1ca3202ef2a9f99d2592d52f

    SHA256

    35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

    SHA512

    6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk206535.exe

    Filesize

    168KB

    MD5

    c52ebada00a59ec1f651a0e9fbcef2eb

    SHA1

    e1941278df76616f1ca3202ef2a9f99d2592d52f

    SHA256

    35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

    SHA512

    6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un536869.exe

    Filesize

    698KB

    MD5

    73433b82773dc8e7660ed9443b8d5369

    SHA1

    fc640220cae0f3d940af18e0cd0ac21d2473182c

    SHA256

    335f9a281d1a6c9e647c48572e3200ac42e6657114dfd562d1fc893cb98481fe

    SHA512

    d2489214ec727cef76bcf8737c21292086c02be3c7fb7f2088534f91d9e9b843d885d6a8b1783fb067e2057e8423ccad0aacf36454ec41cd15a5435c3b6fb2d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un536869.exe

    Filesize

    698KB

    MD5

    73433b82773dc8e7660ed9443b8d5369

    SHA1

    fc640220cae0f3d940af18e0cd0ac21d2473182c

    SHA256

    335f9a281d1a6c9e647c48572e3200ac42e6657114dfd562d1fc893cb98481fe

    SHA512

    d2489214ec727cef76bcf8737c21292086c02be3c7fb7f2088534f91d9e9b843d885d6a8b1783fb067e2057e8423ccad0aacf36454ec41cd15a5435c3b6fb2d7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr917557.exe

    Filesize

    403KB

    MD5

    b371bd94d547e7e03c88ac280d361b13

    SHA1

    1ad7fc5015664b4b2a871cd5002f9dbe99fdeb25

    SHA256

    14c3dd516461abd25abc4df51febf9437ce6c421c810a21429a854b57dde112f

    SHA512

    681366be1ca130c9f42153e994ae3f548855bb88453fcd4c2d632e4ddba7d1167f7b7ac75c9aaec232f70d77c9888b43c698ec5c0e868b5622f0f6dd9c3a1a79

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr917557.exe

    Filesize

    403KB

    MD5

    b371bd94d547e7e03c88ac280d361b13

    SHA1

    1ad7fc5015664b4b2a871cd5002f9dbe99fdeb25

    SHA256

    14c3dd516461abd25abc4df51febf9437ce6c421c810a21429a854b57dde112f

    SHA512

    681366be1ca130c9f42153e994ae3f548855bb88453fcd4c2d632e4ddba7d1167f7b7ac75c9aaec232f70d77c9888b43c698ec5c0e868b5622f0f6dd9c3a1a79

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619552.exe

    Filesize

    588KB

    MD5

    eb6b7bbb876d39b3619edf5a559d4960

    SHA1

    244e815366e496d41cc4514fb1c11ac083df9cdb

    SHA256

    7774b7c99bee5f9df173d36d3ac29de97f72b089ff954768d9446c6d5fe53370

    SHA512

    3f0a17ea2c317785f87ee91059b131c6a7475f4d8f8570991c56b511b5375c52820f4fe669ab385faa4e3e3b94915967c834349262aba0712a6c68a46366a11d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619552.exe

    Filesize

    588KB

    MD5

    eb6b7bbb876d39b3619edf5a559d4960

    SHA1

    244e815366e496d41cc4514fb1c11ac083df9cdb

    SHA256

    7774b7c99bee5f9df173d36d3ac29de97f72b089ff954768d9446c6d5fe53370

    SHA512

    3f0a17ea2c317785f87ee91059b131c6a7475f4d8f8570991c56b511b5375c52820f4fe669ab385faa4e3e3b94915967c834349262aba0712a6c68a46366a11d

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/876-2349-0x0000000004C00000-0x0000000004D0A000-memory.dmp

    Filesize

    1.0MB

  • memory/876-2351-0x0000000004950000-0x000000000498E000-memory.dmp

    Filesize

    248KB

  • memory/876-2352-0x0000000004990000-0x00000000049DB000-memory.dmp

    Filesize

    300KB

  • memory/876-2348-0x0000000005100000-0x0000000005706000-memory.dmp

    Filesize

    6.0MB

  • memory/876-2354-0x00000000049E0000-0x00000000049F0000-memory.dmp

    Filesize

    64KB

  • memory/876-2345-0x00000000008D0000-0x00000000008D6000-memory.dmp

    Filesize

    24KB

  • memory/876-2355-0x0000000004D90000-0x0000000004E06000-memory.dmp

    Filesize

    472KB

  • memory/876-2341-0x00000000000B0000-0x00000000000DE000-memory.dmp

    Filesize

    184KB

  • memory/876-2356-0x0000000004EB0000-0x0000000004F42000-memory.dmp

    Filesize

    584KB

  • memory/876-2357-0x0000000004E10000-0x0000000004E76000-memory.dmp

    Filesize

    408KB

  • memory/876-2359-0x00000000049E0000-0x00000000049F0000-memory.dmp

    Filesize

    64KB

  • memory/876-2360-0x0000000005EF0000-0x00000000060B2000-memory.dmp

    Filesize

    1.8MB

  • memory/1456-196-0x0000000000900000-0x000000000095B000-memory.dmp

    Filesize

    364KB

  • memory/1456-2332-0x0000000002970000-0x00000000029A2000-memory.dmp

    Filesize

    200KB

  • memory/1456-2334-0x0000000002760000-0x0000000002770000-memory.dmp

    Filesize

    64KB

  • memory/1456-223-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-221-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-219-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-217-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-215-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-187-0x00000000028D0000-0x0000000002938000-memory.dmp

    Filesize

    416KB

  • memory/1456-188-0x00000000054A0000-0x0000000005506000-memory.dmp

    Filesize

    408KB

  • memory/1456-189-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-190-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-192-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-194-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-213-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-197-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-201-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-203-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-199-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-205-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-207-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-209-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/1456-211-0x00000000054A0000-0x0000000005500000-memory.dmp

    Filesize

    384KB

  • memory/2484-2369-0x00000000024A0000-0x00000000024DB000-memory.dmp

    Filesize

    236KB

  • memory/3812-156-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-160-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-182-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3812-180-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/3812-179-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/3812-177-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/3812-178-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3812-172-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-164-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-166-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-168-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-170-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-162-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-146-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/3812-143-0x0000000002550000-0x000000000256A000-memory.dmp

    Filesize

    104KB

  • memory/3812-174-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-176-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-154-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-158-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-152-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-145-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/3812-150-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-149-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/3812-148-0x0000000002720000-0x0000000002738000-memory.dmp

    Filesize

    96KB

  • memory/3812-147-0x0000000004E40000-0x000000000533E000-memory.dmp

    Filesize

    5.0MB

  • memory/3812-144-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4104-2350-0x000000000A7D0000-0x000000000A7E2000-memory.dmp

    Filesize

    72KB

  • memory/4104-2358-0x0000000005410000-0x0000000005420000-memory.dmp

    Filesize

    64KB

  • memory/4104-2361-0x000000000C790000-0x000000000CCBC000-memory.dmp

    Filesize

    5.2MB

  • memory/4104-2362-0x000000000BF10000-0x000000000BF60000-memory.dmp

    Filesize

    320KB

  • memory/4104-2353-0x0000000005410000-0x0000000005420000-memory.dmp

    Filesize

    64KB

  • memory/4104-2347-0x00000000012E0000-0x00000000012E6000-memory.dmp

    Filesize

    24KB

  • memory/4104-2346-0x0000000000AA0000-0x0000000000AD0000-memory.dmp

    Filesize

    192KB