Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    101s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/04/2023, 03:19

General

  • Target

    4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe

  • Size

    1.2MB

  • MD5

    7f87aaa0aaebcb6b6aa8cbd87de81473

  • SHA1

    af347474443471aa6da1cf0fd7d4366a8f1adb24

  • SHA256

    4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3

  • SHA512

    089b381821fdc039ca05826b87518c3a2f983b1b6bb08f0f39bfdd2c4c7b9db6f848d31b1d57f7f107746f15fd3b07bfeb963adfd49dce8b2bbdfb737702a898

  • SSDEEP

    24576:iy8NOIEvVZDg+FfO0CGpkhquI1Ivm8mI1nTrgroWr6mz36H:J8+lf5vpui98PgroWrD

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe
    "C:\Users\Admin\AppData\Local\Temp\4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un326487.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un326487.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un068870.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un068870.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2052
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr536647.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr536647.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3888
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu155409.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu155409.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk079340.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk079340.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527907.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527907.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:5028
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 636
        3⤵
        • Program crash
        PID:4220
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 712
        3⤵
        • Program crash
        PID:4736
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 860
        3⤵
        • Program crash
        PID:3024
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 868
        3⤵
        • Program crash
        PID:4908
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 888
        3⤵
        • Program crash
        PID:3928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 908
        3⤵
        • Program crash
        PID:1380
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 1128
        3⤵
        • Program crash
        PID:4208
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 1184
        3⤵
        • Program crash
        PID:2660
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 1216
        3⤵
        • Program crash
        PID:3764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527907.exe

    Filesize

    397KB

    MD5

    4d611f4112ed8379871f8bcb211ca4a3

    SHA1

    5da68386eaf519b34f8de099d3443379ab027ef7

    SHA256

    a76929112fba2a0c2a7eaf33e6fef368ba8f828ec791192b7a44b13fb86ed80e

    SHA512

    4801282feec1c85982f1eceaba0293f99b64a001b7ff3c7e46e147d10f88ede3dd421c67117ccc19ac2b3e4245009bbecb5de497c5c0cd4c4ae120717ab310a7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527907.exe

    Filesize

    397KB

    MD5

    4d611f4112ed8379871f8bcb211ca4a3

    SHA1

    5da68386eaf519b34f8de099d3443379ab027ef7

    SHA256

    a76929112fba2a0c2a7eaf33e6fef368ba8f828ec791192b7a44b13fb86ed80e

    SHA512

    4801282feec1c85982f1eceaba0293f99b64a001b7ff3c7e46e147d10f88ede3dd421c67117ccc19ac2b3e4245009bbecb5de497c5c0cd4c4ae120717ab310a7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un326487.exe

    Filesize

    862KB

    MD5

    276df6feed43a683a9b5fec943e77961

    SHA1

    7b1027f8d809d6ce1cb2f99f00cb4f37491d2ac8

    SHA256

    4c3e6b2b7bf48a02a145f557fc5310314f1fe5256e34d814891bfa81589549f0

    SHA512

    7e5b45bb4ee63f2efbb72e075fec613e41b2ebae7a837c06f56dd961559b53250afb5900f2197fbf5c388e4263abbc358af3867fe25e1e897c7fae0c606f5b89

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un326487.exe

    Filesize

    862KB

    MD5

    276df6feed43a683a9b5fec943e77961

    SHA1

    7b1027f8d809d6ce1cb2f99f00cb4f37491d2ac8

    SHA256

    4c3e6b2b7bf48a02a145f557fc5310314f1fe5256e34d814891bfa81589549f0

    SHA512

    7e5b45bb4ee63f2efbb72e075fec613e41b2ebae7a837c06f56dd961559b53250afb5900f2197fbf5c388e4263abbc358af3867fe25e1e897c7fae0c606f5b89

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk079340.exe

    Filesize

    168KB

    MD5

    aa8bb998c46f60bacf91f98f8d4d7b5c

    SHA1

    61c7e314d916035128849f85a29b34ac1fb482e0

    SHA256

    7e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131

    SHA512

    3e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk079340.exe

    Filesize

    168KB

    MD5

    aa8bb998c46f60bacf91f98f8d4d7b5c

    SHA1

    61c7e314d916035128849f85a29b34ac1fb482e0

    SHA256

    7e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131

    SHA512

    3e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un068870.exe

    Filesize

    708KB

    MD5

    219f5705d75b16132769651932c77062

    SHA1

    b23f683a072036b4d4b5d46b3c033789df52dfcc

    SHA256

    eafcc09c95b9dfd231d5b63d63c042e6a50b496149fa280280a237b524c3720e

    SHA512

    4ba3eab0a78e0db3da6eba013bc8299947f010f4d172e4c91ec2f23717ee34d54b7381f4bc62bbdd4be726f80e2949bf91bfa71a30f9770504314b1244cd417a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un068870.exe

    Filesize

    708KB

    MD5

    219f5705d75b16132769651932c77062

    SHA1

    b23f683a072036b4d4b5d46b3c033789df52dfcc

    SHA256

    eafcc09c95b9dfd231d5b63d63c042e6a50b496149fa280280a237b524c3720e

    SHA512

    4ba3eab0a78e0db3da6eba013bc8299947f010f4d172e4c91ec2f23717ee34d54b7381f4bc62bbdd4be726f80e2949bf91bfa71a30f9770504314b1244cd417a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr536647.exe

    Filesize

    404KB

    MD5

    781797e95cb4c8a228759ab450b8ea29

    SHA1

    249c4821c9b4391146aa1634e9eccfd79b04aa54

    SHA256

    91c252e5321c8590bf62c9c57febcfb9a28ab53b780118ea0e5697eecf273668

    SHA512

    404eef47b820cdf8b4fb6dd2a1feecda2a317ed1b98fbade9440e5d32f0907815f3fef1a47f68ffa51e2776af761a26c01200ef7a692f617c90b783aadbb546b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr536647.exe

    Filesize

    404KB

    MD5

    781797e95cb4c8a228759ab450b8ea29

    SHA1

    249c4821c9b4391146aa1634e9eccfd79b04aa54

    SHA256

    91c252e5321c8590bf62c9c57febcfb9a28ab53b780118ea0e5697eecf273668

    SHA512

    404eef47b820cdf8b4fb6dd2a1feecda2a317ed1b98fbade9440e5d32f0907815f3fef1a47f68ffa51e2776af761a26c01200ef7a692f617c90b783aadbb546b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu155409.exe

    Filesize

    588KB

    MD5

    b3d936514b7a52377ecc541c7b5fa5c0

    SHA1

    c5bd499fe816de81ec7d28f268d63af151bd3af5

    SHA256

    c969cfae41b8233c482fb5fc79a10b2266400299228c4890ccce6063fc4ab3f9

    SHA512

    32be8103dec496ac87a75814d7fdec6b5954971a263a229730f6ec116462b64c6795bcd4f1ddb603a40a533b62763b29e411f6b295eb09091239ec9f19aba0f5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu155409.exe

    Filesize

    588KB

    MD5

    b3d936514b7a52377ecc541c7b5fa5c0

    SHA1

    c5bd499fe816de81ec7d28f268d63af151bd3af5

    SHA256

    c969cfae41b8233c482fb5fc79a10b2266400299228c4890ccce6063fc4ab3f9

    SHA512

    32be8103dec496ac87a75814d7fdec6b5954971a263a229730f6ec116462b64c6795bcd4f1ddb603a40a533b62763b29e411f6b295eb09091239ec9f19aba0f5

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/196-2354-0x00000000052B0000-0x0000000005316000-memory.dmp

    Filesize

    408KB

  • memory/196-2353-0x0000000005210000-0x00000000052A2000-memory.dmp

    Filesize

    584KB

  • memory/196-2351-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/196-2343-0x00000000023F0000-0x00000000023F6000-memory.dmp

    Filesize

    24KB

  • memory/196-2356-0x00000000084C0000-0x00000000089EC000-memory.dmp

    Filesize

    5.2MB

  • memory/196-2359-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/196-2338-0x0000000000320000-0x000000000034E000-memory.dmp

    Filesize

    184KB

  • memory/2672-197-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-214-0x0000000004F50000-0x0000000004F60000-memory.dmp

    Filesize

    64KB

  • memory/2672-2330-0x0000000005630000-0x0000000005662000-memory.dmp

    Filesize

    200KB

  • memory/2672-221-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-215-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-219-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-217-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-211-0x0000000004F50000-0x0000000004F60000-memory.dmp

    Filesize

    64KB

  • memory/2672-212-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-209-0x0000000004F50000-0x0000000004F60000-memory.dmp

    Filesize

    64KB

  • memory/2672-207-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-208-0x00000000009D0000-0x0000000000A2B000-memory.dmp

    Filesize

    364KB

  • memory/2672-182-0x00000000028D0000-0x0000000002938000-memory.dmp

    Filesize

    416KB

  • memory/2672-183-0x0000000005460000-0x00000000054C6000-memory.dmp

    Filesize

    408KB

  • memory/2672-184-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-185-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-187-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-189-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-191-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-193-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-195-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-205-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-199-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-201-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/2672-203-0x0000000005460000-0x00000000054C0000-memory.dmp

    Filesize

    384KB

  • memory/3304-2342-0x0000000000880000-0x00000000008B0000-memory.dmp

    Filesize

    192KB

  • memory/3304-2358-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/3304-2357-0x0000000006CC0000-0x0000000006D10000-memory.dmp

    Filesize

    320KB

  • memory/3304-2355-0x0000000006590000-0x0000000006752000-memory.dmp

    Filesize

    1.8MB

  • memory/3304-2352-0x0000000005510000-0x0000000005586000-memory.dmp

    Filesize

    472KB

  • memory/3304-2350-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/3304-2349-0x0000000005240000-0x000000000528B000-memory.dmp

    Filesize

    300KB

  • memory/3304-2348-0x00000000051F0000-0x000000000522E000-memory.dmp

    Filesize

    248KB

  • memory/3304-2347-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/3304-2346-0x00000000052A0000-0x00000000053AA000-memory.dmp

    Filesize

    1.0MB

  • memory/3304-2345-0x00000000057A0000-0x0000000005DA6000-memory.dmp

    Filesize

    6.0MB

  • memory/3304-2344-0x0000000000E30000-0x0000000000E36000-memory.dmp

    Filesize

    24KB

  • memory/3888-169-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-174-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3888-151-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-155-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-149-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-147-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-146-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-165-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-167-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-157-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-171-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-173-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-163-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-153-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-145-0x0000000004E70000-0x0000000004E88000-memory.dmp

    Filesize

    96KB

  • memory/3888-175-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/3888-144-0x0000000004F70000-0x000000000546E000-memory.dmp

    Filesize

    5.0MB

  • memory/3888-143-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/3888-177-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3888-142-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/3888-161-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-159-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/3888-141-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/3888-140-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3888-139-0x00000000025D0000-0x00000000025EA000-memory.dmp

    Filesize

    104KB

  • memory/5028-2366-0x0000000000960000-0x000000000099B000-memory.dmp

    Filesize

    236KB