Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2023, 08:31

General

  • Target

    938673925454f6f669e6a41f271eab06.exe

  • Size

    2.6MB

  • MD5

    938673925454f6f669e6a41f271eab06

  • SHA1

    d5999b564fc9dcfff98bc41ff81db13bc1265f17

  • SHA256

    e40fead052850b5d2c4ef6d699c15af82eaee437784b0f359abf5dcc78852b8a

  • SHA512

    17a6c314588efe7da5f9edf109afaf351bd66bc5c2f8706c036f0ae37f206d4cbb8c37225050fc82b1d4099bb576c933d9224bffca04d0756b482077bafa61ec

  • SSDEEP

    49152:IBJ3XfUVsjwRiI38ihJkravhRJVlsVLR7Ideh9EUkUtxheicMSN:y1XfUVsjwsGhJk0hRJcGdehGQ07

Malware Config

Extracted

Family

redline

Botnet

red1

C2

79.137.202.0:81

Attributes
  • auth_value

    149c864a8f73ae7e8a9904bc94f60da1

Extracted

Family

laplas

C2

http://79.137.199.252

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\938673925454f6f669e6a41f271eab06.exe
    "C:\Users\Admin\AppData\Local\Temp\938673925454f6f669e6a41f271eab06.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
          PID:332
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          3⤵
            PID:1020
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:760
          • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
            "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
            3⤵
              PID:588

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe

          Filesize

          365KB

          MD5

          fc52ebf7f39104e9c46787fd0d890c78

          SHA1

          eded07f2f3624686e0b2dde045db025b3e1baffd

          SHA256

          b37b24b47cd71660c04d1cc4a9bb4df940382563c9e5dbd943ee2f56e69a4244

          SHA512

          9c7d4c054785b0dcb77e602d599d7cb37a99e8a677b5f4fbe2600232bdc807a7cfa114ba1c214050fd761dc9009d3e900e2ef8c5ccda8051dae2006613d492e8

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe

          Filesize

          365KB

          MD5

          fc52ebf7f39104e9c46787fd0d890c78

          SHA1

          eded07f2f3624686e0b2dde045db025b3e1baffd

          SHA256

          b37b24b47cd71660c04d1cc4a9bb4df940382563c9e5dbd943ee2f56e69a4244

          SHA512

          9c7d4c054785b0dcb77e602d599d7cb37a99e8a677b5f4fbe2600232bdc807a7cfa114ba1c214050fd761dc9009d3e900e2ef8c5ccda8051dae2006613d492e8

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe

          Filesize

          2.7MB

          MD5

          f28fb118e6ac87c2db0d3e7024b0d919

          SHA1

          1b32cedab36190174cd0859e236763b75ca64cad

          SHA256

          9505422390a6e5d3f33036c8780b503e3e1126e9943768ddb913470e5ca8f7a3

          SHA512

          8fab75b20d8de72cfd82b25bbbaa3e0f82d9e82fd07126bbdef93d93f4694321c283716da8efbe8828cd34c4224f486629cb7b1cfb83a67fe3995b14db253526

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe

          Filesize

          2.7MB

          MD5

          f28fb118e6ac87c2db0d3e7024b0d919

          SHA1

          1b32cedab36190174cd0859e236763b75ca64cad

          SHA256

          9505422390a6e5d3f33036c8780b503e3e1126e9943768ddb913470e5ca8f7a3

          SHA512

          8fab75b20d8de72cfd82b25bbbaa3e0f82d9e82fd07126bbdef93d93f4694321c283716da8efbe8828cd34c4224f486629cb7b1cfb83a67fe3995b14db253526

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe

          Filesize

          1.1MB

          MD5

          aa5c11589e4a42638c4d8c4a09813dac

          SHA1

          4d727fd367067b137817d0aaf62b201b67cb7cbc

          SHA256

          5f170e1c328f4e3019c677c2c0f640e9dc3cc417a2fe4cab1812e3e6d1f61df4

          SHA512

          21976a148691a443505aef57abe6883645fa267d63c4c5aad876756340379a5276bb20e116133cd16f4905b2d49df53aaffd7ecb0cf0679ce421fdd9fdac90c0

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe

          Filesize

          1.1MB

          MD5

          aa5c11589e4a42638c4d8c4a09813dac

          SHA1

          4d727fd367067b137817d0aaf62b201b67cb7cbc

          SHA256

          5f170e1c328f4e3019c677c2c0f640e9dc3cc417a2fe4cab1812e3e6d1f61df4

          SHA512

          21976a148691a443505aef57abe6883645fa267d63c4c5aad876756340379a5276bb20e116133cd16f4905b2d49df53aaffd7ecb0cf0679ce421fdd9fdac90c0

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe

          Filesize

          1.1MB

          MD5

          aa5c11589e4a42638c4d8c4a09813dac

          SHA1

          4d727fd367067b137817d0aaf62b201b67cb7cbc

          SHA256

          5f170e1c328f4e3019c677c2c0f640e9dc3cc417a2fe4cab1812e3e6d1f61df4

          SHA512

          21976a148691a443505aef57abe6883645fa267d63c4c5aad876756340379a5276bb20e116133cd16f4905b2d49df53aaffd7ecb0cf0679ce421fdd9fdac90c0

        • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

          Filesize

          58.6MB

          MD5

          4f6c3b320a5273d998add3172a81a102

          SHA1

          729aab8f5f91cb4423c3f9d442154fc58866992a

          SHA256

          ed2cc960099d44067707381fe541c298157b119989d915dc2debc74ab2664f12

          SHA512

          98b28ddc2b12687e86f08df23d512bf6d5b0ec076e99ecf67f7ec3e36a357ae173a3aed1cad7a02f68b878481176f022341817822488af8e824a98925d5a2fa8

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe

          Filesize

          365KB

          MD5

          fc52ebf7f39104e9c46787fd0d890c78

          SHA1

          eded07f2f3624686e0b2dde045db025b3e1baffd

          SHA256

          b37b24b47cd71660c04d1cc4a9bb4df940382563c9e5dbd943ee2f56e69a4244

          SHA512

          9c7d4c054785b0dcb77e602d599d7cb37a99e8a677b5f4fbe2600232bdc807a7cfa114ba1c214050fd761dc9009d3e900e2ef8c5ccda8051dae2006613d492e8

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe

          Filesize

          365KB

          MD5

          fc52ebf7f39104e9c46787fd0d890c78

          SHA1

          eded07f2f3624686e0b2dde045db025b3e1baffd

          SHA256

          b37b24b47cd71660c04d1cc4a9bb4df940382563c9e5dbd943ee2f56e69a4244

          SHA512

          9c7d4c054785b0dcb77e602d599d7cb37a99e8a677b5f4fbe2600232bdc807a7cfa114ba1c214050fd761dc9009d3e900e2ef8c5ccda8051dae2006613d492e8

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe

          Filesize

          365KB

          MD5

          fc52ebf7f39104e9c46787fd0d890c78

          SHA1

          eded07f2f3624686e0b2dde045db025b3e1baffd

          SHA256

          b37b24b47cd71660c04d1cc4a9bb4df940382563c9e5dbd943ee2f56e69a4244

          SHA512

          9c7d4c054785b0dcb77e602d599d7cb37a99e8a677b5f4fbe2600232bdc807a7cfa114ba1c214050fd761dc9009d3e900e2ef8c5ccda8051dae2006613d492e8

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe

          Filesize

          365KB

          MD5

          fc52ebf7f39104e9c46787fd0d890c78

          SHA1

          eded07f2f3624686e0b2dde045db025b3e1baffd

          SHA256

          b37b24b47cd71660c04d1cc4a9bb4df940382563c9e5dbd943ee2f56e69a4244

          SHA512

          9c7d4c054785b0dcb77e602d599d7cb37a99e8a677b5f4fbe2600232bdc807a7cfa114ba1c214050fd761dc9009d3e900e2ef8c5ccda8051dae2006613d492e8

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe

          Filesize

          365KB

          MD5

          fc52ebf7f39104e9c46787fd0d890c78

          SHA1

          eded07f2f3624686e0b2dde045db025b3e1baffd

          SHA256

          b37b24b47cd71660c04d1cc4a9bb4df940382563c9e5dbd943ee2f56e69a4244

          SHA512

          9c7d4c054785b0dcb77e602d599d7cb37a99e8a677b5f4fbe2600232bdc807a7cfa114ba1c214050fd761dc9009d3e900e2ef8c5ccda8051dae2006613d492e8

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe

          Filesize

          2.7MB

          MD5

          f28fb118e6ac87c2db0d3e7024b0d919

          SHA1

          1b32cedab36190174cd0859e236763b75ca64cad

          SHA256

          9505422390a6e5d3f33036c8780b503e3e1126e9943768ddb913470e5ca8f7a3

          SHA512

          8fab75b20d8de72cfd82b25bbbaa3e0f82d9e82fd07126bbdef93d93f4694321c283716da8efbe8828cd34c4224f486629cb7b1cfb83a67fe3995b14db253526

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe

          Filesize

          2.7MB

          MD5

          f28fb118e6ac87c2db0d3e7024b0d919

          SHA1

          1b32cedab36190174cd0859e236763b75ca64cad

          SHA256

          9505422390a6e5d3f33036c8780b503e3e1126e9943768ddb913470e5ca8f7a3

          SHA512

          8fab75b20d8de72cfd82b25bbbaa3e0f82d9e82fd07126bbdef93d93f4694321c283716da8efbe8828cd34c4224f486629cb7b1cfb83a67fe3995b14db253526

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe

          Filesize

          2.7MB

          MD5

          f28fb118e6ac87c2db0d3e7024b0d919

          SHA1

          1b32cedab36190174cd0859e236763b75ca64cad

          SHA256

          9505422390a6e5d3f33036c8780b503e3e1126e9943768ddb913470e5ca8f7a3

          SHA512

          8fab75b20d8de72cfd82b25bbbaa3e0f82d9e82fd07126bbdef93d93f4694321c283716da8efbe8828cd34c4224f486629cb7b1cfb83a67fe3995b14db253526

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe

          Filesize

          2.7MB

          MD5

          f28fb118e6ac87c2db0d3e7024b0d919

          SHA1

          1b32cedab36190174cd0859e236763b75ca64cad

          SHA256

          9505422390a6e5d3f33036c8780b503e3e1126e9943768ddb913470e5ca8f7a3

          SHA512

          8fab75b20d8de72cfd82b25bbbaa3e0f82d9e82fd07126bbdef93d93f4694321c283716da8efbe8828cd34c4224f486629cb7b1cfb83a67fe3995b14db253526

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe

          Filesize

          2.7MB

          MD5

          f28fb118e6ac87c2db0d3e7024b0d919

          SHA1

          1b32cedab36190174cd0859e236763b75ca64cad

          SHA256

          9505422390a6e5d3f33036c8780b503e3e1126e9943768ddb913470e5ca8f7a3

          SHA512

          8fab75b20d8de72cfd82b25bbbaa3e0f82d9e82fd07126bbdef93d93f4694321c283716da8efbe8828cd34c4224f486629cb7b1cfb83a67fe3995b14db253526

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe

          Filesize

          1.1MB

          MD5

          aa5c11589e4a42638c4d8c4a09813dac

          SHA1

          4d727fd367067b137817d0aaf62b201b67cb7cbc

          SHA256

          5f170e1c328f4e3019c677c2c0f640e9dc3cc417a2fe4cab1812e3e6d1f61df4

          SHA512

          21976a148691a443505aef57abe6883645fa267d63c4c5aad876756340379a5276bb20e116133cd16f4905b2d49df53aaffd7ecb0cf0679ce421fdd9fdac90c0

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe

          Filesize

          1.1MB

          MD5

          aa5c11589e4a42638c4d8c4a09813dac

          SHA1

          4d727fd367067b137817d0aaf62b201b67cb7cbc

          SHA256

          5f170e1c328f4e3019c677c2c0f640e9dc3cc417a2fe4cab1812e3e6d1f61df4

          SHA512

          21976a148691a443505aef57abe6883645fa267d63c4c5aad876756340379a5276bb20e116133cd16f4905b2d49df53aaffd7ecb0cf0679ce421fdd9fdac90c0

        • \Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe

          Filesize

          1.1MB

          MD5

          aa5c11589e4a42638c4d8c4a09813dac

          SHA1

          4d727fd367067b137817d0aaf62b201b67cb7cbc

          SHA256

          5f170e1c328f4e3019c677c2c0f640e9dc3cc417a2fe4cab1812e3e6d1f61df4

          SHA512

          21976a148691a443505aef57abe6883645fa267d63c4c5aad876756340379a5276bb20e116133cd16f4905b2d49df53aaffd7ecb0cf0679ce421fdd9fdac90c0

        • \Users\Admin\AppData\Roaming\telemetry\svcservice.exe

          Filesize

          59.2MB

          MD5

          fca607445271677e53e393ff3172671e

          SHA1

          b0ba003c97194ab777d3d78a2114f96e71eb2d5f

          SHA256

          e8fdc8ffcfc3f5ecc313a474d1c2fa8582aa071228fae8c3e6a51b69762dfd31

          SHA512

          e3ca4f2df809afb0477f971b5164015868012a901ac7a0787434f21c5f1a4d2f39e37298cbccf3a4d3d34c0ea8f045a336bf6a762139b297ad4e2f659c2d0d4c

        • memory/332-81-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/332-146-0x0000000004B70000-0x0000000004BB0000-memory.dmp

          Filesize

          256KB

        • memory/332-320-0x0000000004B70000-0x0000000004BB0000-memory.dmp

          Filesize

          256KB

        • memory/332-76-0x0000000000090000-0x00000000000C0000-memory.dmp

          Filesize

          192KB

        • memory/332-85-0x0000000000320000-0x0000000000326000-memory.dmp

          Filesize

          24KB

        • memory/332-83-0x0000000000090000-0x00000000000C0000-memory.dmp

          Filesize

          192KB

        • memory/332-77-0x0000000000090000-0x00000000000C0000-memory.dmp

          Filesize

          192KB

        • memory/332-84-0x0000000000090000-0x00000000000C0000-memory.dmp

          Filesize

          192KB

        • memory/1020-123-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/1020-102-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/1020-103-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/1020-125-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/1020-130-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/1020-126-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB