Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2023, 08:31

General

  • Target

    938673925454f6f669e6a41f271eab06.exe

  • Size

    2.6MB

  • MD5

    938673925454f6f669e6a41f271eab06

  • SHA1

    d5999b564fc9dcfff98bc41ff81db13bc1265f17

  • SHA256

    e40fead052850b5d2c4ef6d699c15af82eaee437784b0f359abf5dcc78852b8a

  • SHA512

    17a6c314588efe7da5f9edf109afaf351bd66bc5c2f8706c036f0ae37f206d4cbb8c37225050fc82b1d4099bb576c933d9224bffca04d0756b482077bafa61ec

  • SSDEEP

    49152:IBJ3XfUVsjwRiI38ihJkravhRJVlsVLR7Ideh9EUkUtxheicMSN:y1XfUVsjwsGhJk0hRJcGdehGQ07

Malware Config

Extracted

Family

redline

Botnet

red1

C2

79.137.202.0:81

Attributes
  • auth_value

    149c864a8f73ae7e8a9904bc94f60da1

Extracted

Family

laplas

C2

http://79.137.199.252

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\938673925454f6f669e6a41f271eab06.exe
    "C:\Users\Admin\AppData\Local\Temp\938673925454f6f669e6a41f271eab06.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2664
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3664
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
          PID:264
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          3⤵
            PID:2620
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4896
          • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
            "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
            3⤵
            • Executes dropped EXE
            PID:1336

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe

        Filesize

        365KB

        MD5

        fc52ebf7f39104e9c46787fd0d890c78

        SHA1

        eded07f2f3624686e0b2dde045db025b3e1baffd

        SHA256

        b37b24b47cd71660c04d1cc4a9bb4df940382563c9e5dbd943ee2f56e69a4244

        SHA512

        9c7d4c054785b0dcb77e602d599d7cb37a99e8a677b5f4fbe2600232bdc807a7cfa114ba1c214050fd761dc9009d3e900e2ef8c5ccda8051dae2006613d492e8

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe

        Filesize

        365KB

        MD5

        fc52ebf7f39104e9c46787fd0d890c78

        SHA1

        eded07f2f3624686e0b2dde045db025b3e1baffd

        SHA256

        b37b24b47cd71660c04d1cc4a9bb4df940382563c9e5dbd943ee2f56e69a4244

        SHA512

        9c7d4c054785b0dcb77e602d599d7cb37a99e8a677b5f4fbe2600232bdc807a7cfa114ba1c214050fd761dc9009d3e900e2ef8c5ccda8051dae2006613d492e8

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga1.exe

        Filesize

        365KB

        MD5

        fc52ebf7f39104e9c46787fd0d890c78

        SHA1

        eded07f2f3624686e0b2dde045db025b3e1baffd

        SHA256

        b37b24b47cd71660c04d1cc4a9bb4df940382563c9e5dbd943ee2f56e69a4244

        SHA512

        9c7d4c054785b0dcb77e602d599d7cb37a99e8a677b5f4fbe2600232bdc807a7cfa114ba1c214050fd761dc9009d3e900e2ef8c5ccda8051dae2006613d492e8

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe

        Filesize

        2.7MB

        MD5

        f28fb118e6ac87c2db0d3e7024b0d919

        SHA1

        1b32cedab36190174cd0859e236763b75ca64cad

        SHA256

        9505422390a6e5d3f33036c8780b503e3e1126e9943768ddb913470e5ca8f7a3

        SHA512

        8fab75b20d8de72cfd82b25bbbaa3e0f82d9e82fd07126bbdef93d93f4694321c283716da8efbe8828cd34c4224f486629cb7b1cfb83a67fe3995b14db253526

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe

        Filesize

        2.7MB

        MD5

        f28fb118e6ac87c2db0d3e7024b0d919

        SHA1

        1b32cedab36190174cd0859e236763b75ca64cad

        SHA256

        9505422390a6e5d3f33036c8780b503e3e1126e9943768ddb913470e5ca8f7a3

        SHA512

        8fab75b20d8de72cfd82b25bbbaa3e0f82d9e82fd07126bbdef93d93f4694321c283716da8efbe8828cd34c4224f486629cb7b1cfb83a67fe3995b14db253526

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga2.exe

        Filesize

        2.7MB

        MD5

        f28fb118e6ac87c2db0d3e7024b0d919

        SHA1

        1b32cedab36190174cd0859e236763b75ca64cad

        SHA256

        9505422390a6e5d3f33036c8780b503e3e1126e9943768ddb913470e5ca8f7a3

        SHA512

        8fab75b20d8de72cfd82b25bbbaa3e0f82d9e82fd07126bbdef93d93f4694321c283716da8efbe8828cd34c4224f486629cb7b1cfb83a67fe3995b14db253526

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe

        Filesize

        1.1MB

        MD5

        aa5c11589e4a42638c4d8c4a09813dac

        SHA1

        4d727fd367067b137817d0aaf62b201b67cb7cbc

        SHA256

        5f170e1c328f4e3019c677c2c0f640e9dc3cc417a2fe4cab1812e3e6d1f61df4

        SHA512

        21976a148691a443505aef57abe6883645fa267d63c4c5aad876756340379a5276bb20e116133cd16f4905b2d49df53aaffd7ecb0cf0679ce421fdd9fdac90c0

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe

        Filesize

        1.1MB

        MD5

        aa5c11589e4a42638c4d8c4a09813dac

        SHA1

        4d727fd367067b137817d0aaf62b201b67cb7cbc

        SHA256

        5f170e1c328f4e3019c677c2c0f640e9dc3cc417a2fe4cab1812e3e6d1f61df4

        SHA512

        21976a148691a443505aef57abe6883645fa267d63c4c5aad876756340379a5276bb20e116133cd16f4905b2d49df53aaffd7ecb0cf0679ce421fdd9fdac90c0

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mahatga3.exe

        Filesize

        1.1MB

        MD5

        aa5c11589e4a42638c4d8c4a09813dac

        SHA1

        4d727fd367067b137817d0aaf62b201b67cb7cbc

        SHA256

        5f170e1c328f4e3019c677c2c0f640e9dc3cc417a2fe4cab1812e3e6d1f61df4

        SHA512

        21976a148691a443505aef57abe6883645fa267d63c4c5aad876756340379a5276bb20e116133cd16f4905b2d49df53aaffd7ecb0cf0679ce421fdd9fdac90c0

      • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

        Filesize

        483.4MB

        MD5

        9c388b102fb28f98b99f306494b862b8

        SHA1

        504a4f673d87259e929f2139bff3e8e372d2e7cd

        SHA256

        956596f64efa1205885055d4098672bfd19c50f1997d2bbf20874835c3c5dadf

        SHA512

        e43ef1388e5f4356c3ff965515ab6bd7ef12d0be51d53230a8a46877d71ec807b32904c09d7aec1b360723f3e946ba68491fa4e95ea1b1102ae9ae64f7473bb9

      • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

        Filesize

        473.5MB

        MD5

        6ab8e4e455102ceb7f8d4e946c756991

        SHA1

        f6727bc8a943f4819b1049eea9bb8d0336080337

        SHA256

        b8f54776af391af8e7c119df2b5ab63b2252306f26b4654c1b953669dd93bda1

        SHA512

        f9f17993940377d1eab275ba10f4f2293920702ff9c8c7222596a6ba7d1186d2dd7d0240183b5be68722cdf98f0ce52a3d8372f6274a3d80045c729badc59874

      • memory/2620-165-0x0000000000400000-0x000000000056C000-memory.dmp

        Filesize

        1.4MB

      • memory/2620-192-0x0000000000400000-0x000000000056C000-memory.dmp

        Filesize

        1.4MB

      • memory/2620-188-0x0000000000400000-0x000000000056C000-memory.dmp

        Filesize

        1.4MB

      • memory/2620-190-0x0000000000400000-0x000000000056C000-memory.dmp

        Filesize

        1.4MB

      • memory/2620-189-0x0000000000400000-0x000000000056C000-memory.dmp

        Filesize

        1.4MB

      • memory/2664-164-0x0000000005440000-0x0000000005A58000-memory.dmp

        Filesize

        6.1MB

      • memory/2664-186-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/2664-182-0x0000000004EE0000-0x0000000004F1C000-memory.dmp

        Filesize

        240KB

      • memory/2664-172-0x0000000004E80000-0x0000000004E92000-memory.dmp

        Filesize

        72KB

      • memory/2664-374-0x00000000051F0000-0x0000000005266000-memory.dmp

        Filesize

        472KB

      • memory/2664-378-0x0000000005310000-0x00000000053A2000-memory.dmp

        Filesize

        584KB

      • memory/2664-427-0x0000000006940000-0x0000000006EE4000-memory.dmp

        Filesize

        5.6MB

      • memory/2664-434-0x0000000006390000-0x00000000063F6000-memory.dmp

        Filesize

        408KB

      • memory/2664-474-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/2664-551-0x0000000006850000-0x00000000068A0000-memory.dmp

        Filesize

        320KB

      • memory/2664-554-0x0000000007380000-0x0000000007542000-memory.dmp

        Filesize

        1.8MB

      • memory/2664-558-0x0000000007A80000-0x0000000007FAC000-memory.dmp

        Filesize

        5.2MB

      • memory/2664-167-0x0000000004F50000-0x000000000505A000-memory.dmp

        Filesize

        1.0MB

      • memory/2664-149-0x00000000007B0000-0x00000000007E0000-memory.dmp

        Filesize

        192KB