Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/05/2023, 21:34

General

  • Target

    089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe

  • Size

    1.5MB

  • MD5

    1ba754a29c497ee92b101a0504a62a25

  • SHA1

    e59241561d57a5a05f982fee69bc9de149f2a38b

  • SHA256

    089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e

  • SHA512

    6230dec10914fe14777d87f1e39b6b314e9f33e89e48a93e7e83ab2777622e6a5178cbce3e89b6489c721b47920d49b0c3ca78a0d4d7be8eb132bf4833244c37

  • SSDEEP

    49152:7fTKMUdETmkjSf8q3PpIuXQZIWn/fsGNKTYT:DTKjE6RsrIWM2+

Malware Config

Extracted

Family

redline

Botnet

maza

C2

185.161.248.73:4164

Attributes
  • auth_value

    474d54c1c2f5291290c53f8378acd684

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe
    "C:\Users\Admin\AppData\Local\Temp\089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i34288150.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i34288150.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38454802.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38454802.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4792
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i97514678.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i97514678.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4136
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i93430281.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i93430281.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4172
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a29372705.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a29372705.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4512
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b27214626.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b27214626.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3128
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c96909556.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c96909556.exe
            5⤵
            • Executes dropped EXE
            PID:4080
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 620
              6⤵
              • Program crash
              PID:4836
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 700
              6⤵
              • Program crash
              PID:3800
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 772
              6⤵
              • Program crash
              PID:3952
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 852
              6⤵
              • Program crash
              PID:4192
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 876
              6⤵
              • Program crash
              PID:3456
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 940
              6⤵
              • Program crash
              PID:4620
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 1124
              6⤵
              • Program crash
              PID:3260
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 1152
              6⤵
              • Program crash
              PID:4660
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 1188
              6⤵
              • Program crash
              PID:5088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i34288150.exe

    Filesize

    1.3MB

    MD5

    1808aecea7c95346705946d33d4ab941

    SHA1

    82f6e35273c464a1d9d88196696bc60a0773465d

    SHA256

    8325243d99a2f66f7273b9783d3fd0c7f1caa797e96f3e9b15e081c58bc89b05

    SHA512

    b5b6f166457832acce383b583f6dd79e1605fee524e1a4c3a1a878727dee49c7fc9ffe8c6082860a270ead38d55efb504216f4f363adb25b13e18e43cfacb319

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i34288150.exe

    Filesize

    1.3MB

    MD5

    1808aecea7c95346705946d33d4ab941

    SHA1

    82f6e35273c464a1d9d88196696bc60a0773465d

    SHA256

    8325243d99a2f66f7273b9783d3fd0c7f1caa797e96f3e9b15e081c58bc89b05

    SHA512

    b5b6f166457832acce383b583f6dd79e1605fee524e1a4c3a1a878727dee49c7fc9ffe8c6082860a270ead38d55efb504216f4f363adb25b13e18e43cfacb319

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38454802.exe

    Filesize

    1.1MB

    MD5

    49925d0535a9f1a885e44a9ab32656ff

    SHA1

    8acad2359cc225486157be83416a861bf57d7f19

    SHA256

    05aebf57d3ef88e6c826d16abacdabf4e1a858e572ff339fa477b796e724b0f8

    SHA512

    ac2a9ae75e1cc70ca149417dbb71850a844cab2a59c7826246cd77a2d34944c430e1e4eafc1709db18a411d7d9b7c298a65b193d31b03c5554916f50036ccbbf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38454802.exe

    Filesize

    1.1MB

    MD5

    49925d0535a9f1a885e44a9ab32656ff

    SHA1

    8acad2359cc225486157be83416a861bf57d7f19

    SHA256

    05aebf57d3ef88e6c826d16abacdabf4e1a858e572ff339fa477b796e724b0f8

    SHA512

    ac2a9ae75e1cc70ca149417dbb71850a844cab2a59c7826246cd77a2d34944c430e1e4eafc1709db18a411d7d9b7c298a65b193d31b03c5554916f50036ccbbf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i97514678.exe

    Filesize

    683KB

    MD5

    6c8dc6fa2a70493265a348247cc2deb9

    SHA1

    b696c692d50af1a6ae97627d58ff19d8c53e661f

    SHA256

    529fb5e16e180c6b80521aaf9dcd8927ca232f7099d2ee0053f3446fec9ba643

    SHA512

    c1c3e6554215aafd994aa4be0989ef35f69e0ccc80d2102210b4d7464f6cafa04107c4a9255e4185ce9787a97934579bd56d803157d89c18d42f2d71ece15d77

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i97514678.exe

    Filesize

    683KB

    MD5

    6c8dc6fa2a70493265a348247cc2deb9

    SHA1

    b696c692d50af1a6ae97627d58ff19d8c53e661f

    SHA256

    529fb5e16e180c6b80521aaf9dcd8927ca232f7099d2ee0053f3446fec9ba643

    SHA512

    c1c3e6554215aafd994aa4be0989ef35f69e0ccc80d2102210b4d7464f6cafa04107c4a9255e4185ce9787a97934579bd56d803157d89c18d42f2d71ece15d77

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c96909556.exe

    Filesize

    323KB

    MD5

    0b23176fcc8819874697230a81ab2bef

    SHA1

    ae5af94f9e0a4e007e9b225bc98fe0c444829087

    SHA256

    63d8d5a8dcd1d4073fe436073893b3e758c902cfcce44f2fa2ac9e8827c9cd47

    SHA512

    60e9443226018d14e93e2fa8cdf07ddc6bacb22ccb75ee5c827f333eb2f432bbc41f9b151b7544ca9751389c5b8dbcbbed49882f5be558ebcb60d2c00c4982ca

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c96909556.exe

    Filesize

    323KB

    MD5

    0b23176fcc8819874697230a81ab2bef

    SHA1

    ae5af94f9e0a4e007e9b225bc98fe0c444829087

    SHA256

    63d8d5a8dcd1d4073fe436073893b3e758c902cfcce44f2fa2ac9e8827c9cd47

    SHA512

    60e9443226018d14e93e2fa8cdf07ddc6bacb22ccb75ee5c827f333eb2f432bbc41f9b151b7544ca9751389c5b8dbcbbed49882f5be558ebcb60d2c00c4982ca

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i93430281.exe

    Filesize

    404KB

    MD5

    46793499b51059e5454564c5f5f32983

    SHA1

    119ee6d6c602e73743ecb98c3cd5e79d1c04cb4f

    SHA256

    1d7d4372452a3d1716305eee760b67691a400fa17464b1f45003da3334f6a705

    SHA512

    bfc933b604663dce3234faea5e7af54184fdab4036a5f4e157bb8e2a33605906e48688a1b59570bc96ad3b969535ddb0d82fad1a1646628df87b6077dd6eb9a3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i93430281.exe

    Filesize

    404KB

    MD5

    46793499b51059e5454564c5f5f32983

    SHA1

    119ee6d6c602e73743ecb98c3cd5e79d1c04cb4f

    SHA256

    1d7d4372452a3d1716305eee760b67691a400fa17464b1f45003da3334f6a705

    SHA512

    bfc933b604663dce3234faea5e7af54184fdab4036a5f4e157bb8e2a33605906e48688a1b59570bc96ad3b969535ddb0d82fad1a1646628df87b6077dd6eb9a3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a29372705.exe

    Filesize

    344KB

    MD5

    96306f6480434e25d9e1b684646b9bc2

    SHA1

    38278878e4317cf3009bf99d2dcd60ba563e7fe9

    SHA256

    3dbfc20a167708008ffa2049b373050057e5c6ef6b879f7287f49c31408e4131

    SHA512

    c473eaa4bf9a9b4e5ebafafb49bda2822e776d0d9dc2bc759360fd415f996cbc4f4060f9cccbab53cae247fb3d046197715d8422828c71ee140bd0f8eb885dc9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a29372705.exe

    Filesize

    344KB

    MD5

    96306f6480434e25d9e1b684646b9bc2

    SHA1

    38278878e4317cf3009bf99d2dcd60ba563e7fe9

    SHA256

    3dbfc20a167708008ffa2049b373050057e5c6ef6b879f7287f49c31408e4131

    SHA512

    c473eaa4bf9a9b4e5ebafafb49bda2822e776d0d9dc2bc759360fd415f996cbc4f4060f9cccbab53cae247fb3d046197715d8422828c71ee140bd0f8eb885dc9

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b27214626.exe

    Filesize

    168KB

    MD5

    79e47e2d5558b923382d807e4afce195

    SHA1

    c672bd98adc869d743f50d3642d3d377cc7364d6

    SHA256

    c2ef2b7b4f9d4fb12d669ed81ba82870a8f5db169d6d7c1c3b22f092d6659316

    SHA512

    b9ad8f843fa2dc8ac2b13993e7e1e1bf0552000283e67371b0e00a84eaba72d9924abfff5012b3702a84c0d0ff4b8f1add4b78ded2cd0ca6be10c96fcca335eb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b27214626.exe

    Filesize

    168KB

    MD5

    79e47e2d5558b923382d807e4afce195

    SHA1

    c672bd98adc869d743f50d3642d3d377cc7364d6

    SHA256

    c2ef2b7b4f9d4fb12d669ed81ba82870a8f5db169d6d7c1c3b22f092d6659316

    SHA512

    b9ad8f843fa2dc8ac2b13993e7e1e1bf0552000283e67371b0e00a84eaba72d9924abfff5012b3702a84c0d0ff4b8f1add4b78ded2cd0ca6be10c96fcca335eb

  • memory/3128-206-0x0000000005910000-0x0000000005986000-memory.dmp

    Filesize

    472KB

  • memory/3128-203-0x0000000005380000-0x0000000005390000-memory.dmp

    Filesize

    64KB

  • memory/3128-210-0x0000000008D40000-0x000000000926C000-memory.dmp

    Filesize

    5.2MB

  • memory/3128-209-0x0000000006FC0000-0x0000000007182000-memory.dmp

    Filesize

    1.8MB

  • memory/3128-208-0x0000000005AD0000-0x0000000005B36000-memory.dmp

    Filesize

    408KB

  • memory/3128-207-0x0000000005A30000-0x0000000005AC2000-memory.dmp

    Filesize

    584KB

  • memory/3128-197-0x0000000000B40000-0x0000000000B6E000-memory.dmp

    Filesize

    184KB

  • memory/3128-205-0x0000000005380000-0x0000000005390000-memory.dmp

    Filesize

    64KB

  • memory/3128-204-0x0000000005640000-0x000000000568B000-memory.dmp

    Filesize

    300KB

  • memory/3128-211-0x0000000006890000-0x00000000068E0000-memory.dmp

    Filesize

    320KB

  • memory/3128-202-0x00000000055F0000-0x000000000562E000-memory.dmp

    Filesize

    248KB

  • memory/3128-201-0x0000000005590000-0x00000000055A2000-memory.dmp

    Filesize

    72KB

  • memory/3128-200-0x00000000056A0000-0x00000000057AA000-memory.dmp

    Filesize

    1.0MB

  • memory/3128-199-0x0000000005BA0000-0x00000000061A6000-memory.dmp

    Filesize

    6.0MB

  • memory/3128-198-0x0000000001310000-0x0000000001316000-memory.dmp

    Filesize

    24KB

  • memory/4080-218-0x0000000000400000-0x0000000000A61000-memory.dmp

    Filesize

    6.4MB

  • memory/4080-217-0x0000000000A70000-0x0000000000AA5000-memory.dmp

    Filesize

    212KB

  • memory/4512-156-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB

  • memory/4512-187-0x0000000000400000-0x0000000000A67000-memory.dmp

    Filesize

    6.4MB

  • memory/4512-188-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB

  • memory/4512-189-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB

  • memory/4512-190-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB

  • memory/4512-193-0x0000000000400000-0x0000000000A67000-memory.dmp

    Filesize

    6.4MB

  • memory/4512-186-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-184-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-182-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-180-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-178-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-176-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-174-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-172-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-170-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-168-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-164-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-166-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-162-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-160-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-159-0x0000000002C40000-0x0000000002C52000-memory.dmp

    Filesize

    72KB

  • memory/4512-158-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB

  • memory/4512-157-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB

  • memory/4512-155-0x0000000002C40000-0x0000000002C58000-memory.dmp

    Filesize

    96KB

  • memory/4512-154-0x00000000051C0000-0x00000000056BE000-memory.dmp

    Filesize

    5.0MB

  • memory/4512-153-0x0000000002650000-0x000000000266A000-memory.dmp

    Filesize

    104KB

  • memory/4512-152-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB