Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 18:39 UTC

General

  • Target

    d68bca2bccb7f4fed32ea113bfafcba3ab4848f84e89a6260c38f7fdc9640323.exe

  • Size

    867KB

  • MD5

    08fb8213523b037d030d043e358603fa

  • SHA1

    9188463260116c8d6542c34264d009fffb4939a2

  • SHA256

    d68bca2bccb7f4fed32ea113bfafcba3ab4848f84e89a6260c38f7fdc9640323

  • SHA512

    c7da520e4cfed63979ecd52ff7851926847aeb539b2cb1fe10fd467234de2a85bc266fdaa5fdfea19236f603d2c061c9256eccbfec64c32fb3996208933a0321

  • SSDEEP

    24576:gyOSBDwYbtFDhw69HgIk9Hn2w2RRnNtgZnQSjhQh:n70YblPHgr9H2ZRRnY2Sj

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d68bca2bccb7f4fed32ea113bfafcba3ab4848f84e89a6260c38f7fdc9640323.exe
    "C:\Users\Admin\AppData\Local\Temp\d68bca2bccb7f4fed32ea113bfafcba3ab4848f84e89a6260c38f7fdc9640323.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y91978596.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y91978596.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p42816439.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p42816439.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4504
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4160
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 1372
          4⤵
          • Program crash
          PID:3808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r99304155.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r99304155.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s82510535.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s82510535.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 1084
        3⤵
        • Program crash
        PID:3300
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4504 -ip 4504
    1⤵
      PID:1460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1008 -ip 1008
      1⤵
        PID:3304

      Network

      • flag-us
        DNS
        123.108.74.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        123.108.74.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        240.232.18.117.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        240.232.18.117.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        108.211.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        108.211.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        104.219.191.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        104.219.191.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        73.248.161.185.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        73.248.161.185.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        209.205.72.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        209.205.72.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        86.23.85.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        86.23.85.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        18.31.95.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        18.31.95.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        203.151.224.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        203.151.224.20.in-addr.arpa
        IN PTR
        Response
      • 20.42.65.90:443
        322 B
        7
      • 185.161.248.73:4164
        1.exe
        9.2kB
        7.0kB
        37
        25
      • 185.161.248.73:4164
        r99304155.exe
        9.2kB
        7.0kB
        36
        25
      • 13.107.4.50:80
        322 B
        7
      • 13.107.4.50:80
        322 B
        7
      • 178.79.208.1:80
        322 B
        7
      • 8.8.8.8:53
        123.108.74.40.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        123.108.74.40.in-addr.arpa

      • 8.8.8.8:53
        240.232.18.117.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        240.232.18.117.in-addr.arpa

      • 8.8.8.8:53
        108.211.229.192.in-addr.arpa
        dns
        74 B
        145 B
        1
        1

        DNS Request

        108.211.229.192.in-addr.arpa

      • 8.8.8.8:53
        104.219.191.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        104.219.191.52.in-addr.arpa

      • 8.8.8.8:53
        73.248.161.185.in-addr.arpa
        dns
        73 B
        133 B
        1
        1

        DNS Request

        73.248.161.185.in-addr.arpa

      • 8.8.8.8:53
        209.205.72.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        209.205.72.20.in-addr.arpa

      • 8.8.8.8:53
        86.23.85.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        86.23.85.13.in-addr.arpa

      • 8.8.8.8:53
        18.31.95.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        18.31.95.13.in-addr.arpa

      • 8.8.8.8:53
        203.151.224.20.in-addr.arpa
        dns
        73 B
        159 B
        1
        1

        DNS Request

        203.151.224.20.in-addr.arpa

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s82510535.exe

        Filesize

        395KB

        MD5

        4d8cb05a084335e0f50ea9ce96287a36

        SHA1

        b3403c1038ae92f12cb97ba58627bc78c45630e7

        SHA256

        f6b722e9251db8f028cd97def3c8e8694b10953efd96abd3f1c39fc47eaf1b63

        SHA512

        3ae335bfc2f139760c4801bc726c83ce94bc511d853f4b8a6339bcd2702a70f095cca8be8e7656da467450aec3f3d6cc5e74c662ab4cf0d4b8c4da366aa7ff99

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s82510535.exe

        Filesize

        395KB

        MD5

        4d8cb05a084335e0f50ea9ce96287a36

        SHA1

        b3403c1038ae92f12cb97ba58627bc78c45630e7

        SHA256

        f6b722e9251db8f028cd97def3c8e8694b10953efd96abd3f1c39fc47eaf1b63

        SHA512

        3ae335bfc2f139760c4801bc726c83ce94bc511d853f4b8a6339bcd2702a70f095cca8be8e7656da467450aec3f3d6cc5e74c662ab4cf0d4b8c4da366aa7ff99

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y91978596.exe

        Filesize

        577KB

        MD5

        6f5292fc176a7f5c40cebfe6988f4523

        SHA1

        294b6e47e6f9ce47093b51d90fdde5b18037155e

        SHA256

        3c089ff1c92d8930123ab2ae435c7f319ea88808cc2c11a48ea6488b038fa70e

        SHA512

        946a15a57d616392ce8880814b1ad2c65a62b6a227b79a93aa44fc33825871e9f7b50b0bc930d681fda50c04eaa5256ab4901f8866e826a0796cd8936aa925e5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y91978596.exe

        Filesize

        577KB

        MD5

        6f5292fc176a7f5c40cebfe6988f4523

        SHA1

        294b6e47e6f9ce47093b51d90fdde5b18037155e

        SHA256

        3c089ff1c92d8930123ab2ae435c7f319ea88808cc2c11a48ea6488b038fa70e

        SHA512

        946a15a57d616392ce8880814b1ad2c65a62b6a227b79a93aa44fc33825871e9f7b50b0bc930d681fda50c04eaa5256ab4901f8866e826a0796cd8936aa925e5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p42816439.exe

        Filesize

        575KB

        MD5

        2cba3ace2ab6b5c80ac4ffb5570cf548

        SHA1

        34e392fdb111e2e5ecc1e5db42b105568c281141

        SHA256

        c8ebee2064c8f1d0beb5ce0e57cedb044d014e314d6665609bc92bea7927a184

        SHA512

        539d5255fd9be4df60a57be8d18fdb79c6f327a6a00203efb2a81e333524104361510dced18fc1bd309ac2970887383ec98f2d09982c70122240d09b80f811e8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p42816439.exe

        Filesize

        575KB

        MD5

        2cba3ace2ab6b5c80ac4ffb5570cf548

        SHA1

        34e392fdb111e2e5ecc1e5db42b105568c281141

        SHA256

        c8ebee2064c8f1d0beb5ce0e57cedb044d014e314d6665609bc92bea7927a184

        SHA512

        539d5255fd9be4df60a57be8d18fdb79c6f327a6a00203efb2a81e333524104361510dced18fc1bd309ac2970887383ec98f2d09982c70122240d09b80f811e8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r99304155.exe

        Filesize

        172KB

        MD5

        85a51ce72ae111efa7768eed479edf90

        SHA1

        0a0e03711c9ea219356d4e40e9b21282b97288bd

        SHA256

        14982ffa8f5dc1560f6aa0fcad907b2490d766d81c9b21f74e2ea0b337f133a5

        SHA512

        24cefeec0ae3623d02bac2f7d4cebac3e7529a67ec098b2bd46e6549a075d11fef38ea93dd541786281501e5f93ee968371799138e6fb237f2f44596f8781db7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r99304155.exe

        Filesize

        172KB

        MD5

        85a51ce72ae111efa7768eed479edf90

        SHA1

        0a0e03711c9ea219356d4e40e9b21282b97288bd

        SHA256

        14982ffa8f5dc1560f6aa0fcad907b2490d766d81c9b21f74e2ea0b337f133a5

        SHA512

        24cefeec0ae3623d02bac2f7d4cebac3e7529a67ec098b2bd46e6549a075d11fef38ea93dd541786281501e5f93ee968371799138e6fb237f2f44596f8781db7

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • memory/1008-2346-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/1008-2375-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/1008-2344-0x00000000005A0000-0x00000000005CD000-memory.dmp

        Filesize

        180KB

      • memory/1008-2380-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/1008-2345-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/1008-2378-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/1008-2377-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/2032-2337-0x0000000004C70000-0x0000000004CC0000-memory.dmp

        Filesize

        320KB

      • memory/2032-2336-0x000000000C130000-0x000000000C65C000-memory.dmp

        Filesize

        5.2MB

      • memory/2032-2335-0x000000000BA30000-0x000000000BBF2000-memory.dmp

        Filesize

        1.8MB

      • memory/2032-2334-0x0000000004C00000-0x0000000004C10000-memory.dmp

        Filesize

        64KB

      • memory/2032-2329-0x0000000004C00000-0x0000000004C10000-memory.dmp

        Filesize

        64KB

      • memory/2032-2328-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4160-2333-0x000000000B100000-0x000000000B166000-memory.dmp

        Filesize

        408KB

      • memory/4160-2330-0x0000000005030000-0x0000000005040000-memory.dmp

        Filesize

        64KB

      • memory/4160-2323-0x000000000A500000-0x000000000A53C000-memory.dmp

        Filesize

        240KB

      • memory/4160-2322-0x0000000005030000-0x0000000005040000-memory.dmp

        Filesize

        64KB

      • memory/4160-2321-0x0000000005000000-0x0000000005012000-memory.dmp

        Filesize

        72KB

      • memory/4160-2320-0x000000000A5D0000-0x000000000A6DA000-memory.dmp

        Filesize

        1.0MB

      • memory/4160-2318-0x000000000AAE0000-0x000000000B0F8000-memory.dmp

        Filesize

        6.1MB

      • memory/4160-2317-0x0000000000720000-0x000000000074E000-memory.dmp

        Filesize

        184KB

      • memory/4160-2331-0x000000000A800000-0x000000000A876000-memory.dmp

        Filesize

        472KB

      • memory/4160-2332-0x000000000A920000-0x000000000A9B2000-memory.dmp

        Filesize

        584KB

      • memory/4504-172-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-186-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-206-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-208-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-210-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-212-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-214-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-216-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-2120-0x0000000000840000-0x000000000089B000-memory.dmp

        Filesize

        364KB

      • memory/4504-2301-0x0000000002AC0000-0x0000000002AD0000-memory.dmp

        Filesize

        64KB

      • memory/4504-2302-0x0000000002AC0000-0x0000000002AD0000-memory.dmp

        Filesize

        64KB

      • memory/4504-2303-0x0000000002AC0000-0x0000000002AD0000-memory.dmp

        Filesize

        64KB

      • memory/4504-202-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-2312-0x0000000002AC0000-0x0000000002AD0000-memory.dmp

        Filesize

        64KB

      • memory/4504-200-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-198-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-196-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-194-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-192-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-190-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-188-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-204-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-184-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-182-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-180-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-178-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-174-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-176-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-170-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-166-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-168-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-164-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-162-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-160-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-158-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-156-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-154-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-153-0x0000000005640000-0x00000000056A0000-memory.dmp

        Filesize

        384KB

      • memory/4504-152-0x0000000002AC0000-0x0000000002AD0000-memory.dmp

        Filesize

        64KB

      • memory/4504-151-0x0000000002AC0000-0x0000000002AD0000-memory.dmp

        Filesize

        64KB

      • memory/4504-150-0x0000000002AC0000-0x0000000002AD0000-memory.dmp

        Filesize

        64KB

      • memory/4504-149-0x0000000005090000-0x0000000005634000-memory.dmp

        Filesize

        5.6MB

      • memory/4504-148-0x0000000000840000-0x000000000089B000-memory.dmp

        Filesize

        364KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.