Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 19:02

General

  • Target

    ec87c7283fbb91fe817d744ec9259b5c00c1f33f57956e90e772de307adc1736.exe

  • Size

    864KB

  • MD5

    5e65c7e1507aa3913b25c28ecaeda200

  • SHA1

    1e23dd144ca411681049f5af45009ed7188e299d

  • SHA256

    ec87c7283fbb91fe817d744ec9259b5c00c1f33f57956e90e772de307adc1736

  • SHA512

    cfab0605606d3c47b2815f149e237fbd7e918753ce3668e6ac312389d2325ca29e20b0694a80440cf6cb9dd48ff79a5473a62f7fab61f8b82a9cc9027195405c

  • SSDEEP

    24576:myekVHws4Kma2UNXJ3E0mEbEqm+N2DV7:1ekVQslxzXmpciV

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec87c7283fbb91fe817d744ec9259b5c00c1f33f57956e90e772de307adc1736.exe
    "C:\Users\Admin\AppData\Local\Temp\ec87c7283fbb91fe817d744ec9259b5c00c1f33f57956e90e772de307adc1736.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y78028717.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y78028717.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p73435598.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p73435598.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2136
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3388
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 1384
          4⤵
          • Program crash
          PID:3116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r01652227.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r01652227.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s37826935.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s37826935.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1140
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 1080
        3⤵
        • Program crash
        PID:4160
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2136 -ip 2136
    1⤵
      PID:2168
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 1140 -ip 1140
      1⤵
        PID:1628

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s37826935.exe

        Filesize

        395KB

        MD5

        6041b04497b23c3ca6afb3e5cf2f9c45

        SHA1

        a51726ca09b615227053ca0bed191686080f329f

        SHA256

        02993be6d7fbcd02f1b1b864002872620373c62258c334dece037f9d7273350a

        SHA512

        0061f8d462d09360b8ba1ce9971f600a0830637d5f5d4fdb49661318411d904ecf09848c1a4235987ebfe55326d721315b3a472f1eb385746352d3e2d40cf47d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s37826935.exe

        Filesize

        395KB

        MD5

        6041b04497b23c3ca6afb3e5cf2f9c45

        SHA1

        a51726ca09b615227053ca0bed191686080f329f

        SHA256

        02993be6d7fbcd02f1b1b864002872620373c62258c334dece037f9d7273350a

        SHA512

        0061f8d462d09360b8ba1ce9971f600a0830637d5f5d4fdb49661318411d904ecf09848c1a4235987ebfe55326d721315b3a472f1eb385746352d3e2d40cf47d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y78028717.exe

        Filesize

        577KB

        MD5

        fe229b6e9bf234d7e9f34572de52bd10

        SHA1

        2e3cbfa18de488d18d4e49011e7c67198faf41d6

        SHA256

        d3e4a370b68cd42d9fba30ff11ec75c6a00e77ec812c433459f34eaa839e10cf

        SHA512

        10562f94773b520f5a1687728bd142e389b004646606daa8d84796bb9b916773704b60904488089fa3604ce845245d0ac7512f951eaffb6d29527657cb5bf847

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y78028717.exe

        Filesize

        577KB

        MD5

        fe229b6e9bf234d7e9f34572de52bd10

        SHA1

        2e3cbfa18de488d18d4e49011e7c67198faf41d6

        SHA256

        d3e4a370b68cd42d9fba30ff11ec75c6a00e77ec812c433459f34eaa839e10cf

        SHA512

        10562f94773b520f5a1687728bd142e389b004646606daa8d84796bb9b916773704b60904488089fa3604ce845245d0ac7512f951eaffb6d29527657cb5bf847

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p73435598.exe

        Filesize

        574KB

        MD5

        affa711a29008c734f21044d240baf6f

        SHA1

        2eb3b3dd0a228d71a2a94cc94929e661e9879c6b

        SHA256

        ecaf0797d2a0d210a2199ff705a77a4392fe1041a84817229f04ad49ceee973d

        SHA512

        70ae4246b2f6b3d875a6ffb4f45a038fc63e21311813bc62006dcccaf822c2eb06c6f2cfbd8a7265b7b6deec86f2a96ef8edccd2dc2238f459a987fb43f967b2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p73435598.exe

        Filesize

        574KB

        MD5

        affa711a29008c734f21044d240baf6f

        SHA1

        2eb3b3dd0a228d71a2a94cc94929e661e9879c6b

        SHA256

        ecaf0797d2a0d210a2199ff705a77a4392fe1041a84817229f04ad49ceee973d

        SHA512

        70ae4246b2f6b3d875a6ffb4f45a038fc63e21311813bc62006dcccaf822c2eb06c6f2cfbd8a7265b7b6deec86f2a96ef8edccd2dc2238f459a987fb43f967b2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r01652227.exe

        Filesize

        171KB

        MD5

        db90f2673efc20210a5a22dbc8089103

        SHA1

        af888d87596c52df672a66904972407403b20eb3

        SHA256

        a1933638f69fcf3154a596ab61c6b6a418bd82759e20996b01bc89671de2fec5

        SHA512

        898c068fe9ba9c348e23e792335ec3e81845c0048b89e9a8b95b31c75799224887259097f37586c6cf78605c158497830c81e67235e6285a6d0b06136ef42ef9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r01652227.exe

        Filesize

        171KB

        MD5

        db90f2673efc20210a5a22dbc8089103

        SHA1

        af888d87596c52df672a66904972407403b20eb3

        SHA256

        a1933638f69fcf3154a596ab61c6b6a418bd82759e20996b01bc89671de2fec5

        SHA512

        898c068fe9ba9c348e23e792335ec3e81845c0048b89e9a8b95b31c75799224887259097f37586c6cf78605c158497830c81e67235e6285a6d0b06136ef42ef9

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • C:\Windows\Temp\1.exe

        Filesize

        168KB

        MD5

        f16fb63d4e551d3808e8f01f2671b57e

        SHA1

        781153ad6235a1152da112de1fb39a6f2d063575

        SHA256

        8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

        SHA512

        fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

      • memory/1140-2382-0x0000000004C50000-0x0000000004C60000-memory.dmp

        Filesize

        64KB

      • memory/1140-2375-0x00000000005A0000-0x00000000005CD000-memory.dmp

        Filesize

        180KB

      • memory/1140-2376-0x0000000004C50000-0x0000000004C60000-memory.dmp

        Filesize

        64KB

      • memory/1140-2377-0x0000000004C50000-0x0000000004C60000-memory.dmp

        Filesize

        64KB

      • memory/1140-2378-0x0000000004C50000-0x0000000004C60000-memory.dmp

        Filesize

        64KB

      • memory/1140-2380-0x0000000004C50000-0x0000000004C60000-memory.dmp

        Filesize

        64KB

      • memory/1140-2381-0x0000000004C50000-0x0000000004C60000-memory.dmp

        Filesize

        64KB

      • memory/2136-174-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-170-0x0000000000840000-0x000000000089B000-memory.dmp

        Filesize

        364KB

      • memory/2136-176-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/2136-177-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-173-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/2136-179-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-181-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-183-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-185-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-187-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-189-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-191-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-193-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-195-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-197-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-199-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-201-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-203-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-205-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-207-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-209-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-211-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-213-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-215-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-2301-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/2136-2302-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/2136-2303-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/2136-2305-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/2136-172-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/2136-169-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-167-0x0000000000400000-0x0000000000835000-memory.dmp

        Filesize

        4.2MB

      • memory/2136-148-0x0000000004ED0000-0x0000000005474000-memory.dmp

        Filesize

        5.6MB

      • memory/2136-149-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-150-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-152-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-154-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-2323-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/2136-156-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-158-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-166-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-164-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-160-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2136-162-0x00000000054E0000-0x0000000005540000-memory.dmp

        Filesize

        384KB

      • memory/2404-2332-0x0000000000A70000-0x0000000000AA0000-memory.dmp

        Filesize

        192KB

      • memory/2404-2339-0x000000000C7F0000-0x000000000CD1C000-memory.dmp

        Filesize

        5.2MB

      • memory/2404-2333-0x00000000052F0000-0x0000000005300000-memory.dmp

        Filesize

        64KB

      • memory/2404-2337-0x00000000052F0000-0x0000000005300000-memory.dmp

        Filesize

        64KB

      • memory/2404-2338-0x000000000C0F0000-0x000000000C2B2000-memory.dmp

        Filesize

        1.8MB

      • memory/3388-2326-0x0000000005950000-0x0000000005960000-memory.dmp

        Filesize

        64KB

      • memory/3388-2335-0x0000000005DA0000-0x0000000005E32000-memory.dmp

        Filesize

        584KB

      • memory/3388-2340-0x0000000006910000-0x0000000006960000-memory.dmp

        Filesize

        320KB

      • memory/3388-2334-0x0000000005D20000-0x0000000005D96000-memory.dmp

        Filesize

        472KB

      • memory/3388-2336-0x0000000005F40000-0x0000000005FA6000-memory.dmp

        Filesize

        408KB

      • memory/3388-2325-0x0000000005AE0000-0x0000000005B1C000-memory.dmp

        Filesize

        240KB

      • memory/3388-2322-0x0000000005950000-0x0000000005960000-memory.dmp

        Filesize

        64KB

      • memory/3388-2321-0x0000000005A80000-0x0000000005A92000-memory.dmp

        Filesize

        72KB

      • memory/3388-2320-0x0000000005B70000-0x0000000005C7A000-memory.dmp

        Filesize

        1.0MB

      • memory/3388-2319-0x0000000006080000-0x0000000006698000-memory.dmp

        Filesize

        6.1MB

      • memory/3388-2318-0x0000000000FF0000-0x000000000101E000-memory.dmp

        Filesize

        184KB