Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/05/2023, 19:43

General

  • Target

    a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe

  • Size

    1.5MB

  • MD5

    026e949b0db5fadce263eb51d76a10ab

  • SHA1

    989ecc966a598275fd2e97ed19ad8386b6eda4e4

  • SHA256

    a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1

  • SHA512

    d753bcfc4292cf67e6947155f892813b776b03642e498da1da463116fa2d0b1608e0710213cd169422353ff61f4fab320c418a03dd202615cf1ad057c52d42cc

  • SSDEEP

    24576:IyBKtnl/cPT4B7+gRkZO/Ms4aWzNpMrq6fTSgHP4OEH9JbkE8/081Bo8:PB6/PIhZOks4Orq6fZHPsd9e1S

Malware Config

Extracted

Family

redline

Botnet

mask

C2

217.196.96.56:4138

Attributes
  • auth_value

    31aef25be0febb8e491794ef7f502c50

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe
    "C:\Users\Admin\AppData\Local\Temp\a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3298723.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3298723.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6756129.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6756129.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4024
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0053009.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0053009.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3904
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9707106.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9707106.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4884
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1349782.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1349782.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1536
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0539529.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0539529.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1072
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0574220.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0574220.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            PID:3680
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 624
              6⤵
              • Program crash
              PID:3696
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 704
              6⤵
              • Program crash
              PID:2588
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 844
              6⤵
              • Program crash
              PID:3268
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 852
              6⤵
              • Program crash
              PID:4432
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 880
              6⤵
              • Program crash
              PID:4668
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 816
              6⤵
              • Program crash
              PID:4408
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 1192
              6⤵
              • Program crash
              PID:3212
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 1132
              6⤵
              • Program crash
              PID:3392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3298723.exe

    Filesize

    1.3MB

    MD5

    2344b8dcad0f5f153ef4285a0392065e

    SHA1

    890a7d44b20dce41de59b4812e319d5a7a0556f2

    SHA256

    a52beb0a0a9afcb92f0678c52803cb79713d25b0a58bcf8909f2773e3c14434f

    SHA512

    28d27c67ab93bd98e13225243d04cf21fc0dc0fc387682bf8cd69ae801c705bd7dd2a3f9d927bc600fcbb46019062c925a37209991ab701e063346c413031458

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3298723.exe

    Filesize

    1.3MB

    MD5

    2344b8dcad0f5f153ef4285a0392065e

    SHA1

    890a7d44b20dce41de59b4812e319d5a7a0556f2

    SHA256

    a52beb0a0a9afcb92f0678c52803cb79713d25b0a58bcf8909f2773e3c14434f

    SHA512

    28d27c67ab93bd98e13225243d04cf21fc0dc0fc387682bf8cd69ae801c705bd7dd2a3f9d927bc600fcbb46019062c925a37209991ab701e063346c413031458

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6756129.exe

    Filesize

    850KB

    MD5

    40cd944a508be23879b0ac9249159b36

    SHA1

    b28fa0c5bb763641cd5740be136280db2f97755a

    SHA256

    dcd3ae66dea737ab235670c70921a6f654ddb2e721532541063df6c4a217706d

    SHA512

    a1926b8b823d779c3aad643cbd3c6f2e7c4061a05ed5e989dd3edcf6d434363c28d8e391c1daeefb881886f4fb35c07123a32249be3dc5f81bdc64a39339e73e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6756129.exe

    Filesize

    850KB

    MD5

    40cd944a508be23879b0ac9249159b36

    SHA1

    b28fa0c5bb763641cd5740be136280db2f97755a

    SHA256

    dcd3ae66dea737ab235670c70921a6f654ddb2e721532541063df6c4a217706d

    SHA512

    a1926b8b823d779c3aad643cbd3c6f2e7c4061a05ed5e989dd3edcf6d434363c28d8e391c1daeefb881886f4fb35c07123a32249be3dc5f81bdc64a39339e73e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0053009.exe

    Filesize

    646KB

    MD5

    b66d32de14847639c000ed8206cb8f67

    SHA1

    0c75290b25ad47d255ed483b463533e21769aba5

    SHA256

    b60ce8bd221634e294b1ad587353527b35d071d0e65b280ea437a50944f0b04c

    SHA512

    044f368d2d71fb871250bb6d80749f117b713cc6164bc850849c0d740e75e75c301d86e14366942e2b25709c2c89f43c43689825975cd3d7b559a95265b0f1ce

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0053009.exe

    Filesize

    646KB

    MD5

    b66d32de14847639c000ed8206cb8f67

    SHA1

    0c75290b25ad47d255ed483b463533e21769aba5

    SHA256

    b60ce8bd221634e294b1ad587353527b35d071d0e65b280ea437a50944f0b04c

    SHA512

    044f368d2d71fb871250bb6d80749f117b713cc6164bc850849c0d740e75e75c301d86e14366942e2b25709c2c89f43c43689825975cd3d7b559a95265b0f1ce

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0574220.exe

    Filesize

    271KB

    MD5

    d1a02ccd3a45a8f7106a1c146764fc06

    SHA1

    41cfc736195d826bc8336b156f586eb2c1994f61

    SHA256

    eb86c484461d6e955ec57e2c7e22716e8e990422962bb02ac5f631350deea296

    SHA512

    b15e3ae3323ac2a9c1d43b714b9c44ec50781ed8388af852d34e65eba4fd6f62a302af26cc0b557923582e2a4d797617428f834ae89d41126574604face393b9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0574220.exe

    Filesize

    271KB

    MD5

    d1a02ccd3a45a8f7106a1c146764fc06

    SHA1

    41cfc736195d826bc8336b156f586eb2c1994f61

    SHA256

    eb86c484461d6e955ec57e2c7e22716e8e990422962bb02ac5f631350deea296

    SHA512

    b15e3ae3323ac2a9c1d43b714b9c44ec50781ed8388af852d34e65eba4fd6f62a302af26cc0b557923582e2a4d797617428f834ae89d41126574604face393b9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9707106.exe

    Filesize

    385KB

    MD5

    3928688c105941112442b5d9954ca248

    SHA1

    3fac2c4efcf02be699fbfd80a4d763d40bf62328

    SHA256

    76aa936cc99a5a6f8dd3471a7a3b79f9bc2671907cea2768a3ca580af6aa7fb5

    SHA512

    3554060eb865135b30c4800753f1f51f2ae5e0b85499c39f85fb3bfb224016e910e4d94dcdc669c69011aa6a4ec6691347b68020be9247a24c9e3520dad485f4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9707106.exe

    Filesize

    385KB

    MD5

    3928688c105941112442b5d9954ca248

    SHA1

    3fac2c4efcf02be699fbfd80a4d763d40bf62328

    SHA256

    76aa936cc99a5a6f8dd3471a7a3b79f9bc2671907cea2768a3ca580af6aa7fb5

    SHA512

    3554060eb865135b30c4800753f1f51f2ae5e0b85499c39f85fb3bfb224016e910e4d94dcdc669c69011aa6a4ec6691347b68020be9247a24c9e3520dad485f4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1349782.exe

    Filesize

    292KB

    MD5

    89c6816c14ad634d01ea0b1ace48ae1b

    SHA1

    6ea59669d69b433ce89d07f233b423d062fd190c

    SHA256

    f30a4c8b4527f450f3f70cd7e82c28639cebf1328fbbb1ef10c7bedcedec6869

    SHA512

    382750cefaf2a9565dd12507ba97204dc46f19a106bce5d42fb2eb6e18c48a6128aa87701f35e7212d2a9edde19d7cb300c2bfef5ee43de08bee89573375eef2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1349782.exe

    Filesize

    292KB

    MD5

    89c6816c14ad634d01ea0b1ace48ae1b

    SHA1

    6ea59669d69b433ce89d07f233b423d062fd190c

    SHA256

    f30a4c8b4527f450f3f70cd7e82c28639cebf1328fbbb1ef10c7bedcedec6869

    SHA512

    382750cefaf2a9565dd12507ba97204dc46f19a106bce5d42fb2eb6e18c48a6128aa87701f35e7212d2a9edde19d7cb300c2bfef5ee43de08bee89573375eef2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0539529.exe

    Filesize

    168KB

    MD5

    e241b9b7a8009875390a57ad156b4573

    SHA1

    8c773d2189529f4dd849bfeb5448e18131805c65

    SHA256

    11642350708839de1d89048bd13c03554c412b73caf0307dae7bc5e8b57cb1fe

    SHA512

    2e03ba76d9e9e815279a1fcd8336379d4c207ea90f93101453fca673b6f7cb938bdbeab70d8f1aac59fd45331a1e3fba997d5cc005784a4ef7066253cec7adad

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0539529.exe

    Filesize

    168KB

    MD5

    e241b9b7a8009875390a57ad156b4573

    SHA1

    8c773d2189529f4dd849bfeb5448e18131805c65

    SHA256

    11642350708839de1d89048bd13c03554c412b73caf0307dae7bc5e8b57cb1fe

    SHA512

    2e03ba76d9e9e815279a1fcd8336379d4c207ea90f93101453fca673b6f7cb938bdbeab70d8f1aac59fd45331a1e3fba997d5cc005784a4ef7066253cec7adad

  • memory/1072-207-0x00000000061E0000-0x0000000006230000-memory.dmp

    Filesize

    320KB

  • memory/1072-200-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/1072-205-0x0000000005FA0000-0x0000000006162000-memory.dmp

    Filesize

    1.8MB

  • memory/1072-204-0x0000000005010000-0x0000000005076000-memory.dmp

    Filesize

    408KB

  • memory/1072-203-0x00000000050B0000-0x0000000005142000-memory.dmp

    Filesize

    584KB

  • memory/1072-202-0x0000000004F90000-0x0000000005006000-memory.dmp

    Filesize

    472KB

  • memory/1072-201-0x0000000004CE0000-0x0000000004D2B000-memory.dmp

    Filesize

    300KB

  • memory/1072-206-0x0000000008020000-0x000000000854C000-memory.dmp

    Filesize

    5.2MB

  • memory/1072-199-0x0000000004CA0000-0x0000000004CDE000-memory.dmp

    Filesize

    248KB

  • memory/1072-198-0x0000000004C00000-0x0000000004C12000-memory.dmp

    Filesize

    72KB

  • memory/1072-197-0x0000000004DB0000-0x0000000004EBA000-memory.dmp

    Filesize

    1.0MB

  • memory/1072-196-0x00000000052B0000-0x00000000058B6000-memory.dmp

    Filesize

    6.0MB

  • memory/1072-195-0x00000000023F0000-0x00000000023F6000-memory.dmp

    Filesize

    24KB

  • memory/1072-194-0x0000000000300000-0x0000000000330000-memory.dmp

    Filesize

    192KB

  • memory/1072-208-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/1536-156-0x0000000002560000-0x0000000002578000-memory.dmp

    Filesize

    96KB

  • memory/1536-186-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/1536-187-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/1536-188-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1536-190-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/1536-185-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/1536-184-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-182-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-180-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-178-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-176-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-174-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-172-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-170-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-168-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-166-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-164-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-162-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-157-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-160-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-158-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1536-155-0x0000000004A00000-0x0000000004EFE000-memory.dmp

    Filesize

    5.0MB

  • memory/1536-154-0x0000000001F90000-0x0000000001FAA000-memory.dmp

    Filesize

    104KB

  • memory/1536-153-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3680-214-0x00000000007A0000-0x00000000007D5000-memory.dmp

    Filesize

    212KB

  • memory/3680-215-0x0000000000400000-0x00000000006C4000-memory.dmp

    Filesize

    2.8MB