Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    176s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 18:17

General

  • Target

    34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe

  • Size

    1.5MB

  • MD5

    c5498f7e797e3703f31249f2456c1068

  • SHA1

    59ced467de55f84bd0f695435ff215d74f780d72

  • SHA256

    34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8

  • SHA512

    80b5f4fe1524354e35dc484fb258ff8411bb0c6af21b3946dc7fb4c1a1521edb1059c8c639c87e2141ba7eeb267cf3ce35bbd4515707b4760e22c05ce204becc

  • SSDEEP

    24576:AyrgpjNc/i8n8qEUuPLy28B3EN28Rsd7f0UFG3a4YGBP8+1LmcLnAJAhN:Hg8jAUuPG/tEN28MfmYEPXqc8

Malware Config

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe
    "C:\Users\Admin\AppData\Local\Temp\34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7212107.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7212107.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6882549.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6882549.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9604762.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9604762.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1840
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2407895.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2407895.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4856
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9365779.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9365779.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2080
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 1052
                7⤵
                • Program crash
                PID:980
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1880626.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1880626.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1800
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7788247.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7788247.exe
            5⤵
            • Executes dropped EXE
            PID:2076
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 696
              6⤵
              • Program crash
              PID:2844
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 780
              6⤵
              • Program crash
              PID:4496
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2080 -ip 2080
    1⤵
      PID:4004
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2076 -ip 2076
      1⤵
        PID:1636
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2076 -ip 2076
        1⤵
          PID:3552

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7212107.exe

          Filesize

          1.4MB

          MD5

          56f0b12b09472bf19528f884a407e3f9

          SHA1

          a69ec36e53496aa5d2b821319ab1d57b98341797

          SHA256

          a560285af2241e3eaeeef70c1680464fa3aaf04fc31281435acd5112944b837c

          SHA512

          84aca1dca40675d6697f5e2a3dbc59272609144785fc0e8d67f756f809e206d441019e07acbc3398dbe3b9fb5e5bc2a611d89ab64bd77b959e82ad8976459be1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7212107.exe

          Filesize

          1.4MB

          MD5

          56f0b12b09472bf19528f884a407e3f9

          SHA1

          a69ec36e53496aa5d2b821319ab1d57b98341797

          SHA256

          a560285af2241e3eaeeef70c1680464fa3aaf04fc31281435acd5112944b837c

          SHA512

          84aca1dca40675d6697f5e2a3dbc59272609144785fc0e8d67f756f809e206d441019e07acbc3398dbe3b9fb5e5bc2a611d89ab64bd77b959e82ad8976459be1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6882549.exe

          Filesize

          912KB

          MD5

          1d4999c8ada1bc2bf14cb0189940264b

          SHA1

          c1c8689111298efb4ad34fb9fb22b648eaad95a8

          SHA256

          1448a5eb1955ae4006cfbf68ce5871cd65181dadde5335d191e7eaeb0a22b2c7

          SHA512

          25277a43a3afe2e59c817f5a6a9396f9158972f07559c22432600412bd0c2b89c2b772160193317b79a7d7e95b06d933f409f520270c92fac50e532fc077f0c8

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6882549.exe

          Filesize

          912KB

          MD5

          1d4999c8ada1bc2bf14cb0189940264b

          SHA1

          c1c8689111298efb4ad34fb9fb22b648eaad95a8

          SHA256

          1448a5eb1955ae4006cfbf68ce5871cd65181dadde5335d191e7eaeb0a22b2c7

          SHA512

          25277a43a3afe2e59c817f5a6a9396f9158972f07559c22432600412bd0c2b89c2b772160193317b79a7d7e95b06d933f409f520270c92fac50e532fc077f0c8

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9604762.exe

          Filesize

          708KB

          MD5

          1b07163d82fac2295f941384b41d09c7

          SHA1

          a1198f14bd1b9516ed3f6b14b06794cc8ebc52ed

          SHA256

          42b5985aa9c2063c8b9f778c38fedfcf80e01e50f67533a613a69cd8e24fa54c

          SHA512

          4fca2203fc074b163c3bb9c5bbe12bc113b0211929d292c64ee57f116e762bdcfad4c8a8807d969e1d1cd14a095cb940a7ef99b41e8c52163642a5dbfcba8913

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9604762.exe

          Filesize

          708KB

          MD5

          1b07163d82fac2295f941384b41d09c7

          SHA1

          a1198f14bd1b9516ed3f6b14b06794cc8ebc52ed

          SHA256

          42b5985aa9c2063c8b9f778c38fedfcf80e01e50f67533a613a69cd8e24fa54c

          SHA512

          4fca2203fc074b163c3bb9c5bbe12bc113b0211929d292c64ee57f116e762bdcfad4c8a8807d969e1d1cd14a095cb940a7ef99b41e8c52163642a5dbfcba8913

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7788247.exe

          Filesize

          340KB

          MD5

          9939987c76d1e99c47b8a4ff43a8c9a2

          SHA1

          a99a0eb5401c68c8985da32d4a198fc2a819838c

          SHA256

          efdebd3bbe060b47f617378264a9fe89d47f949af0ca90baa4730f1408a868ce

          SHA512

          7e10e3c585253fd17e44a75d359468c6b5b3b27ca6c33badbdf46f1ef59b571722fc1a8550635d7266e2a0e94d8b706b087290099d54657f3f5959dddaed7516

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7788247.exe

          Filesize

          340KB

          MD5

          9939987c76d1e99c47b8a4ff43a8c9a2

          SHA1

          a99a0eb5401c68c8985da32d4a198fc2a819838c

          SHA256

          efdebd3bbe060b47f617378264a9fe89d47f949af0ca90baa4730f1408a868ce

          SHA512

          7e10e3c585253fd17e44a75d359468c6b5b3b27ca6c33badbdf46f1ef59b571722fc1a8550635d7266e2a0e94d8b706b087290099d54657f3f5959dddaed7516

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2407895.exe

          Filesize

          417KB

          MD5

          879580ced09f1303c8a57341c1b40228

          SHA1

          62ebb8319b31eae40b5b1063672f15cf001d9185

          SHA256

          fe03cd9dc128abdea6f651391a1d2ec3ece92cef3f7edc393f2db0232fad2efe

          SHA512

          68e44a4f1b7725536c2110836f9daa0e34b12c6deff6205f933e2751356b9dae3ab498a9726ba06ca691b428c9153f169f6215c94e0025d92c990ae9c01bba5d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2407895.exe

          Filesize

          417KB

          MD5

          879580ced09f1303c8a57341c1b40228

          SHA1

          62ebb8319b31eae40b5b1063672f15cf001d9185

          SHA256

          fe03cd9dc128abdea6f651391a1d2ec3ece92cef3f7edc393f2db0232fad2efe

          SHA512

          68e44a4f1b7725536c2110836f9daa0e34b12c6deff6205f933e2751356b9dae3ab498a9726ba06ca691b428c9153f169f6215c94e0025d92c990ae9c01bba5d

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9365779.exe

          Filesize

          360KB

          MD5

          4b1d321a746599576a771f3b938d6c0c

          SHA1

          67399d167abd6ca480c702fd8b9af6583ae9dd57

          SHA256

          48d1c0a6af3e4cfd86df0eb1cb87a0db85afb99c6be4c2e1bdd7d9f98544a951

          SHA512

          6d14799700780fbd7add743b88c16601988fd1dcfcc5d3ea6a483bf0864227e028118735a7f6103684b57c9f4bcd690fc105e3f76cc44783ed0e69fd6651a718

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9365779.exe

          Filesize

          360KB

          MD5

          4b1d321a746599576a771f3b938d6c0c

          SHA1

          67399d167abd6ca480c702fd8b9af6583ae9dd57

          SHA256

          48d1c0a6af3e4cfd86df0eb1cb87a0db85afb99c6be4c2e1bdd7d9f98544a951

          SHA512

          6d14799700780fbd7add743b88c16601988fd1dcfcc5d3ea6a483bf0864227e028118735a7f6103684b57c9f4bcd690fc105e3f76cc44783ed0e69fd6651a718

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1880626.exe

          Filesize

          136KB

          MD5

          293ddadbaf173742b5515aee3bca1311

          SHA1

          8d9fb23352072c3d723c57608111a25233629965

          SHA256

          101960f6116c71c905a8d4d64675d1192e0193b6cce6db514da96c7dbf744ad8

          SHA512

          790b11661d2a9300942d3f632a954bfaf94b921c9b97e0e57b133443aacab05b3eb761c5696b7c952293309f0252eba99d8488f2fbdedb3e22097e83dd7c2c3b

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1880626.exe

          Filesize

          136KB

          MD5

          293ddadbaf173742b5515aee3bca1311

          SHA1

          8d9fb23352072c3d723c57608111a25233629965

          SHA256

          101960f6116c71c905a8d4d64675d1192e0193b6cce6db514da96c7dbf744ad8

          SHA512

          790b11661d2a9300942d3f632a954bfaf94b921c9b97e0e57b133443aacab05b3eb761c5696b7c952293309f0252eba99d8488f2fbdedb3e22097e83dd7c2c3b

        • memory/1800-229-0x0000000008220000-0x000000000823E000-memory.dmp

          Filesize

          120KB

        • memory/1800-222-0x0000000007500000-0x0000000007566000-memory.dmp

          Filesize

          408KB

        • memory/1800-227-0x0000000008CA0000-0x0000000008E62000-memory.dmp

          Filesize

          1.8MB

        • memory/1800-226-0x0000000008140000-0x00000000081B6000-memory.dmp

          Filesize

          472KB

        • memory/1800-225-0x0000000004C50000-0x0000000004CA0000-memory.dmp

          Filesize

          320KB

        • memory/1800-224-0x0000000007200000-0x0000000007210000-memory.dmp

          Filesize

          64KB

        • memory/1800-223-0x00000000080A0000-0x0000000008132000-memory.dmp

          Filesize

          584KB

        • memory/1800-228-0x00000000093A0000-0x00000000098CC000-memory.dmp

          Filesize

          5.2MB

        • memory/1800-221-0x0000000007200000-0x0000000007210000-memory.dmp

          Filesize

          64KB

        • memory/1800-220-0x00000000071C0000-0x00000000071FC000-memory.dmp

          Filesize

          240KB

        • memory/1800-219-0x0000000007290000-0x000000000739A000-memory.dmp

          Filesize

          1.0MB

        • memory/1800-218-0x0000000007160000-0x0000000007172000-memory.dmp

          Filesize

          72KB

        • memory/1800-217-0x00000000076C0000-0x0000000007CD8000-memory.dmp

          Filesize

          6.1MB

        • memory/1800-216-0x0000000000430000-0x0000000000458000-memory.dmp

          Filesize

          160KB

        • memory/2076-235-0x0000000002230000-0x0000000002265000-memory.dmp

          Filesize

          212KB

        • memory/2080-172-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

          Filesize

          64KB

        • memory/2080-200-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-202-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-204-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-208-0x0000000000400000-0x00000000006F4000-memory.dmp

          Filesize

          3.0MB

        • memory/2080-198-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-196-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-194-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-192-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-190-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-188-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-186-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-184-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-182-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-180-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-178-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-177-0x0000000002800000-0x0000000002812000-memory.dmp

          Filesize

          72KB

        • memory/2080-176-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

          Filesize

          64KB

        • memory/2080-175-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

          Filesize

          64KB

        • memory/2080-174-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

          Filesize

          64KB

        • memory/2080-173-0x0000000000400000-0x00000000006F4000-memory.dmp

          Filesize

          3.0MB

        • memory/2080-171-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

          Filesize

          64KB

        • memory/2080-170-0x0000000000960000-0x000000000098D000-memory.dmp

          Filesize

          180KB

        • memory/2080-169-0x0000000004EC0000-0x0000000005464000-memory.dmp

          Filesize

          5.6MB