Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 18:21

General

  • Target

    4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe

  • Size

    1.4MB

  • MD5

    f123219c68b39a1151a8d00d893f3d63

  • SHA1

    b55b25fb0ac9c3b4fcfc2bcb2c6f1124a90af3fc

  • SHA256

    4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012

  • SHA512

    c923b826ee9055c8255580244a305aa6b7de59d2c25f5c05de225fd421e045d65c8adeab4363cd7d72f3bae720e5d63fd5ae22f1467345ad12301bbfe2de68da

  • SSDEEP

    24576:Ly/npwKqOKalPvePftrXHlSdZovNsl5fbMX9GP/NIB/vpKd8iE8jE1k:+hlktrXHlSEv+kX98Nb8irjE

Malware Config

Extracted

Family

redline

Botnet

mask

C2

217.196.96.56:4138

Attributes
  • auth_value

    31aef25be0febb8e491794ef7f502c50

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe
    "C:\Users\Admin\AppData\Local\Temp\4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3704053.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3704053.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1980960.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1980960.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5915740.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5915740.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1444
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0168013.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0168013.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:32
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4791648.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4791648.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2264
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 1084
                7⤵
                • Program crash
                PID:4480
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0686800.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0686800.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2900
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1955619.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1955619.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            PID:4176
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 696
              6⤵
              • Program crash
              PID:3424
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 780
              6⤵
              • Program crash
              PID:536
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 800
              6⤵
              • Program crash
              PID:4188
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 960
              6⤵
              • Program crash
              PID:2760
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 980
              6⤵
              • Program crash
              PID:2180
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 980
              6⤵
              • Program crash
              PID:400
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 1224
              6⤵
              • Program crash
              PID:3432
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 1260
              6⤵
              • Program crash
              PID:3008
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 1288
              6⤵
              • Program crash
              PID:4808
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 1336
              6⤵
              • Program crash
              PID:4704
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2264 -ip 2264
    1⤵
      PID:1580
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4176 -ip 4176
      1⤵
        PID:4836
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4176 -ip 4176
        1⤵
          PID:3156
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4176 -ip 4176
          1⤵
            PID:3844
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4176 -ip 4176
            1⤵
              PID:2700
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4176 -ip 4176
              1⤵
                PID:1164
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4176 -ip 4176
                1⤵
                  PID:3376
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4176 -ip 4176
                  1⤵
                    PID:4732
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4176 -ip 4176
                    1⤵
                      PID:3048
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4176 -ip 4176
                      1⤵
                        PID:1848
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4176 -ip 4176
                        1⤵
                          PID:4816

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3704053.exe

                          Filesize

                          1.3MB

                          MD5

                          1bfdb8edf8aa32969b6be42189a8c8df

                          SHA1

                          b799ef112a6e89014e37f442060a96504908bd3a

                          SHA256

                          4c858ae3c1b7c3f39bf518a0e04996cd37164fb47c19ddfadcc7174da4021031

                          SHA512

                          b4b644e5697e6a78e8e3428205088a2dc6316d8f0838abda89ce5f585840beac8b4fd7c30ece474c5b6a35a86c0123c6b57e652e4c8661a301db064a77d07180

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3704053.exe

                          Filesize

                          1.3MB

                          MD5

                          1bfdb8edf8aa32969b6be42189a8c8df

                          SHA1

                          b799ef112a6e89014e37f442060a96504908bd3a

                          SHA256

                          4c858ae3c1b7c3f39bf518a0e04996cd37164fb47c19ddfadcc7174da4021031

                          SHA512

                          b4b644e5697e6a78e8e3428205088a2dc6316d8f0838abda89ce5f585840beac8b4fd7c30ece474c5b6a35a86c0123c6b57e652e4c8661a301db064a77d07180

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1980960.exe

                          Filesize

                          845KB

                          MD5

                          c1644ec1446dffbdcd6fd551a5bbf3af

                          SHA1

                          25385019a143b99b2489674acff7132abc45e1f6

                          SHA256

                          dc42c2ad19ef6a247e448759e6de0f53acc9548fef1cfed9c8e3f77a9447daa6

                          SHA512

                          6127d39ac57445ee7c9b533f38f0ee52377aaf46d10ceb9e791a8f7e78d40cc9994ea87e2eba1a8c4cf1d48227fc4cdf9d561553d7a969476711b50b24e21949

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1980960.exe

                          Filesize

                          845KB

                          MD5

                          c1644ec1446dffbdcd6fd551a5bbf3af

                          SHA1

                          25385019a143b99b2489674acff7132abc45e1f6

                          SHA256

                          dc42c2ad19ef6a247e448759e6de0f53acc9548fef1cfed9c8e3f77a9447daa6

                          SHA512

                          6127d39ac57445ee7c9b533f38f0ee52377aaf46d10ceb9e791a8f7e78d40cc9994ea87e2eba1a8c4cf1d48227fc4cdf9d561553d7a969476711b50b24e21949

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5915740.exe

                          Filesize

                          641KB

                          MD5

                          a0761a87fd898c089ecd9e6e0916c0d9

                          SHA1

                          3909f71a0aae0bfe859e7705d3b1ac3aee999d8e

                          SHA256

                          111c3fb60284f144913e7f545cb2c0f034d886d7466b40f9e635137be03d8599

                          SHA512

                          a72b495cb1a8db47043db2cae6b7a59ccd726deba5ceff51cc71c9d30d68090b873c7ba90e84bfb7873ddd9ca72eb61f0868b83a9040525004a4939617bbd21a

                        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5915740.exe

                          Filesize

                          641KB

                          MD5

                          a0761a87fd898c089ecd9e6e0916c0d9

                          SHA1

                          3909f71a0aae0bfe859e7705d3b1ac3aee999d8e

                          SHA256

                          111c3fb60284f144913e7f545cb2c0f034d886d7466b40f9e635137be03d8599

                          SHA512

                          a72b495cb1a8db47043db2cae6b7a59ccd726deba5ceff51cc71c9d30d68090b873c7ba90e84bfb7873ddd9ca72eb61f0868b83a9040525004a4939617bbd21a

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1955619.exe

                          Filesize

                          268KB

                          MD5

                          4ecd78a69c30031bc8e9e5eda6ccf6ab

                          SHA1

                          edf1a592d01921bc108010b81f2a611c1fd1b9cb

                          SHA256

                          50f8f51f7c6d869be8329f771acf547126e04e1fbc80c9f110830d96202b3521

                          SHA512

                          23a12853d76410295ad81afb405f8ed2bd39393d3b49bf7d46a43faf1ead744f398ff7d7e8c630f7259d5d1512ced596f57160f01774f12e546337066e421b87

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1955619.exe

                          Filesize

                          268KB

                          MD5

                          4ecd78a69c30031bc8e9e5eda6ccf6ab

                          SHA1

                          edf1a592d01921bc108010b81f2a611c1fd1b9cb

                          SHA256

                          50f8f51f7c6d869be8329f771acf547126e04e1fbc80c9f110830d96202b3521

                          SHA512

                          23a12853d76410295ad81afb405f8ed2bd39393d3b49bf7d46a43faf1ead744f398ff7d7e8c630f7259d5d1512ced596f57160f01774f12e546337066e421b87

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0168013.exe

                          Filesize

                          383KB

                          MD5

                          c83e3da0dd44ad02374698199ae9ed10

                          SHA1

                          50178e325e4536132ff35b1f476f6e21b1c079da

                          SHA256

                          6b8cfc47f80ce52b78060a108e30996a58dd96ba1d33580301221e2ae7814b1b

                          SHA512

                          5d534b3e34d94dca5d75fc93c01520caf22008b9d6221f365d19dd7b6d9718a4642ad23538fe2e8aa426d3e5761823d0c8c4cea28254e0b4ffe92552aece2af8

                        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0168013.exe

                          Filesize

                          383KB

                          MD5

                          c83e3da0dd44ad02374698199ae9ed10

                          SHA1

                          50178e325e4536132ff35b1f476f6e21b1c079da

                          SHA256

                          6b8cfc47f80ce52b78060a108e30996a58dd96ba1d33580301221e2ae7814b1b

                          SHA512

                          5d534b3e34d94dca5d75fc93c01520caf22008b9d6221f365d19dd7b6d9718a4642ad23538fe2e8aa426d3e5761823d0c8c4cea28254e0b4ffe92552aece2af8

                        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4791648.exe

                          Filesize

                          289KB

                          MD5

                          0ba4c6db747a8c107cb4b7d52dd62739

                          SHA1

                          bd34aabba4c1bdeee0b781e458f209309fc8eb55

                          SHA256

                          cba1b269d954637caffd046a11f0ffedcda85d92ff0a39a9703e5d5a2700d58a

                          SHA512

                          ede615bd3c293c142b3f413bf18fee35dd32f4ffb771817ceff769b9051c653e222f13b7baaf822873f7e6a8686b08725da142f1631d7196d70b18fcc98c14d6

                        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4791648.exe

                          Filesize

                          289KB

                          MD5

                          0ba4c6db747a8c107cb4b7d52dd62739

                          SHA1

                          bd34aabba4c1bdeee0b781e458f209309fc8eb55

                          SHA256

                          cba1b269d954637caffd046a11f0ffedcda85d92ff0a39a9703e5d5a2700d58a

                          SHA512

                          ede615bd3c293c142b3f413bf18fee35dd32f4ffb771817ceff769b9051c653e222f13b7baaf822873f7e6a8686b08725da142f1631d7196d70b18fcc98c14d6

                        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0686800.exe

                          Filesize

                          168KB

                          MD5

                          931c1824844f1fe2d32fbaffdf8ec048

                          SHA1

                          8e9ad49785cc6ba9c1b530e07dc0f15f3efb8cb8

                          SHA256

                          76eeb90f7ec3929072019a6cd58a57faa20d95f963b5db28a29baf8d3010a75c

                          SHA512

                          11bb518b82fcbeceb18efe42550e93cf4a064c84000344de6838c6d00818688bd30e482a7dc01badaaf7bd43fb41dc884c10a534f4ed873ef344bbf0cc0701cd

                        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0686800.exe

                          Filesize

                          168KB

                          MD5

                          931c1824844f1fe2d32fbaffdf8ec048

                          SHA1

                          8e9ad49785cc6ba9c1b530e07dc0f15f3efb8cb8

                          SHA256

                          76eeb90f7ec3929072019a6cd58a57faa20d95f963b5db28a29baf8d3010a75c

                          SHA512

                          11bb518b82fcbeceb18efe42550e93cf4a064c84000344de6838c6d00818688bd30e482a7dc01badaaf7bd43fb41dc884c10a534f4ed873ef344bbf0cc0701cd

                        • memory/2264-169-0x0000000000480000-0x00000000004AD000-memory.dmp

                          Filesize

                          180KB

                        • memory/2264-170-0x0000000002370000-0x0000000002380000-memory.dmp

                          Filesize

                          64KB

                        • memory/2264-172-0x0000000004A70000-0x0000000005014000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/2264-171-0x0000000002370000-0x0000000002380000-memory.dmp

                          Filesize

                          64KB

                        • memory/2264-173-0x0000000002370000-0x0000000002380000-memory.dmp

                          Filesize

                          64KB

                        • memory/2264-174-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-175-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-177-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-179-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-181-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-183-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-191-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-193-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-189-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-187-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-185-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-197-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-195-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-199-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-201-0x0000000002350000-0x0000000002362000-memory.dmp

                          Filesize

                          72KB

                        • memory/2264-202-0x0000000000400000-0x000000000047F000-memory.dmp

                          Filesize

                          508KB

                        • memory/2264-203-0x0000000002370000-0x0000000002380000-memory.dmp

                          Filesize

                          64KB

                        • memory/2264-204-0x0000000002370000-0x0000000002380000-memory.dmp

                          Filesize

                          64KB

                        • memory/2264-207-0x0000000000400000-0x000000000047F000-memory.dmp

                          Filesize

                          508KB

                        • memory/2900-213-0x0000000000740000-0x0000000000770000-memory.dmp

                          Filesize

                          192KB

                        • memory/2900-214-0x000000000ABE0000-0x000000000B1F8000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/2900-215-0x000000000A6D0000-0x000000000A7DA000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/2900-216-0x000000000A5F0000-0x000000000A602000-memory.dmp

                          Filesize

                          72KB

                        • memory/2900-217-0x000000000A650000-0x000000000A68C000-memory.dmp

                          Filesize

                          240KB

                        • memory/2900-218-0x0000000005030000-0x0000000005040000-memory.dmp

                          Filesize

                          64KB

                        • memory/2900-219-0x000000000A960000-0x000000000A9D6000-memory.dmp

                          Filesize

                          472KB

                        • memory/2900-220-0x000000000AA80000-0x000000000AB12000-memory.dmp

                          Filesize

                          584KB

                        • memory/2900-221-0x000000000AB20000-0x000000000AB86000-memory.dmp

                          Filesize

                          408KB

                        • memory/2900-222-0x000000000BE60000-0x000000000C022000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/2900-223-0x000000000C560000-0x000000000CA8C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/2900-224-0x0000000005030000-0x0000000005040000-memory.dmp

                          Filesize

                          64KB

                        • memory/2900-225-0x000000000B770000-0x000000000B7C0000-memory.dmp

                          Filesize

                          320KB

                        • memory/4176-231-0x00000000007A0000-0x00000000007D5000-memory.dmp

                          Filesize

                          212KB

                        • memory/4176-232-0x0000000000400000-0x00000000006C4000-memory.dmp

                          Filesize

                          2.8MB

                        • memory/4176-233-0x00000000007A0000-0x00000000007D5000-memory.dmp

                          Filesize

                          212KB