Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 20:15

General

  • Target

    e88c37f1bb15fcbe857ee8c4d526153f.exe

  • Size

    1.9MB

  • MD5

    e88c37f1bb15fcbe857ee8c4d526153f

  • SHA1

    c52537d8b02f5c9c9ea40f78a7e2c9f8dc78225b

  • SHA256

    9fbc398697579871e9ed351b5874acacb8b435178b32ff6506a03e5738b2e75f

  • SHA512

    8065ee3b4fd2130549f016c5accb5f8347812b2b0cf6cc97bf712e6b34d30d3dd893dbcf250db60bd0d17550e36462dce4d3ae33858007af2e19e7ad71e44164

  • SSDEEP

    49152:IBJ/2XAf/cdSy4ihSiudHKWw7YYlMDFUjcgbeR:ywXI0c5icLKJEYlIFicWe

Malware Config

Extracted

Family

redline

Botnet

RED

C2

79.137.202.0:81

Attributes
  • auth_value

    49e32ec54afd3f75dadad05dbf2e524f

Extracted

Family

laplas

C2

http://79.137.199.252

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe
    "C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:2484
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 136
          3⤵
          • Program crash
          PID:2308
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3860
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
            PID:3060
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 148
            3⤵
            • Program crash
            PID:2436
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4488
          • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
            "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
            3⤵
            • Executes dropped EXE
            PID:4392
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2172 -ip 2172
        1⤵
          PID:1848
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3860 -ip 3860
          1⤵
            PID:3880

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

            Filesize

            1.3MB

            MD5

            3681076e0468f402f6a12e9d586c24b1

            SHA1

            92d9039e76ad9166b00d38100994f86ad712818d

            SHA256

            e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

            SHA512

            5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

            Filesize

            1.3MB

            MD5

            3681076e0468f402f6a12e9d586c24b1

            SHA1

            92d9039e76ad9166b00d38100994f86ad712818d

            SHA256

            e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

            SHA512

            5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

            Filesize

            1.3MB

            MD5

            3681076e0468f402f6a12e9d586c24b1

            SHA1

            92d9039e76ad9166b00d38100994f86ad712818d

            SHA256

            e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

            SHA512

            5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

            Filesize

            1.1MB

            MD5

            a76d136239408f63bf5b2af3d4dffc0e

            SHA1

            7434e0882f2825ba265f69db57e1117a4375636a

            SHA256

            c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

            SHA512

            189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

            Filesize

            1.1MB

            MD5

            a76d136239408f63bf5b2af3d4dffc0e

            SHA1

            7434e0882f2825ba265f69db57e1117a4375636a

            SHA256

            c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

            SHA512

            189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

            Filesize

            1.1MB

            MD5

            a76d136239408f63bf5b2af3d4dffc0e

            SHA1

            7434e0882f2825ba265f69db57e1117a4375636a

            SHA256

            c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

            SHA512

            189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

            Filesize

            3.6MB

            MD5

            9acf9c7921ee24285901751af52097b0

            SHA1

            0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

            SHA256

            98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

            SHA512

            7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

            Filesize

            3.6MB

            MD5

            9acf9c7921ee24285901751af52097b0

            SHA1

            0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

            SHA256

            98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

            SHA512

            7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

            Filesize

            3.6MB

            MD5

            9acf9c7921ee24285901751af52097b0

            SHA1

            0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

            SHA256

            98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

            SHA512

            7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

          • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

            Filesize

            462.1MB

            MD5

            2a3ca83488bc6de31b0cbc5e95e452a7

            SHA1

            58c1d67f69d94be896b2e2b52f58f454f1b867ec

            SHA256

            62c8604b847753087cc98d59b997c2e2503ed509994c3129f24b5d709c487768

            SHA512

            2748f6aa4f368b45809f4c25d1283089a476cf1573e755fca8c6f9bad4931f8de63f008dbcbfd1ca42b2b7f06ddafe2c0a591c7451e9f9a68c91c6b514f19008

          • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

            Filesize

            461.8MB

            MD5

            0caf438b1dea5cb0db50e19cf79899a4

            SHA1

            c7218b75eb308f24e0e6780e43c34561ce6f1c65

            SHA256

            8c342cf798a515ed0245ed9781a17a9451287a7ac83d54ba019071d7daf793e2

            SHA512

            58f0e667eb5e391162c7417d2e3bc9102acd431c2ee72c04772ceac1f11f5c441c37478a7d9523189114ce3a3552363e5f64b4a17c15a87a89e95323e1f62cca

          • memory/2484-161-0x0000000004B90000-0x0000000004BCC000-memory.dmp

            Filesize

            240KB

          • memory/2484-162-0x0000000004AF0000-0x0000000004B00000-memory.dmp

            Filesize

            64KB

          • memory/2484-160-0x0000000004B30000-0x0000000004B42000-memory.dmp

            Filesize

            72KB

          • memory/2484-158-0x0000000004C10000-0x0000000004D1A000-memory.dmp

            Filesize

            1.0MB

          • memory/2484-429-0x0000000004AF0000-0x0000000004B00000-memory.dmp

            Filesize

            64KB

          • memory/2484-156-0x0000000005120000-0x0000000005738000-memory.dmp

            Filesize

            6.1MB

          • memory/2484-146-0x0000000000170000-0x000000000019E000-memory.dmp

            Filesize

            184KB

          • memory/3060-163-0x0000000000400000-0x000000000056C000-memory.dmp

            Filesize

            1.4MB

          • memory/3060-182-0x0000000000400000-0x000000000056C000-memory.dmp

            Filesize

            1.4MB

          • memory/3060-183-0x0000000000400000-0x000000000056C000-memory.dmp

            Filesize

            1.4MB

          • memory/3060-184-0x0000000000400000-0x000000000056C000-memory.dmp

            Filesize

            1.4MB

          • memory/3060-186-0x0000000000400000-0x000000000056C000-memory.dmp

            Filesize

            1.4MB