Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 20:15

General

  • Target

    e88c37f1bb15fcbe857ee8c4d526153f.exe

  • Size

    1.9MB

  • MD5

    e88c37f1bb15fcbe857ee8c4d526153f

  • SHA1

    c52537d8b02f5c9c9ea40f78a7e2c9f8dc78225b

  • SHA256

    9fbc398697579871e9ed351b5874acacb8b435178b32ff6506a03e5738b2e75f

  • SHA512

    8065ee3b4fd2130549f016c5accb5f8347812b2b0cf6cc97bf712e6b34d30d3dd893dbcf250db60bd0d17550e36462dce4d3ae33858007af2e19e7ad71e44164

  • SSDEEP

    49152:IBJ/2XAf/cdSy4ihSiudHKWw7YYlMDFUjcgbeR:ywXI0c5icLKJEYlIFicWe

Malware Config

Extracted

Family

redline

Botnet

RED

C2

79.137.202.0:81

Attributes
  • auth_value

    49e32ec54afd3f75dadad05dbf2e524f

Extracted

Family

laplas

C2

http://79.137.199.252

Attributes
  • api_key

    ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe
    "C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:4692
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 152
          3⤵
          • Program crash
          PID:5072
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1092
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
            PID:2260
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            3⤵
              PID:1824
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 156
              3⤵
              • Program crash
              PID:1544
          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3908
            • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe
              "C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"
              3⤵
              • Executes dropped EXE
              PID:5340
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1120 -ip 1120
          1⤵
            PID:1268
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1092 -ip 1092
            1⤵
              PID:1192

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

              Filesize

              1.3MB

              MD5

              3681076e0468f402f6a12e9d586c24b1

              SHA1

              92d9039e76ad9166b00d38100994f86ad712818d

              SHA256

              e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

              SHA512

              5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

              Filesize

              1.3MB

              MD5

              3681076e0468f402f6a12e9d586c24b1

              SHA1

              92d9039e76ad9166b00d38100994f86ad712818d

              SHA256

              e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

              SHA512

              5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe

              Filesize

              1.3MB

              MD5

              3681076e0468f402f6a12e9d586c24b1

              SHA1

              92d9039e76ad9166b00d38100994f86ad712818d

              SHA256

              e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f

              SHA512

              5615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

              Filesize

              1.1MB

              MD5

              a76d136239408f63bf5b2af3d4dffc0e

              SHA1

              7434e0882f2825ba265f69db57e1117a4375636a

              SHA256

              c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

              SHA512

              189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

              Filesize

              1.1MB

              MD5

              a76d136239408f63bf5b2af3d4dffc0e

              SHA1

              7434e0882f2825ba265f69db57e1117a4375636a

              SHA256

              c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

              SHA512

              189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe

              Filesize

              1.1MB

              MD5

              a76d136239408f63bf5b2af3d4dffc0e

              SHA1

              7434e0882f2825ba265f69db57e1117a4375636a

              SHA256

              c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf

              SHA512

              189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

              Filesize

              3.6MB

              MD5

              9acf9c7921ee24285901751af52097b0

              SHA1

              0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

              SHA256

              98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

              SHA512

              7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

              Filesize

              3.6MB

              MD5

              9acf9c7921ee24285901751af52097b0

              SHA1

              0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

              SHA256

              98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

              SHA512

              7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe

              Filesize

              3.6MB

              MD5

              9acf9c7921ee24285901751af52097b0

              SHA1

              0e6725a2fdc4e1f1bbf6a73f46393cbba4552e12

              SHA256

              98c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c

              SHA512

              7f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792

            • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

              Filesize

              232.8MB

              MD5

              16303743319d448e79bc35e286f6f8fe

              SHA1

              3bdaac141e2c26e20ab9396ee4d8ecf216cdb138

              SHA256

              d74581250aec4a720bf4d1ab1de4cff9178d56924a0ea0962d3b31d6b9f6cf87

              SHA512

              a84f160106a41c9b7d90324e5738cda1f2ae6f0c335db0a33c56366ee3732345e57fde11dd2d2014dca4cf9c43e026df6ec3cbb9bae8d228b4acb10b03229808

            • C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe

              Filesize

              239.4MB

              MD5

              469487ecbb03484802dd016d2830fa65

              SHA1

              b06ecd645c66febf9718e37f8aab935b83ad3895

              SHA256

              aa3fda536f24449197d37447fdd194039e1ce6ffbb59c99f5557467b64b84382

              SHA512

              585ea8c2753e4189a1a2057bdf63d6808e2482ab612c6e5809fbd22e28c4e13ed85f33ef60b2a37a45813445ee23666b2b54255a7a80f37ef16bdbed29928f87

            • memory/1824-184-0x0000000000400000-0x000000000056C000-memory.dmp

              Filesize

              1.4MB

            • memory/1824-163-0x0000000000400000-0x000000000056C000-memory.dmp

              Filesize

              1.4MB

            • memory/1824-182-0x0000000000400000-0x000000000056C000-memory.dmp

              Filesize

              1.4MB

            • memory/1824-183-0x0000000000400000-0x000000000056C000-memory.dmp

              Filesize

              1.4MB

            • memory/1824-186-0x0000000000400000-0x000000000056C000-memory.dmp

              Filesize

              1.4MB

            • memory/4692-162-0x000000000ACC0000-0x000000000ACFC000-memory.dmp

              Filesize

              240KB

            • memory/4692-161-0x0000000005760000-0x0000000005770000-memory.dmp

              Filesize

              64KB

            • memory/4692-160-0x000000000AC60000-0x000000000AC72000-memory.dmp

              Filesize

              72KB

            • memory/4692-159-0x000000000AD30000-0x000000000AE3A000-memory.dmp

              Filesize

              1.0MB

            • memory/4692-363-0x0000000005760000-0x0000000005770000-memory.dmp

              Filesize

              64KB

            • memory/4692-158-0x000000000B210000-0x000000000B828000-memory.dmp

              Filesize

              6.1MB

            • memory/4692-146-0x0000000000400000-0x000000000042E000-memory.dmp

              Filesize

              184KB