Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 19:51

General

  • Target

    d5bcbf7a78cb04f57a934e02be485bba2c42e53e9f82ec44c88a1c8369b97baa.exe

  • Size

    930KB

  • MD5

    198488ccbd6bf1eb1e2627642659dfd1

  • SHA1

    5a2433a2ace450f461b301d8e3b14c44edaac8c9

  • SHA256

    d5bcbf7a78cb04f57a934e02be485bba2c42e53e9f82ec44c88a1c8369b97baa

  • SHA512

    c960031346f661955add5bd07f9b480a3fccba1feb6b2799113de31de0459e21f8bef8b8312b2a039b46ce346fc75c455f1f15dda479aa4bc0e3b0008f09d397

  • SSDEEP

    12288:ey90o5CSbqTYixb2gPny9W58Z/42fKOtNKEAFOO9ncxXaAmztd9ffBE0BpJC5yyg:eytXqNJbqJRBt8l9nchaL9REIZll

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5bcbf7a78cb04f57a934e02be485bba2c42e53e9f82ec44c88a1c8369b97baa.exe
    "C:\Users\Admin\AppData\Local\Temp\d5bcbf7a78cb04f57a934e02be485bba2c42e53e9f82ec44c88a1c8369b97baa.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st139521.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st139521.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68675793.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68675793.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:436
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp800960.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp800960.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr287846.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr287846.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:868

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr287846.exe

    Filesize

    168KB

    MD5

    16cf18c8ef1d4be89b36e27c8fb88e9d

    SHA1

    7811ba84f75a1adc6d995c2c1121ec996d1cc003

    SHA256

    116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

    SHA512

    4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr287846.exe

    Filesize

    168KB

    MD5

    16cf18c8ef1d4be89b36e27c8fb88e9d

    SHA1

    7811ba84f75a1adc6d995c2c1121ec996d1cc003

    SHA256

    116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

    SHA512

    4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st139521.exe

    Filesize

    777KB

    MD5

    1e000b19e66cc219ef86ab22a6138733

    SHA1

    26c2ee2b42531f3cf98a2ba496a7192a4b409eff

    SHA256

    5fc431c32cfaaea7a3f81697416096a3619c0cfbf45d87eb4cf9780d011c130d

    SHA512

    f731027ac4e898036bd9ada78f65312d0cf34d74c2be5565614d11d16f2397a734b8c243aa6f5dbd5a14cc6a88494171bc01f0d931a72304b418c426644132fb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st139521.exe

    Filesize

    777KB

    MD5

    1e000b19e66cc219ef86ab22a6138733

    SHA1

    26c2ee2b42531f3cf98a2ba496a7192a4b409eff

    SHA256

    5fc431c32cfaaea7a3f81697416096a3619c0cfbf45d87eb4cf9780d011c130d

    SHA512

    f731027ac4e898036bd9ada78f65312d0cf34d74c2be5565614d11d16f2397a734b8c243aa6f5dbd5a14cc6a88494171bc01f0d931a72304b418c426644132fb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68675793.exe

    Filesize

    299KB

    MD5

    77fed822d8705ba474bb9cc0e48ea8ee

    SHA1

    03eb75e2cebed09f554d6533eedf938a3bba75c6

    SHA256

    16376c564d6695ec93e6133af6bc561c82377cf997ed21fd3d8467284b09b846

    SHA512

    cc89e5f43e19f4d6cf8ec3f9208f05af48866696123424fa3c86ccc7064a5f5809379ee50d03fffabd0d89c8411727142b57745c539ac6c0e15385182cdda4e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68675793.exe

    Filesize

    299KB

    MD5

    77fed822d8705ba474bb9cc0e48ea8ee

    SHA1

    03eb75e2cebed09f554d6533eedf938a3bba75c6

    SHA256

    16376c564d6695ec93e6133af6bc561c82377cf997ed21fd3d8467284b09b846

    SHA512

    cc89e5f43e19f4d6cf8ec3f9208f05af48866696123424fa3c86ccc7064a5f5809379ee50d03fffabd0d89c8411727142b57745c539ac6c0e15385182cdda4e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp800960.exe

    Filesize

    589KB

    MD5

    759a1fc0c5de36cf21be294ddec2cce5

    SHA1

    73f7d7175b04385c72aa7e328b227491767c805a

    SHA256

    44d81cb98a5268cd36f552c7676f03c1a10680a01198782adc19ae6db67bc30a

    SHA512

    03d091e6b9fd455a44e4d20ece607157115765f82bba45747e616667150a77f719d91865fba7e08c4928ec4abfc17bb83e19f2eb8a2c30a11af2a07b1c5fb179

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp800960.exe

    Filesize

    589KB

    MD5

    759a1fc0c5de36cf21be294ddec2cce5

    SHA1

    73f7d7175b04385c72aa7e328b227491767c805a

    SHA256

    44d81cb98a5268cd36f552c7676f03c1a10680a01198782adc19ae6db67bc30a

    SHA512

    03d091e6b9fd455a44e4d20ece607157115765f82bba45747e616667150a77f719d91865fba7e08c4928ec4abfc17bb83e19f2eb8a2c30a11af2a07b1c5fb179

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp800960.exe

    Filesize

    589KB

    MD5

    759a1fc0c5de36cf21be294ddec2cce5

    SHA1

    73f7d7175b04385c72aa7e328b227491767c805a

    SHA256

    44d81cb98a5268cd36f552c7676f03c1a10680a01198782adc19ae6db67bc30a

    SHA512

    03d091e6b9fd455a44e4d20ece607157115765f82bba45747e616667150a77f719d91865fba7e08c4928ec4abfc17bb83e19f2eb8a2c30a11af2a07b1c5fb179

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr287846.exe

    Filesize

    168KB

    MD5

    16cf18c8ef1d4be89b36e27c8fb88e9d

    SHA1

    7811ba84f75a1adc6d995c2c1121ec996d1cc003

    SHA256

    116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

    SHA512

    4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr287846.exe

    Filesize

    168KB

    MD5

    16cf18c8ef1d4be89b36e27c8fb88e9d

    SHA1

    7811ba84f75a1adc6d995c2c1121ec996d1cc003

    SHA256

    116156cc3af0bf4d81d9b2fba83c569cf9f4c9055b9c9cd5731538de036417e8

    SHA512

    4cb9e29db63d28c802c7c1799fd53e00b5facdc0b63d08b76d619c7a9be6cc06f11c0d435ad035bf3f9c3c96687e03e5157ae2ce7494a621c0762bc8083d9fbd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st139521.exe

    Filesize

    777KB

    MD5

    1e000b19e66cc219ef86ab22a6138733

    SHA1

    26c2ee2b42531f3cf98a2ba496a7192a4b409eff

    SHA256

    5fc431c32cfaaea7a3f81697416096a3619c0cfbf45d87eb4cf9780d011c130d

    SHA512

    f731027ac4e898036bd9ada78f65312d0cf34d74c2be5565614d11d16f2397a734b8c243aa6f5dbd5a14cc6a88494171bc01f0d931a72304b418c426644132fb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\st139521.exe

    Filesize

    777KB

    MD5

    1e000b19e66cc219ef86ab22a6138733

    SHA1

    26c2ee2b42531f3cf98a2ba496a7192a4b409eff

    SHA256

    5fc431c32cfaaea7a3f81697416096a3619c0cfbf45d87eb4cf9780d011c130d

    SHA512

    f731027ac4e898036bd9ada78f65312d0cf34d74c2be5565614d11d16f2397a734b8c243aa6f5dbd5a14cc6a88494171bc01f0d931a72304b418c426644132fb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\68675793.exe

    Filesize

    299KB

    MD5

    77fed822d8705ba474bb9cc0e48ea8ee

    SHA1

    03eb75e2cebed09f554d6533eedf938a3bba75c6

    SHA256

    16376c564d6695ec93e6133af6bc561c82377cf997ed21fd3d8467284b09b846

    SHA512

    cc89e5f43e19f4d6cf8ec3f9208f05af48866696123424fa3c86ccc7064a5f5809379ee50d03fffabd0d89c8411727142b57745c539ac6c0e15385182cdda4e4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\68675793.exe

    Filesize

    299KB

    MD5

    77fed822d8705ba474bb9cc0e48ea8ee

    SHA1

    03eb75e2cebed09f554d6533eedf938a3bba75c6

    SHA256

    16376c564d6695ec93e6133af6bc561c82377cf997ed21fd3d8467284b09b846

    SHA512

    cc89e5f43e19f4d6cf8ec3f9208f05af48866696123424fa3c86ccc7064a5f5809379ee50d03fffabd0d89c8411727142b57745c539ac6c0e15385182cdda4e4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp800960.exe

    Filesize

    589KB

    MD5

    759a1fc0c5de36cf21be294ddec2cce5

    SHA1

    73f7d7175b04385c72aa7e328b227491767c805a

    SHA256

    44d81cb98a5268cd36f552c7676f03c1a10680a01198782adc19ae6db67bc30a

    SHA512

    03d091e6b9fd455a44e4d20ece607157115765f82bba45747e616667150a77f719d91865fba7e08c4928ec4abfc17bb83e19f2eb8a2c30a11af2a07b1c5fb179

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp800960.exe

    Filesize

    589KB

    MD5

    759a1fc0c5de36cf21be294ddec2cce5

    SHA1

    73f7d7175b04385c72aa7e328b227491767c805a

    SHA256

    44d81cb98a5268cd36f552c7676f03c1a10680a01198782adc19ae6db67bc30a

    SHA512

    03d091e6b9fd455a44e4d20ece607157115765f82bba45747e616667150a77f719d91865fba7e08c4928ec4abfc17bb83e19f2eb8a2c30a11af2a07b1c5fb179

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\kp800960.exe

    Filesize

    589KB

    MD5

    759a1fc0c5de36cf21be294ddec2cce5

    SHA1

    73f7d7175b04385c72aa7e328b227491767c805a

    SHA256

    44d81cb98a5268cd36f552c7676f03c1a10680a01198782adc19ae6db67bc30a

    SHA512

    03d091e6b9fd455a44e4d20ece607157115765f82bba45747e616667150a77f719d91865fba7e08c4928ec4abfc17bb83e19f2eb8a2c30a11af2a07b1c5fb179

  • \Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/436-93-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-2207-0x00000000004A0000-0x00000000004AA000-memory.dmp

    Filesize

    40KB

  • memory/436-109-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-115-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-117-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-121-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-125-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-123-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-119-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-113-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-111-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-105-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-99-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-127-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-131-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-133-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-135-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-139-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-141-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-137-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-129-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-97-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-91-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-87-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-2206-0x0000000002520000-0x0000000002560000-memory.dmp

    Filesize

    256KB

  • memory/436-107-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-103-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-101-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-95-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-89-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-85-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-83-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-81-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-79-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-78-0x0000000004980000-0x00000000049D1000-memory.dmp

    Filesize

    324KB

  • memory/436-74-0x0000000002490000-0x00000000024E8000-memory.dmp

    Filesize

    352KB

  • memory/436-75-0x0000000004980000-0x00000000049D6000-memory.dmp

    Filesize

    344KB

  • memory/436-77-0x0000000002520000-0x0000000002560000-memory.dmp

    Filesize

    256KB

  • memory/436-76-0x0000000002520000-0x0000000002560000-memory.dmp

    Filesize

    256KB

  • memory/868-4386-0x0000000000B70000-0x0000000000BA0000-memory.dmp

    Filesize

    192KB

  • memory/868-4387-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/868-4388-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/868-4389-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/1660-2420-0x0000000002920000-0x0000000002960000-memory.dmp

    Filesize

    256KB

  • memory/1660-2419-0x0000000000940000-0x000000000099B000-memory.dmp

    Filesize

    364KB

  • memory/1660-4376-0x0000000002750000-0x0000000002782000-memory.dmp

    Filesize

    200KB

  • memory/1660-4377-0x0000000002920000-0x0000000002960000-memory.dmp

    Filesize

    256KB

  • memory/1660-2421-0x0000000002920000-0x0000000002960000-memory.dmp

    Filesize

    256KB

  • memory/1660-2226-0x0000000004F10000-0x0000000004F76000-memory.dmp

    Filesize

    408KB

  • memory/1660-2225-0x0000000004EA0000-0x0000000004F08000-memory.dmp

    Filesize

    416KB

  • memory/1936-2223-0x0000000000CF0000-0x0000000000CFA000-memory.dmp

    Filesize

    40KB