Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:09

General

  • Target

    5ef554cd0a345bfbb66252fb2b288b802d5801a26ed5723484cea2f3e352e308.exe

  • Size

    934KB

  • MD5

    cf092e69e5f17a7774c5657dd8836498

  • SHA1

    c1360e88789e4a1dbbb6ee9d296e887b4a0e3058

  • SHA256

    5ef554cd0a345bfbb66252fb2b288b802d5801a26ed5723484cea2f3e352e308

  • SHA512

    bb213ec308688fce3c588c04fe5969ffc8e5f79cd36fd192be39775d075d4196179947f943e4b0b6076b442e9abbe3997a05568dc219eee7de8dda13bf47ca16

  • SSDEEP

    24576:OyXac2I1j+aRbZYLh3gmo5ZJUKcFKRP/qk6grpe:dXac2cSWbGN3gvmKRv6Cp

Malware Config

Extracted

Family

redline

Botnet

dark

C2

185.161.248.73:4164

Attributes
  • auth_value

    ae85b01f66afe8770afeed560513fc2d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ef554cd0a345bfbb66252fb2b288b802d5801a26ed5723484cea2f3e352e308.exe
    "C:\Users\Admin\AppData\Local\Temp\5ef554cd0a345bfbb66252fb2b288b802d5801a26ed5723484cea2f3e352e308.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un284175.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un284175.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30481235.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30481235.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk020596.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk020596.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si301946.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si301946.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:872

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si301946.exe

    Filesize

    169KB

    MD5

    400941f6934007ec890b831238967801

    SHA1

    83cef0bb3258d21ee99a6948a50b9aaee324e3ff

    SHA256

    412d9a716c6d9a1901984722314f8c14bf214691d54722564b1b11fe9affced0

    SHA512

    5d97a450ee5c7d2a0501973349cd1bdc00d564ba5f6451d1dff83792379a25f1f09459e9db71c59d19f410c5a52cc3ef9100387df48e766d97a12a535fa83c4a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si301946.exe

    Filesize

    169KB

    MD5

    400941f6934007ec890b831238967801

    SHA1

    83cef0bb3258d21ee99a6948a50b9aaee324e3ff

    SHA256

    412d9a716c6d9a1901984722314f8c14bf214691d54722564b1b11fe9affced0

    SHA512

    5d97a450ee5c7d2a0501973349cd1bdc00d564ba5f6451d1dff83792379a25f1f09459e9db71c59d19f410c5a52cc3ef9100387df48e766d97a12a535fa83c4a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un284175.exe

    Filesize

    781KB

    MD5

    c072a1634564318c9a9265f7b054da70

    SHA1

    a48fcb452d7b2dbd9bbfb3c3d5e47929e1a51920

    SHA256

    85f244c03b1b21333252d0f6bc191a3f9a4901a3405a357fc8781552a4365416

    SHA512

    f7c6c356b9a6dcd805dd8db10a4ffe4fd94dbad61474fb96f276fc80d33f9eff9df14c396c0dead8af5aea57a56c6261fc6cbc2f70dac38719e4e31ea02ff13e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un284175.exe

    Filesize

    781KB

    MD5

    c072a1634564318c9a9265f7b054da70

    SHA1

    a48fcb452d7b2dbd9bbfb3c3d5e47929e1a51920

    SHA256

    85f244c03b1b21333252d0f6bc191a3f9a4901a3405a357fc8781552a4365416

    SHA512

    f7c6c356b9a6dcd805dd8db10a4ffe4fd94dbad61474fb96f276fc80d33f9eff9df14c396c0dead8af5aea57a56c6261fc6cbc2f70dac38719e4e31ea02ff13e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30481235.exe

    Filesize

    522KB

    MD5

    485b1a4c0e4b3d48233a9110471c8d5b

    SHA1

    a1be1561d107c9882ec8dc5cdd741c5b89f1dced

    SHA256

    68228360a5b3eaedf54b7b317b03c8892d737cc4acce31df6d2f808fd68ccd46

    SHA512

    502bfdd15dfcb7b9c22e973d03a1202ddd4cc5f2c6e05202cb85725a9b5ba29e0fcf4103788db8304b585af77d4335b4d7487e073dc94e66ef86f1827a276a8d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30481235.exe

    Filesize

    522KB

    MD5

    485b1a4c0e4b3d48233a9110471c8d5b

    SHA1

    a1be1561d107c9882ec8dc5cdd741c5b89f1dced

    SHA256

    68228360a5b3eaedf54b7b317b03c8892d737cc4acce31df6d2f808fd68ccd46

    SHA512

    502bfdd15dfcb7b9c22e973d03a1202ddd4cc5f2c6e05202cb85725a9b5ba29e0fcf4103788db8304b585af77d4335b4d7487e073dc94e66ef86f1827a276a8d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\30481235.exe

    Filesize

    522KB

    MD5

    485b1a4c0e4b3d48233a9110471c8d5b

    SHA1

    a1be1561d107c9882ec8dc5cdd741c5b89f1dced

    SHA256

    68228360a5b3eaedf54b7b317b03c8892d737cc4acce31df6d2f808fd68ccd46

    SHA512

    502bfdd15dfcb7b9c22e973d03a1202ddd4cc5f2c6e05202cb85725a9b5ba29e0fcf4103788db8304b585af77d4335b4d7487e073dc94e66ef86f1827a276a8d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk020596.exe

    Filesize

    581KB

    MD5

    8397a13bd513fa6f71f86b07f867b728

    SHA1

    bc72529c464cce00decfefb64f6570e1cffd699b

    SHA256

    61de9c85e3c4b19536afb1f4de4cb452289bd30dfb548c47da55702f3bc37b73

    SHA512

    0a0678e428f34db3e48dde5ab522000df9ef36380f2fbfec11671a34105fef65288386746985c3b780a783f52c9ab93b5c24f6e96c467febea684a7ba47a55c1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk020596.exe

    Filesize

    581KB

    MD5

    8397a13bd513fa6f71f86b07f867b728

    SHA1

    bc72529c464cce00decfefb64f6570e1cffd699b

    SHA256

    61de9c85e3c4b19536afb1f4de4cb452289bd30dfb548c47da55702f3bc37b73

    SHA512

    0a0678e428f34db3e48dde5ab522000df9ef36380f2fbfec11671a34105fef65288386746985c3b780a783f52c9ab93b5c24f6e96c467febea684a7ba47a55c1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk020596.exe

    Filesize

    581KB

    MD5

    8397a13bd513fa6f71f86b07f867b728

    SHA1

    bc72529c464cce00decfefb64f6570e1cffd699b

    SHA256

    61de9c85e3c4b19536afb1f4de4cb452289bd30dfb548c47da55702f3bc37b73

    SHA512

    0a0678e428f34db3e48dde5ab522000df9ef36380f2fbfec11671a34105fef65288386746985c3b780a783f52c9ab93b5c24f6e96c467febea684a7ba47a55c1

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si301946.exe

    Filesize

    169KB

    MD5

    400941f6934007ec890b831238967801

    SHA1

    83cef0bb3258d21ee99a6948a50b9aaee324e3ff

    SHA256

    412d9a716c6d9a1901984722314f8c14bf214691d54722564b1b11fe9affced0

    SHA512

    5d97a450ee5c7d2a0501973349cd1bdc00d564ba5f6451d1dff83792379a25f1f09459e9db71c59d19f410c5a52cc3ef9100387df48e766d97a12a535fa83c4a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si301946.exe

    Filesize

    169KB

    MD5

    400941f6934007ec890b831238967801

    SHA1

    83cef0bb3258d21ee99a6948a50b9aaee324e3ff

    SHA256

    412d9a716c6d9a1901984722314f8c14bf214691d54722564b1b11fe9affced0

    SHA512

    5d97a450ee5c7d2a0501973349cd1bdc00d564ba5f6451d1dff83792379a25f1f09459e9db71c59d19f410c5a52cc3ef9100387df48e766d97a12a535fa83c4a

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un284175.exe

    Filesize

    781KB

    MD5

    c072a1634564318c9a9265f7b054da70

    SHA1

    a48fcb452d7b2dbd9bbfb3c3d5e47929e1a51920

    SHA256

    85f244c03b1b21333252d0f6bc191a3f9a4901a3405a357fc8781552a4365416

    SHA512

    f7c6c356b9a6dcd805dd8db10a4ffe4fd94dbad61474fb96f276fc80d33f9eff9df14c396c0dead8af5aea57a56c6261fc6cbc2f70dac38719e4e31ea02ff13e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un284175.exe

    Filesize

    781KB

    MD5

    c072a1634564318c9a9265f7b054da70

    SHA1

    a48fcb452d7b2dbd9bbfb3c3d5e47929e1a51920

    SHA256

    85f244c03b1b21333252d0f6bc191a3f9a4901a3405a357fc8781552a4365416

    SHA512

    f7c6c356b9a6dcd805dd8db10a4ffe4fd94dbad61474fb96f276fc80d33f9eff9df14c396c0dead8af5aea57a56c6261fc6cbc2f70dac38719e4e31ea02ff13e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\30481235.exe

    Filesize

    522KB

    MD5

    485b1a4c0e4b3d48233a9110471c8d5b

    SHA1

    a1be1561d107c9882ec8dc5cdd741c5b89f1dced

    SHA256

    68228360a5b3eaedf54b7b317b03c8892d737cc4acce31df6d2f808fd68ccd46

    SHA512

    502bfdd15dfcb7b9c22e973d03a1202ddd4cc5f2c6e05202cb85725a9b5ba29e0fcf4103788db8304b585af77d4335b4d7487e073dc94e66ef86f1827a276a8d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\30481235.exe

    Filesize

    522KB

    MD5

    485b1a4c0e4b3d48233a9110471c8d5b

    SHA1

    a1be1561d107c9882ec8dc5cdd741c5b89f1dced

    SHA256

    68228360a5b3eaedf54b7b317b03c8892d737cc4acce31df6d2f808fd68ccd46

    SHA512

    502bfdd15dfcb7b9c22e973d03a1202ddd4cc5f2c6e05202cb85725a9b5ba29e0fcf4103788db8304b585af77d4335b4d7487e073dc94e66ef86f1827a276a8d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\30481235.exe

    Filesize

    522KB

    MD5

    485b1a4c0e4b3d48233a9110471c8d5b

    SHA1

    a1be1561d107c9882ec8dc5cdd741c5b89f1dced

    SHA256

    68228360a5b3eaedf54b7b317b03c8892d737cc4acce31df6d2f808fd68ccd46

    SHA512

    502bfdd15dfcb7b9c22e973d03a1202ddd4cc5f2c6e05202cb85725a9b5ba29e0fcf4103788db8304b585af77d4335b4d7487e073dc94e66ef86f1827a276a8d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk020596.exe

    Filesize

    581KB

    MD5

    8397a13bd513fa6f71f86b07f867b728

    SHA1

    bc72529c464cce00decfefb64f6570e1cffd699b

    SHA256

    61de9c85e3c4b19536afb1f4de4cb452289bd30dfb548c47da55702f3bc37b73

    SHA512

    0a0678e428f34db3e48dde5ab522000df9ef36380f2fbfec11671a34105fef65288386746985c3b780a783f52c9ab93b5c24f6e96c467febea684a7ba47a55c1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk020596.exe

    Filesize

    581KB

    MD5

    8397a13bd513fa6f71f86b07f867b728

    SHA1

    bc72529c464cce00decfefb64f6570e1cffd699b

    SHA256

    61de9c85e3c4b19536afb1f4de4cb452289bd30dfb548c47da55702f3bc37b73

    SHA512

    0a0678e428f34db3e48dde5ab522000df9ef36380f2fbfec11671a34105fef65288386746985c3b780a783f52c9ab93b5c24f6e96c467febea684a7ba47a55c1

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\rk020596.exe

    Filesize

    581KB

    MD5

    8397a13bd513fa6f71f86b07f867b728

    SHA1

    bc72529c464cce00decfefb64f6570e1cffd699b

    SHA256

    61de9c85e3c4b19536afb1f4de4cb452289bd30dfb548c47da55702f3bc37b73

    SHA512

    0a0678e428f34db3e48dde5ab522000df9ef36380f2fbfec11671a34105fef65288386746985c3b780a783f52c9ab93b5c24f6e96c467febea684a7ba47a55c1

  • \Windows\Temp\1.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/392-4387-0x0000000000920000-0x000000000092A000-memory.dmp

    Filesize

    40KB

  • memory/872-4396-0x0000000001360000-0x0000000001390000-memory.dmp

    Filesize

    192KB

  • memory/872-4397-0x0000000000460000-0x0000000000466000-memory.dmp

    Filesize

    24KB

  • memory/872-4398-0x0000000001100000-0x0000000001140000-memory.dmp

    Filesize

    256KB

  • memory/872-4399-0x0000000001100000-0x0000000001140000-memory.dmp

    Filesize

    256KB

  • memory/1608-91-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-109-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-117-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-115-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-119-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-125-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-123-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-121-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-127-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-129-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-131-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-133-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-137-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-135-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-139-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-141-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-143-0x0000000000260000-0x00000000002AC000-memory.dmp

    Filesize

    304KB

  • memory/1608-145-0x0000000004BE0000-0x0000000004C20000-memory.dmp

    Filesize

    256KB

  • memory/1608-144-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-147-0x0000000004BE0000-0x0000000004C20000-memory.dmp

    Filesize

    256KB

  • memory/1608-149-0x0000000004BE0000-0x0000000004C20000-memory.dmp

    Filesize

    256KB

  • memory/1608-2213-0x0000000004BE0000-0x0000000004C20000-memory.dmp

    Filesize

    256KB

  • memory/1608-2215-0x0000000004BD0000-0x0000000004BDA000-memory.dmp

    Filesize

    40KB

  • memory/1608-111-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-2219-0x0000000004BE0000-0x0000000004C20000-memory.dmp

    Filesize

    256KB

  • memory/1608-113-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-107-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-103-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-105-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-101-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-99-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-97-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-78-0x0000000004D20000-0x0000000004D78000-memory.dmp

    Filesize

    352KB

  • memory/1608-79-0x0000000004D80000-0x0000000004DD6000-memory.dmp

    Filesize

    344KB

  • memory/1608-80-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-85-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-83-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-81-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-95-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-87-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-93-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1608-89-0x0000000004D80000-0x0000000004DD1000-memory.dmp

    Filesize

    324KB

  • memory/1652-4388-0x0000000004D10000-0x0000000004D50000-memory.dmp

    Filesize

    256KB

  • memory/1652-4386-0x0000000002720000-0x0000000002752000-memory.dmp

    Filesize

    200KB

  • memory/1652-2363-0x0000000004D10000-0x0000000004D50000-memory.dmp

    Filesize

    256KB

  • memory/1652-2361-0x0000000004D10000-0x0000000004D50000-memory.dmp

    Filesize

    256KB

  • memory/1652-2359-0x0000000004D10000-0x0000000004D50000-memory.dmp

    Filesize

    256KB

  • memory/1652-2357-0x0000000000250000-0x00000000002AB000-memory.dmp

    Filesize

    364KB

  • memory/1652-2234-0x0000000004E50000-0x0000000004EB6000-memory.dmp

    Filesize

    408KB

  • memory/1652-2233-0x0000000004C60000-0x0000000004CC8000-memory.dmp

    Filesize

    416KB