Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:32

General

  • Target

    4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe

  • Size

    794KB

  • MD5

    2e2cb94c52f219949afac7147e5c52ac

  • SHA1

    ca2b5d00dbfacf16e4a5c6a876a59dc60231de1e

  • SHA256

    4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa

  • SHA512

    8e2f9ac1d8f0ce9d80ebf5e765e3f2921225087c1bbea462c33c1bb3c0e8c818bd9a44b6085be4460001a2d7d96abecd039c52bd49ec5c14dd1ddeb533acf465

  • SSDEEP

    24576:9y/3TbGwAOwpfYyg4GiQBOE1JlhgB7P7:YfTbGHnpfNGLOEvlhy

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

danko

C2

185.161.248.73:4164

Attributes
  • auth_value

    784d42a6c1eb1a5060b8bcd3696f5f1e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe
    "C:\Users\Admin\AppData\Local\Temp\4090943b969146fec91fcfb0a8336375905fd4503d03854183781347a9309dfa.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1056
        • C:\Windows\Temp\1.exe
          "C:\Windows\Temp\1.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exe

    Filesize

    589KB

    MD5

    d84a2dd7b407151528a40cb03238998a

    SHA1

    26231ff726042ce1bdb689da59349a3338e39f9f

    SHA256

    d2c27969569f1c7695715698dae08a09054f3d383275977a56e6ea47be66dec9

    SHA512

    af4ad6431617c6e0b663fdeab013265e2b0a4d440e8d0cc810daedf4536b029d0664ef2371478e000fca2f3889dd29c0db7d35d884a41bebea7950940ba22fce

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exe

    Filesize

    589KB

    MD5

    d84a2dd7b407151528a40cb03238998a

    SHA1

    26231ff726042ce1bdb689da59349a3338e39f9f

    SHA256

    d2c27969569f1c7695715698dae08a09054f3d383275977a56e6ea47be66dec9

    SHA512

    af4ad6431617c6e0b663fdeab013265e2b0a4d440e8d0cc810daedf4536b029d0664ef2371478e000fca2f3889dd29c0db7d35d884a41bebea7950940ba22fce

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe

    Filesize

    530KB

    MD5

    ff712479854c27f978c935f4801e6a21

    SHA1

    e65b073e8a92a30ccbe898d5abe2b1b594dd44de

    SHA256

    d3c25dc47a25253a2ae8dca0b4d51e2ededd181066347ae9a3739e43762932bf

    SHA512

    5b0b92830fabff91879539075d2fad89a664e76f61049dcd5720d31b8cffee265d559923d2963550d6ed7c533e4e94fc5f7854fc442d83d68e72acdb1cb07768

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe

    Filesize

    530KB

    MD5

    ff712479854c27f978c935f4801e6a21

    SHA1

    e65b073e8a92a30ccbe898d5abe2b1b594dd44de

    SHA256

    d3c25dc47a25253a2ae8dca0b4d51e2ededd181066347ae9a3739e43762932bf

    SHA512

    5b0b92830fabff91879539075d2fad89a664e76f61049dcd5720d31b8cffee265d559923d2963550d6ed7c533e4e94fc5f7854fc442d83d68e72acdb1cb07768

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe

    Filesize

    530KB

    MD5

    ff712479854c27f978c935f4801e6a21

    SHA1

    e65b073e8a92a30ccbe898d5abe2b1b594dd44de

    SHA256

    d3c25dc47a25253a2ae8dca0b4d51e2ededd181066347ae9a3739e43762932bf

    SHA512

    5b0b92830fabff91879539075d2fad89a664e76f61049dcd5720d31b8cffee265d559923d2963550d6ed7c533e4e94fc5f7854fc442d83d68e72acdb1cb07768

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exe

    Filesize

    169KB

    MD5

    8094da4dd18995647830baab08b70025

    SHA1

    62a6d17ffc5bdf0fcac40f0a0715ffb32e53b53e

    SHA256

    660cf546f8820cfe0bb78a86ef9fc7fbf1a2ff514509d28ba5e5cdb846ca5ec8

    SHA512

    f373d1d8fab306229a2f8c4e2ef34c519762e729dc361afb72f6ebe1dbd6585c4216e30984ea3ee387ba848476712888b725549761b580ace189f84f1119d67c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exe

    Filesize

    169KB

    MD5

    8094da4dd18995647830baab08b70025

    SHA1

    62a6d17ffc5bdf0fcac40f0a0715ffb32e53b53e

    SHA256

    660cf546f8820cfe0bb78a86ef9fc7fbf1a2ff514509d28ba5e5cdb846ca5ec8

    SHA512

    f373d1d8fab306229a2f8c4e2ef34c519762e729dc361afb72f6ebe1dbd6585c4216e30984ea3ee387ba848476712888b725549761b580ace189f84f1119d67c

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exe

    Filesize

    589KB

    MD5

    d84a2dd7b407151528a40cb03238998a

    SHA1

    26231ff726042ce1bdb689da59349a3338e39f9f

    SHA256

    d2c27969569f1c7695715698dae08a09054f3d383275977a56e6ea47be66dec9

    SHA512

    af4ad6431617c6e0b663fdeab013265e2b0a4d440e8d0cc810daedf4536b029d0664ef2371478e000fca2f3889dd29c0db7d35d884a41bebea7950940ba22fce

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x88796536.exe

    Filesize

    589KB

    MD5

    d84a2dd7b407151528a40cb03238998a

    SHA1

    26231ff726042ce1bdb689da59349a3338e39f9f

    SHA256

    d2c27969569f1c7695715698dae08a09054f3d383275977a56e6ea47be66dec9

    SHA512

    af4ad6431617c6e0b663fdeab013265e2b0a4d440e8d0cc810daedf4536b029d0664ef2371478e000fca2f3889dd29c0db7d35d884a41bebea7950940ba22fce

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe

    Filesize

    530KB

    MD5

    ff712479854c27f978c935f4801e6a21

    SHA1

    e65b073e8a92a30ccbe898d5abe2b1b594dd44de

    SHA256

    d3c25dc47a25253a2ae8dca0b4d51e2ededd181066347ae9a3739e43762932bf

    SHA512

    5b0b92830fabff91879539075d2fad89a664e76f61049dcd5720d31b8cffee265d559923d2963550d6ed7c533e4e94fc5f7854fc442d83d68e72acdb1cb07768

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe

    Filesize

    530KB

    MD5

    ff712479854c27f978c935f4801e6a21

    SHA1

    e65b073e8a92a30ccbe898d5abe2b1b594dd44de

    SHA256

    d3c25dc47a25253a2ae8dca0b4d51e2ededd181066347ae9a3739e43762932bf

    SHA512

    5b0b92830fabff91879539075d2fad89a664e76f61049dcd5720d31b8cffee265d559923d2963550d6ed7c533e4e94fc5f7854fc442d83d68e72acdb1cb07768

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\m26157799.exe

    Filesize

    530KB

    MD5

    ff712479854c27f978c935f4801e6a21

    SHA1

    e65b073e8a92a30ccbe898d5abe2b1b594dd44de

    SHA256

    d3c25dc47a25253a2ae8dca0b4d51e2ededd181066347ae9a3739e43762932bf

    SHA512

    5b0b92830fabff91879539075d2fad89a664e76f61049dcd5720d31b8cffee265d559923d2963550d6ed7c533e4e94fc5f7854fc442d83d68e72acdb1cb07768

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exe

    Filesize

    169KB

    MD5

    8094da4dd18995647830baab08b70025

    SHA1

    62a6d17ffc5bdf0fcac40f0a0715ffb32e53b53e

    SHA256

    660cf546f8820cfe0bb78a86ef9fc7fbf1a2ff514509d28ba5e5cdb846ca5ec8

    SHA512

    f373d1d8fab306229a2f8c4e2ef34c519762e729dc361afb72f6ebe1dbd6585c4216e30984ea3ee387ba848476712888b725549761b580ace189f84f1119d67c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\n45276993.exe

    Filesize

    169KB

    MD5

    8094da4dd18995647830baab08b70025

    SHA1

    62a6d17ffc5bdf0fcac40f0a0715ffb32e53b53e

    SHA256

    660cf546f8820cfe0bb78a86ef9fc7fbf1a2ff514509d28ba5e5cdb846ca5ec8

    SHA512

    f373d1d8fab306229a2f8c4e2ef34c519762e729dc361afb72f6ebe1dbd6585c4216e30984ea3ee387ba848476712888b725549761b580ace189f84f1119d67c

  • \Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • \Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/1056-116-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-132-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-92-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-90-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-98-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-96-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-94-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-100-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-102-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-106-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-104-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-110-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-112-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-108-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-86-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-118-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-114-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-122-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-120-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-124-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-126-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-128-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-130-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-88-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-134-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-136-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-140-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-138-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-144-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-142-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-146-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-2230-0x00000000010D0000-0x0000000001102000-memory.dmp

    Filesize

    200KB

  • memory/1056-84-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-83-0x0000000002920000-0x0000000002980000-memory.dmp

    Filesize

    384KB

  • memory/1056-82-0x00000000051E0000-0x0000000005220000-memory.dmp

    Filesize

    256KB

  • memory/1056-81-0x00000000051E0000-0x0000000005220000-memory.dmp

    Filesize

    256KB

  • memory/1056-2233-0x00000000051E0000-0x0000000005220000-memory.dmp

    Filesize

    256KB

  • memory/1056-78-0x00000000027A0000-0x0000000002808000-memory.dmp

    Filesize

    416KB

  • memory/1056-80-0x00000000002D0000-0x000000000032B000-memory.dmp

    Filesize

    364KB

  • memory/1056-79-0x0000000002920000-0x0000000002986000-memory.dmp

    Filesize

    408KB

  • memory/1664-2242-0x0000000000230000-0x000000000025E000-memory.dmp

    Filesize

    184KB

  • memory/1664-2250-0x0000000000290000-0x0000000000296000-memory.dmp

    Filesize

    24KB

  • memory/1664-2252-0x0000000004B60000-0x0000000004BA0000-memory.dmp

    Filesize

    256KB

  • memory/1664-2254-0x0000000004B60000-0x0000000004BA0000-memory.dmp

    Filesize

    256KB

  • memory/1728-2249-0x0000000001040000-0x0000000001070000-memory.dmp

    Filesize

    192KB

  • memory/1728-2251-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/1728-2253-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/1728-2255-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB