Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:45

General

  • Target

    4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe

  • Size

    1.2MB

  • MD5

    cbbf23173cf8bd5242f60a1ccbc45908

  • SHA1

    b67264dc99de0dec524f4c6add8227fdaec22488

  • SHA256

    4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827

  • SHA512

    849e62bd6dcfc52aff5f3aaf63b226863cb1a0a0f70d3c1c1c4122946a3c3d4264d17f34863e3bb122f2d5f521a0d0070fda7a8b09a5f98aa5cfb1285597bea3

  • SSDEEP

    24576:Ey9a7z+vNhAESkepzPK0d/soL3q7XLRBQ3+RpYW186UQS69MphJoABB4eaNycQ:Tw7UhGkeCQkQyk0186ZChJ/D4Ry

Malware Config

Extracted

Family

redline

Botnet

lisa

C2

185.161.248.73:4164

Attributes
  • auth_value

    c2dc311db9820012377b054447d37949

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe
    "C:\Users\Admin\AppData\Local\Temp\4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z23873104.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z23873104.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z42658170.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z42658170.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z45010082.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z45010082.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:648
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s38675019.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s38675019.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:816
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t97918376.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t97918376.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z23873104.exe

    Filesize

    979KB

    MD5

    31953c9f076d1c69d513c2a618069d2c

    SHA1

    fe2859ad7d7c6732365c36697a2f7928a65f4467

    SHA256

    ef738c944a139974a74a721e84c3d362d2d98f7c7c7dffca3316678670b0ea17

    SHA512

    b3ec6f7671808628167b4cd462be5efccdf2f2dc04765d71a627656a2b9c018447cd2ed57650696b3467d3bf2b96d1679b0c2040b2d68b6580458130d102eb57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z23873104.exe

    Filesize

    979KB

    MD5

    31953c9f076d1c69d513c2a618069d2c

    SHA1

    fe2859ad7d7c6732365c36697a2f7928a65f4467

    SHA256

    ef738c944a139974a74a721e84c3d362d2d98f7c7c7dffca3316678670b0ea17

    SHA512

    b3ec6f7671808628167b4cd462be5efccdf2f2dc04765d71a627656a2b9c018447cd2ed57650696b3467d3bf2b96d1679b0c2040b2d68b6580458130d102eb57

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z42658170.exe

    Filesize

    796KB

    MD5

    330ac57c86fec59668bdd9dae812c878

    SHA1

    12ab083683a90447c06e429826322356530ae652

    SHA256

    ecd6b351fde5b64310d30ffe755c6966e024ccdcec4e5a6ead2d2575e875c5b1

    SHA512

    3cb8ee193d6f426ba8b7c07fabc480d1eaf7f18bad1cbb9361c58d9e7e14352aa2317915061028a37c1ced294d49007cc261660efb660aa3337fac0113b1581b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z42658170.exe

    Filesize

    796KB

    MD5

    330ac57c86fec59668bdd9dae812c878

    SHA1

    12ab083683a90447c06e429826322356530ae652

    SHA256

    ecd6b351fde5b64310d30ffe755c6966e024ccdcec4e5a6ead2d2575e875c5b1

    SHA512

    3cb8ee193d6f426ba8b7c07fabc480d1eaf7f18bad1cbb9361c58d9e7e14352aa2317915061028a37c1ced294d49007cc261660efb660aa3337fac0113b1581b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z45010082.exe

    Filesize

    310KB

    MD5

    abca68df3f4f6466b63718b736d8d153

    SHA1

    2f56d7bf51a6873865584257e4332b4e06f9d866

    SHA256

    4e448d09ddc1d1180dcad1e48ef4de9203794a7a65b990431c8962eefa46d997

    SHA512

    2e66b9e2a03549674dd237418e753255caba4191511da55ff3b66353b5b402ad64739d1dd1e233b28841ef7bc5d5c4f19c079a6a675ab6d733e2ce850f44029e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z45010082.exe

    Filesize

    310KB

    MD5

    abca68df3f4f6466b63718b736d8d153

    SHA1

    2f56d7bf51a6873865584257e4332b4e06f9d866

    SHA256

    4e448d09ddc1d1180dcad1e48ef4de9203794a7a65b990431c8962eefa46d997

    SHA512

    2e66b9e2a03549674dd237418e753255caba4191511da55ff3b66353b5b402ad64739d1dd1e233b28841ef7bc5d5c4f19c079a6a675ab6d733e2ce850f44029e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s38675019.exe

    Filesize

    177KB

    MD5

    91d0c3b6e77179c684f13d8bbbc8cae8

    SHA1

    5c2ad6889d11f1c29ba0fa841c3183b55709d3d6

    SHA256

    381126de7389a9b5dc3573bd0e645a6496624bb59984c6d9c3a2c5fe88de0470

    SHA512

    b55fb7617d1b2dbd2842c49dbe71bc21fe3d96be7fe3cbedc341ec612d6dbc10706acad61ea35f4aa43487389fc0e32856185fbaa516e7ddd70b6318254b35ab

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s38675019.exe

    Filesize

    177KB

    MD5

    91d0c3b6e77179c684f13d8bbbc8cae8

    SHA1

    5c2ad6889d11f1c29ba0fa841c3183b55709d3d6

    SHA256

    381126de7389a9b5dc3573bd0e645a6496624bb59984c6d9c3a2c5fe88de0470

    SHA512

    b55fb7617d1b2dbd2842c49dbe71bc21fe3d96be7fe3cbedc341ec612d6dbc10706acad61ea35f4aa43487389fc0e32856185fbaa516e7ddd70b6318254b35ab

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t97918376.exe

    Filesize

    168KB

    MD5

    0d942096841d1785127b0230909eb11d

    SHA1

    40de3ec80f4f0decd8f047485b81004e937682a1

    SHA256

    d42d4b26a03b7e3f5c3561625b992e8673a28fb8a89f326a31c83b2d8568ce56

    SHA512

    962b2a2f22dd648326cd87acd554def66dc756d2b9dd4a0caa4496df96ceac10be1e6b8df28ed84799ac451362e59b64519ccda69adffee4d628f81c24cea3d7

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t97918376.exe

    Filesize

    168KB

    MD5

    0d942096841d1785127b0230909eb11d

    SHA1

    40de3ec80f4f0decd8f047485b81004e937682a1

    SHA256

    d42d4b26a03b7e3f5c3561625b992e8673a28fb8a89f326a31c83b2d8568ce56

    SHA512

    962b2a2f22dd648326cd87acd554def66dc756d2b9dd4a0caa4496df96ceac10be1e6b8df28ed84799ac451362e59b64519ccda69adffee4d628f81c24cea3d7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z23873104.exe

    Filesize

    979KB

    MD5

    31953c9f076d1c69d513c2a618069d2c

    SHA1

    fe2859ad7d7c6732365c36697a2f7928a65f4467

    SHA256

    ef738c944a139974a74a721e84c3d362d2d98f7c7c7dffca3316678670b0ea17

    SHA512

    b3ec6f7671808628167b4cd462be5efccdf2f2dc04765d71a627656a2b9c018447cd2ed57650696b3467d3bf2b96d1679b0c2040b2d68b6580458130d102eb57

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z23873104.exe

    Filesize

    979KB

    MD5

    31953c9f076d1c69d513c2a618069d2c

    SHA1

    fe2859ad7d7c6732365c36697a2f7928a65f4467

    SHA256

    ef738c944a139974a74a721e84c3d362d2d98f7c7c7dffca3316678670b0ea17

    SHA512

    b3ec6f7671808628167b4cd462be5efccdf2f2dc04765d71a627656a2b9c018447cd2ed57650696b3467d3bf2b96d1679b0c2040b2d68b6580458130d102eb57

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z42658170.exe

    Filesize

    796KB

    MD5

    330ac57c86fec59668bdd9dae812c878

    SHA1

    12ab083683a90447c06e429826322356530ae652

    SHA256

    ecd6b351fde5b64310d30ffe755c6966e024ccdcec4e5a6ead2d2575e875c5b1

    SHA512

    3cb8ee193d6f426ba8b7c07fabc480d1eaf7f18bad1cbb9361c58d9e7e14352aa2317915061028a37c1ced294d49007cc261660efb660aa3337fac0113b1581b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z42658170.exe

    Filesize

    796KB

    MD5

    330ac57c86fec59668bdd9dae812c878

    SHA1

    12ab083683a90447c06e429826322356530ae652

    SHA256

    ecd6b351fde5b64310d30ffe755c6966e024ccdcec4e5a6ead2d2575e875c5b1

    SHA512

    3cb8ee193d6f426ba8b7c07fabc480d1eaf7f18bad1cbb9361c58d9e7e14352aa2317915061028a37c1ced294d49007cc261660efb660aa3337fac0113b1581b

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z45010082.exe

    Filesize

    310KB

    MD5

    abca68df3f4f6466b63718b736d8d153

    SHA1

    2f56d7bf51a6873865584257e4332b4e06f9d866

    SHA256

    4e448d09ddc1d1180dcad1e48ef4de9203794a7a65b990431c8962eefa46d997

    SHA512

    2e66b9e2a03549674dd237418e753255caba4191511da55ff3b66353b5b402ad64739d1dd1e233b28841ef7bc5d5c4f19c079a6a675ab6d733e2ce850f44029e

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z45010082.exe

    Filesize

    310KB

    MD5

    abca68df3f4f6466b63718b736d8d153

    SHA1

    2f56d7bf51a6873865584257e4332b4e06f9d866

    SHA256

    4e448d09ddc1d1180dcad1e48ef4de9203794a7a65b990431c8962eefa46d997

    SHA512

    2e66b9e2a03549674dd237418e753255caba4191511da55ff3b66353b5b402ad64739d1dd1e233b28841ef7bc5d5c4f19c079a6a675ab6d733e2ce850f44029e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s38675019.exe

    Filesize

    177KB

    MD5

    91d0c3b6e77179c684f13d8bbbc8cae8

    SHA1

    5c2ad6889d11f1c29ba0fa841c3183b55709d3d6

    SHA256

    381126de7389a9b5dc3573bd0e645a6496624bb59984c6d9c3a2c5fe88de0470

    SHA512

    b55fb7617d1b2dbd2842c49dbe71bc21fe3d96be7fe3cbedc341ec612d6dbc10706acad61ea35f4aa43487389fc0e32856185fbaa516e7ddd70b6318254b35ab

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\s38675019.exe

    Filesize

    177KB

    MD5

    91d0c3b6e77179c684f13d8bbbc8cae8

    SHA1

    5c2ad6889d11f1c29ba0fa841c3183b55709d3d6

    SHA256

    381126de7389a9b5dc3573bd0e645a6496624bb59984c6d9c3a2c5fe88de0470

    SHA512

    b55fb7617d1b2dbd2842c49dbe71bc21fe3d96be7fe3cbedc341ec612d6dbc10706acad61ea35f4aa43487389fc0e32856185fbaa516e7ddd70b6318254b35ab

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\t97918376.exe

    Filesize

    168KB

    MD5

    0d942096841d1785127b0230909eb11d

    SHA1

    40de3ec80f4f0decd8f047485b81004e937682a1

    SHA256

    d42d4b26a03b7e3f5c3561625b992e8673a28fb8a89f326a31c83b2d8568ce56

    SHA512

    962b2a2f22dd648326cd87acd554def66dc756d2b9dd4a0caa4496df96ceac10be1e6b8df28ed84799ac451362e59b64519ccda69adffee4d628f81c24cea3d7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\t97918376.exe

    Filesize

    168KB

    MD5

    0d942096841d1785127b0230909eb11d

    SHA1

    40de3ec80f4f0decd8f047485b81004e937682a1

    SHA256

    d42d4b26a03b7e3f5c3561625b992e8673a28fb8a89f326a31c83b2d8568ce56

    SHA512

    962b2a2f22dd648326cd87acd554def66dc756d2b9dd4a0caa4496df96ceac10be1e6b8df28ed84799ac451362e59b64519ccda69adffee4d628f81c24cea3d7

  • memory/816-100-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-116-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-98-0x0000000000680000-0x0000000000698000-memory.dmp

    Filesize

    96KB

  • memory/816-102-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-104-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-106-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-108-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-110-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-118-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-126-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-124-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-122-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-120-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-99-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-114-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-112-0x0000000000680000-0x0000000000693000-memory.dmp

    Filesize

    76KB

  • memory/816-127-0x00000000023F0000-0x0000000002430000-memory.dmp

    Filesize

    256KB

  • memory/816-128-0x00000000023F0000-0x0000000002430000-memory.dmp

    Filesize

    256KB

  • memory/816-97-0x00000000023F0000-0x0000000002430000-memory.dmp

    Filesize

    256KB

  • memory/816-96-0x00000000023F0000-0x0000000002430000-memory.dmp

    Filesize

    256KB

  • memory/816-95-0x0000000000390000-0x00000000003AA000-memory.dmp

    Filesize

    104KB

  • memory/816-94-0x00000000023F0000-0x0000000002430000-memory.dmp

    Filesize

    256KB

  • memory/1068-135-0x0000000000810000-0x0000000000840000-memory.dmp

    Filesize

    192KB

  • memory/1068-136-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/1068-137-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

    Filesize

    256KB

  • memory/1068-138-0x0000000004CB0000-0x0000000004CF0000-memory.dmp

    Filesize

    256KB