Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    175s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:25

General

  • Target

    0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe

  • Size

    1.5MB

  • MD5

    9b776b053559abac6e55df060e72d8fc

  • SHA1

    8672d2d8b754e2fdfa11094864c09bdec59538a1

  • SHA256

    0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1

  • SHA512

    e7555716429524573b15a6e8aa322da6c84e08b912f9674b7197bca271d6a09b706d5e96a8fa1ea1025d71010ec0d79c40e4950cb82ea491713415178e45b1f0

  • SSDEEP

    24576:my/zgTVa/Is053sXwGrky/gPmORIpxl5ymjd7voB8GF+k1LdriVdQzzbaHjB0:1/zg0/I1j07KmORIvl5yk9voBJF+khB+

Malware Config

Extracted

Family

redline

Botnet

mask

C2

217.196.96.56:4138

Attributes
  • auth_value

    31aef25be0febb8e491794ef7f502c50

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe
    "C:\Users\Admin\AppData\Local\Temp\0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1379387.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1379387.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9255864.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9255864.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:664
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4317121.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4317121.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:564
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3791748.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3791748.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1696
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3122097.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3122097.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Loads dropped DLL
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1812
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8126466.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8126466.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1379387.exe

    Filesize

    1.3MB

    MD5

    1ef7ed4ffd08f325fc900e53210c8c22

    SHA1

    4a424afb5a8d60d9e628e911111d695fcd2213fe

    SHA256

    312a7beb6f079a6d94d15ea4c695b12dd1dbf4eb2611c435381146570436b31e

    SHA512

    1a76b094d28bac41bc2f04bc504034bf167963f5d51a6362e9a91b7426a833e46bbd3acf8015a3f4b170d4bb7f330e79b2e8cfa69e9bbb8ba1df9dceb1a06325

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1379387.exe

    Filesize

    1.3MB

    MD5

    1ef7ed4ffd08f325fc900e53210c8c22

    SHA1

    4a424afb5a8d60d9e628e911111d695fcd2213fe

    SHA256

    312a7beb6f079a6d94d15ea4c695b12dd1dbf4eb2611c435381146570436b31e

    SHA512

    1a76b094d28bac41bc2f04bc504034bf167963f5d51a6362e9a91b7426a833e46bbd3acf8015a3f4b170d4bb7f330e79b2e8cfa69e9bbb8ba1df9dceb1a06325

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9255864.exe

    Filesize

    848KB

    MD5

    2f4f95a381b459d9eadac5efee532a98

    SHA1

    8912a4efcc10e54bb769ffc272a1c53be67c52a5

    SHA256

    8cc8b0aa8e0f3267e0be398c9821d84f639c1235d92496ec4320f403747d3d82

    SHA512

    c87325cec9e12850e71beea1f0c3eac91bd78d98859f209981d8a77aa982e7df97fd7b6477e383aa86d96fbfcea97e65021692c76040611803d2b64d2ccd6a14

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9255864.exe

    Filesize

    848KB

    MD5

    2f4f95a381b459d9eadac5efee532a98

    SHA1

    8912a4efcc10e54bb769ffc272a1c53be67c52a5

    SHA256

    8cc8b0aa8e0f3267e0be398c9821d84f639c1235d92496ec4320f403747d3d82

    SHA512

    c87325cec9e12850e71beea1f0c3eac91bd78d98859f209981d8a77aa982e7df97fd7b6477e383aa86d96fbfcea97e65021692c76040611803d2b64d2ccd6a14

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4317121.exe

    Filesize

    644KB

    MD5

    dfdc92a219932d0ef3498837c909f86e

    SHA1

    ef13483533697b8c6519cf31449a446108ff0185

    SHA256

    00503f0d96f0fd13f2209bcf6849a09b71d23e9b2b82ee6f77e0bacc15f03a6d

    SHA512

    1b9f717e0e1c8bfa46e368b50609d485c81fefc7ca306cb7d6e660d55185d1a00665cadd5b948fe6e41b16ffeaa12f4b8b9972bfb115ecb2be82eaf99701c5a8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4317121.exe

    Filesize

    644KB

    MD5

    dfdc92a219932d0ef3498837c909f86e

    SHA1

    ef13483533697b8c6519cf31449a446108ff0185

    SHA256

    00503f0d96f0fd13f2209bcf6849a09b71d23e9b2b82ee6f77e0bacc15f03a6d

    SHA512

    1b9f717e0e1c8bfa46e368b50609d485c81fefc7ca306cb7d6e660d55185d1a00665cadd5b948fe6e41b16ffeaa12f4b8b9972bfb115ecb2be82eaf99701c5a8

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3791748.exe

    Filesize

    384KB

    MD5

    662dc5a861b6de23cad1076ae2511501

    SHA1

    e36558f2c7c13243519e3c224b537f11800b2aec

    SHA256

    634a9b45b9d0f66924f88cb8ccfe81420d5f4fa299f4766d6188e23297469678

    SHA512

    68cafe4b096ff053065d6b5f54a43a46c3966118853daf99ce35833dd0ee1beccfb2523ca8d0d062f3c49b1f10cf29056a278e9dbf9f3e2b1e497b5fdbd52d0d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3791748.exe

    Filesize

    384KB

    MD5

    662dc5a861b6de23cad1076ae2511501

    SHA1

    e36558f2c7c13243519e3c224b537f11800b2aec

    SHA256

    634a9b45b9d0f66924f88cb8ccfe81420d5f4fa299f4766d6188e23297469678

    SHA512

    68cafe4b096ff053065d6b5f54a43a46c3966118853daf99ce35833dd0ee1beccfb2523ca8d0d062f3c49b1f10cf29056a278e9dbf9f3e2b1e497b5fdbd52d0d

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3122097.exe

    Filesize

    291KB

    MD5

    31672155f15c1004d634d94cfb5601ed

    SHA1

    2db73caf0fce8789ca30e7b887ad76692d7ef105

    SHA256

    85dc0b981ce04bc8c41cba3a7e22be154012beb2813a028c8145ea0bc72481e4

    SHA512

    764f7fbe66412f6acf364942e339161678d6b2fcfd566ad474903c3571990452277e6c60334922aadd9e19e3b43219391847f19d4c409d7aafb73f9011ae036b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3122097.exe

    Filesize

    291KB

    MD5

    31672155f15c1004d634d94cfb5601ed

    SHA1

    2db73caf0fce8789ca30e7b887ad76692d7ef105

    SHA256

    85dc0b981ce04bc8c41cba3a7e22be154012beb2813a028c8145ea0bc72481e4

    SHA512

    764f7fbe66412f6acf364942e339161678d6b2fcfd566ad474903c3571990452277e6c60334922aadd9e19e3b43219391847f19d4c409d7aafb73f9011ae036b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3122097.exe

    Filesize

    291KB

    MD5

    31672155f15c1004d634d94cfb5601ed

    SHA1

    2db73caf0fce8789ca30e7b887ad76692d7ef105

    SHA256

    85dc0b981ce04bc8c41cba3a7e22be154012beb2813a028c8145ea0bc72481e4

    SHA512

    764f7fbe66412f6acf364942e339161678d6b2fcfd566ad474903c3571990452277e6c60334922aadd9e19e3b43219391847f19d4c409d7aafb73f9011ae036b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8126466.exe

    Filesize

    168KB

    MD5

    3bdba85b5933ce2da6a25f2cbd142cd6

    SHA1

    da2bf3da25ba86978be0e8b3d5b89f201c7cfb56

    SHA256

    8e5e3e182a0bcc2f109be800e07465d51482f678442e8d419eb57e24dbbe5135

    SHA512

    0c663f1f451420eb24f28cf17beeeda487f7ee7fa4de9614d1845175a5e06e36e23386e5a27a74d08ce2ca976e787b4e9b87c72910f529b783dacaadec64431b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8126466.exe

    Filesize

    168KB

    MD5

    3bdba85b5933ce2da6a25f2cbd142cd6

    SHA1

    da2bf3da25ba86978be0e8b3d5b89f201c7cfb56

    SHA256

    8e5e3e182a0bcc2f109be800e07465d51482f678442e8d419eb57e24dbbe5135

    SHA512

    0c663f1f451420eb24f28cf17beeeda487f7ee7fa4de9614d1845175a5e06e36e23386e5a27a74d08ce2ca976e787b4e9b87c72910f529b783dacaadec64431b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1379387.exe

    Filesize

    1.3MB

    MD5

    1ef7ed4ffd08f325fc900e53210c8c22

    SHA1

    4a424afb5a8d60d9e628e911111d695fcd2213fe

    SHA256

    312a7beb6f079a6d94d15ea4c695b12dd1dbf4eb2611c435381146570436b31e

    SHA512

    1a76b094d28bac41bc2f04bc504034bf167963f5d51a6362e9a91b7426a833e46bbd3acf8015a3f4b170d4bb7f330e79b2e8cfa69e9bbb8ba1df9dceb1a06325

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1379387.exe

    Filesize

    1.3MB

    MD5

    1ef7ed4ffd08f325fc900e53210c8c22

    SHA1

    4a424afb5a8d60d9e628e911111d695fcd2213fe

    SHA256

    312a7beb6f079a6d94d15ea4c695b12dd1dbf4eb2611c435381146570436b31e

    SHA512

    1a76b094d28bac41bc2f04bc504034bf167963f5d51a6362e9a91b7426a833e46bbd3acf8015a3f4b170d4bb7f330e79b2e8cfa69e9bbb8ba1df9dceb1a06325

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9255864.exe

    Filesize

    848KB

    MD5

    2f4f95a381b459d9eadac5efee532a98

    SHA1

    8912a4efcc10e54bb769ffc272a1c53be67c52a5

    SHA256

    8cc8b0aa8e0f3267e0be398c9821d84f639c1235d92496ec4320f403747d3d82

    SHA512

    c87325cec9e12850e71beea1f0c3eac91bd78d98859f209981d8a77aa982e7df97fd7b6477e383aa86d96fbfcea97e65021692c76040611803d2b64d2ccd6a14

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v9255864.exe

    Filesize

    848KB

    MD5

    2f4f95a381b459d9eadac5efee532a98

    SHA1

    8912a4efcc10e54bb769ffc272a1c53be67c52a5

    SHA256

    8cc8b0aa8e0f3267e0be398c9821d84f639c1235d92496ec4320f403747d3d82

    SHA512

    c87325cec9e12850e71beea1f0c3eac91bd78d98859f209981d8a77aa982e7df97fd7b6477e383aa86d96fbfcea97e65021692c76040611803d2b64d2ccd6a14

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4317121.exe

    Filesize

    644KB

    MD5

    dfdc92a219932d0ef3498837c909f86e

    SHA1

    ef13483533697b8c6519cf31449a446108ff0185

    SHA256

    00503f0d96f0fd13f2209bcf6849a09b71d23e9b2b82ee6f77e0bacc15f03a6d

    SHA512

    1b9f717e0e1c8bfa46e368b50609d485c81fefc7ca306cb7d6e660d55185d1a00665cadd5b948fe6e41b16ffeaa12f4b8b9972bfb115ecb2be82eaf99701c5a8

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v4317121.exe

    Filesize

    644KB

    MD5

    dfdc92a219932d0ef3498837c909f86e

    SHA1

    ef13483533697b8c6519cf31449a446108ff0185

    SHA256

    00503f0d96f0fd13f2209bcf6849a09b71d23e9b2b82ee6f77e0bacc15f03a6d

    SHA512

    1b9f717e0e1c8bfa46e368b50609d485c81fefc7ca306cb7d6e660d55185d1a00665cadd5b948fe6e41b16ffeaa12f4b8b9972bfb115ecb2be82eaf99701c5a8

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v3791748.exe

    Filesize

    384KB

    MD5

    662dc5a861b6de23cad1076ae2511501

    SHA1

    e36558f2c7c13243519e3c224b537f11800b2aec

    SHA256

    634a9b45b9d0f66924f88cb8ccfe81420d5f4fa299f4766d6188e23297469678

    SHA512

    68cafe4b096ff053065d6b5f54a43a46c3966118853daf99ce35833dd0ee1beccfb2523ca8d0d062f3c49b1f10cf29056a278e9dbf9f3e2b1e497b5fdbd52d0d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v3791748.exe

    Filesize

    384KB

    MD5

    662dc5a861b6de23cad1076ae2511501

    SHA1

    e36558f2c7c13243519e3c224b537f11800b2aec

    SHA256

    634a9b45b9d0f66924f88cb8ccfe81420d5f4fa299f4766d6188e23297469678

    SHA512

    68cafe4b096ff053065d6b5f54a43a46c3966118853daf99ce35833dd0ee1beccfb2523ca8d0d062f3c49b1f10cf29056a278e9dbf9f3e2b1e497b5fdbd52d0d

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a3122097.exe

    Filesize

    291KB

    MD5

    31672155f15c1004d634d94cfb5601ed

    SHA1

    2db73caf0fce8789ca30e7b887ad76692d7ef105

    SHA256

    85dc0b981ce04bc8c41cba3a7e22be154012beb2813a028c8145ea0bc72481e4

    SHA512

    764f7fbe66412f6acf364942e339161678d6b2fcfd566ad474903c3571990452277e6c60334922aadd9e19e3b43219391847f19d4c409d7aafb73f9011ae036b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a3122097.exe

    Filesize

    291KB

    MD5

    31672155f15c1004d634d94cfb5601ed

    SHA1

    2db73caf0fce8789ca30e7b887ad76692d7ef105

    SHA256

    85dc0b981ce04bc8c41cba3a7e22be154012beb2813a028c8145ea0bc72481e4

    SHA512

    764f7fbe66412f6acf364942e339161678d6b2fcfd566ad474903c3571990452277e6c60334922aadd9e19e3b43219391847f19d4c409d7aafb73f9011ae036b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a3122097.exe

    Filesize

    291KB

    MD5

    31672155f15c1004d634d94cfb5601ed

    SHA1

    2db73caf0fce8789ca30e7b887ad76692d7ef105

    SHA256

    85dc0b981ce04bc8c41cba3a7e22be154012beb2813a028c8145ea0bc72481e4

    SHA512

    764f7fbe66412f6acf364942e339161678d6b2fcfd566ad474903c3571990452277e6c60334922aadd9e19e3b43219391847f19d4c409d7aafb73f9011ae036b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8126466.exe

    Filesize

    168KB

    MD5

    3bdba85b5933ce2da6a25f2cbd142cd6

    SHA1

    da2bf3da25ba86978be0e8b3d5b89f201c7cfb56

    SHA256

    8e5e3e182a0bcc2f109be800e07465d51482f678442e8d419eb57e24dbbe5135

    SHA512

    0c663f1f451420eb24f28cf17beeeda487f7ee7fa4de9614d1845175a5e06e36e23386e5a27a74d08ce2ca976e787b4e9b87c72910f529b783dacaadec64431b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b8126466.exe

    Filesize

    168KB

    MD5

    3bdba85b5933ce2da6a25f2cbd142cd6

    SHA1

    da2bf3da25ba86978be0e8b3d5b89f201c7cfb56

    SHA256

    8e5e3e182a0bcc2f109be800e07465d51482f678442e8d419eb57e24dbbe5135

    SHA512

    0c663f1f451420eb24f28cf17beeeda487f7ee7fa4de9614d1845175a5e06e36e23386e5a27a74d08ce2ca976e787b4e9b87c72910f529b783dacaadec64431b

  • memory/1128-154-0x0000000000A20000-0x0000000000A60000-memory.dmp

    Filesize

    256KB

  • memory/1128-151-0x0000000001110000-0x0000000001140000-memory.dmp

    Filesize

    192KB

  • memory/1128-152-0x0000000000780000-0x0000000000786000-memory.dmp

    Filesize

    24KB

  • memory/1128-153-0x0000000000A20000-0x0000000000A60000-memory.dmp

    Filesize

    256KB

  • memory/1812-113-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-121-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-125-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-127-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-129-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-131-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-133-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-135-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-137-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-138-0x00000000003D0000-0x00000000003FD000-memory.dmp

    Filesize

    180KB

  • memory/1812-139-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/1812-140-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/1812-141-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1812-142-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/1812-144-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1812-123-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-119-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-117-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-115-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-111-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-110-0x0000000001ED0000-0x0000000001EE2000-memory.dmp

    Filesize

    72KB

  • memory/1812-109-0x0000000001ED0000-0x0000000001EE8000-memory.dmp

    Filesize

    96KB

  • memory/1812-108-0x0000000000960000-0x000000000097A000-memory.dmp

    Filesize

    104KB