Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    221s
  • max time network
    306s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 20:35

General

  • Target

    13aafc1f639702c9045d72104fc5d05f7ae721f4552951eb0e3288f4db11df1c.exe

  • Size

    1.3MB

  • MD5

    73fc90a2dfb883d62242fe23897cdd68

  • SHA1

    e2840e54a9b35f534c6b7b2c297e963e56ab623c

  • SHA256

    13aafc1f639702c9045d72104fc5d05f7ae721f4552951eb0e3288f4db11df1c

  • SHA512

    56b8c8770f60a083a552a145302cf1bcfd38561c44cdd33cce7ec86e0f8ea593c17f4285ac3a5cb8aaa2d4c377becb4bb42378f4789196edc6927da112f20041

  • SSDEEP

    24576:9ysiCpkuI0O8ORDj5msKjiVJMEqw/TWGZmkrHE3lj/j1XWy0vfdK:Ysi6kT0OVX5Y1EZ/T/mkI3lj71avf

Malware Config

Extracted

Family

redline

Botnet

lakio

C2

217.196.96.56:4138

Attributes
  • auth_value

    5a2372e90cce274157a245c74afe9d6e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13aafc1f639702c9045d72104fc5d05f7ae721f4552951eb0e3288f4db11df1c.exe
    "C:\Users\Admin\AppData\Local\Temp\13aafc1f639702c9045d72104fc5d05f7ae721f4552951eb0e3288f4db11df1c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7215700.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7215700.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6373462.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6373462.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8035758.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8035758.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1572
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7448528.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7448528.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:480
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o3856791.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o3856791.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1256

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7215700.exe

    Filesize

    1.1MB

    MD5

    ad2729ae74dfcdfe2a68e75a8381571a

    SHA1

    34ecbea8e97520c1c12c1f2d95188789affe7717

    SHA256

    fc62c697c47c9f2c317665afb51e174e15543eb224becd5c98a6bccd188167a5

    SHA512

    f8585c58119730ad77b8fdbc2108b7b29d207343f0c4339a7371f01efc97e34a9bde859a2a03074e825e9bb8bde1ff8304aa3cc26f13e0d80e207f1e43889731

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7215700.exe

    Filesize

    1.1MB

    MD5

    ad2729ae74dfcdfe2a68e75a8381571a

    SHA1

    34ecbea8e97520c1c12c1f2d95188789affe7717

    SHA256

    fc62c697c47c9f2c317665afb51e174e15543eb224becd5c98a6bccd188167a5

    SHA512

    f8585c58119730ad77b8fdbc2108b7b29d207343f0c4339a7371f01efc97e34a9bde859a2a03074e825e9bb8bde1ff8304aa3cc26f13e0d80e207f1e43889731

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6373462.exe

    Filesize

    620KB

    MD5

    c922045dfe2fe20acfe0751bd155a55d

    SHA1

    c994fa03a1ecf25d72f1f82d485d7763cf25390e

    SHA256

    0015ee3895b5713212ed254dc839c0047afa11446361c76c234ae423b3c763f1

    SHA512

    c1029c3006f1729bc4ec60679b7f6e8bcbbd7aad0e5eefcf8c0822df6a6777201711dd8ca5c3bb8911bf808f0e152f3b3e06b9731b25e4f4e51b98fce071cd8a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6373462.exe

    Filesize

    620KB

    MD5

    c922045dfe2fe20acfe0751bd155a55d

    SHA1

    c994fa03a1ecf25d72f1f82d485d7763cf25390e

    SHA256

    0015ee3895b5713212ed254dc839c0047afa11446361c76c234ae423b3c763f1

    SHA512

    c1029c3006f1729bc4ec60679b7f6e8bcbbd7aad0e5eefcf8c0822df6a6777201711dd8ca5c3bb8911bf808f0e152f3b3e06b9731b25e4f4e51b98fce071cd8a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8035758.exe

    Filesize

    416KB

    MD5

    e2795bc01b50b2c4d90ab0c776e1a269

    SHA1

    0507289a7fdcfefd23fbe23dd46b2247b5d68fa1

    SHA256

    b218a77597ccb2cc3b42b0b53fd17575870e697433f656187ff4c59bfe6d515a

    SHA512

    dafb6af435ab3b84f0ccb77dbe6866cac5b6c3e2cc92072db83bb5c9449c545fbbc17862b2d62eac9fabe93b8cd89613235d0228d78f4daf986f9523dce75bc7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8035758.exe

    Filesize

    416KB

    MD5

    e2795bc01b50b2c4d90ab0c776e1a269

    SHA1

    0507289a7fdcfefd23fbe23dd46b2247b5d68fa1

    SHA256

    b218a77597ccb2cc3b42b0b53fd17575870e697433f656187ff4c59bfe6d515a

    SHA512

    dafb6af435ab3b84f0ccb77dbe6866cac5b6c3e2cc92072db83bb5c9449c545fbbc17862b2d62eac9fabe93b8cd89613235d0228d78f4daf986f9523dce75bc7

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7448528.exe

    Filesize

    360KB

    MD5

    de3c4809fdd333def21bfcba55da1a1f

    SHA1

    a7fa58339f83dabf837c83dc8dc31e5fc65fd1c5

    SHA256

    afe7078c488a5e884f9ace725da1711a6268dc54d79a4766855643e3eb183660

    SHA512

    8ea7b67738d061c261d5e26f74b6e80fc1ecbed4cfbce101b710195f4eafa041f4ff8a3e1c8b9263253f6bf38bdfcb1301e01d3b1a688329103ecf3145d6c3b4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7448528.exe

    Filesize

    360KB

    MD5

    de3c4809fdd333def21bfcba55da1a1f

    SHA1

    a7fa58339f83dabf837c83dc8dc31e5fc65fd1c5

    SHA256

    afe7078c488a5e884f9ace725da1711a6268dc54d79a4766855643e3eb183660

    SHA512

    8ea7b67738d061c261d5e26f74b6e80fc1ecbed4cfbce101b710195f4eafa041f4ff8a3e1c8b9263253f6bf38bdfcb1301e01d3b1a688329103ecf3145d6c3b4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7448528.exe

    Filesize

    360KB

    MD5

    de3c4809fdd333def21bfcba55da1a1f

    SHA1

    a7fa58339f83dabf837c83dc8dc31e5fc65fd1c5

    SHA256

    afe7078c488a5e884f9ace725da1711a6268dc54d79a4766855643e3eb183660

    SHA512

    8ea7b67738d061c261d5e26f74b6e80fc1ecbed4cfbce101b710195f4eafa041f4ff8a3e1c8b9263253f6bf38bdfcb1301e01d3b1a688329103ecf3145d6c3b4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o3856791.exe

    Filesize

    168KB

    MD5

    05f1bf56723c6af23c89d2bd93e23ee2

    SHA1

    635c5756c28d8a008f46e0cfb5eed5a1e1441b6a

    SHA256

    aa412a0a098d63da8cde641a630cf7c35ab7e67db75fe2f0ceb84f6a4cf09919

    SHA512

    cf0f351c602b4b92f1976e9cb50670852949dca5229c50678d01b6dc301b7b1974e18076bb638a436053542858f119e82007a2131d316c002ca4a0719aafefb4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o3856791.exe

    Filesize

    168KB

    MD5

    05f1bf56723c6af23c89d2bd93e23ee2

    SHA1

    635c5756c28d8a008f46e0cfb5eed5a1e1441b6a

    SHA256

    aa412a0a098d63da8cde641a630cf7c35ab7e67db75fe2f0ceb84f6a4cf09919

    SHA512

    cf0f351c602b4b92f1976e9cb50670852949dca5229c50678d01b6dc301b7b1974e18076bb638a436053542858f119e82007a2131d316c002ca4a0719aafefb4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7215700.exe

    Filesize

    1.1MB

    MD5

    ad2729ae74dfcdfe2a68e75a8381571a

    SHA1

    34ecbea8e97520c1c12c1f2d95188789affe7717

    SHA256

    fc62c697c47c9f2c317665afb51e174e15543eb224becd5c98a6bccd188167a5

    SHA512

    f8585c58119730ad77b8fdbc2108b7b29d207343f0c4339a7371f01efc97e34a9bde859a2a03074e825e9bb8bde1ff8304aa3cc26f13e0d80e207f1e43889731

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z7215700.exe

    Filesize

    1.1MB

    MD5

    ad2729ae74dfcdfe2a68e75a8381571a

    SHA1

    34ecbea8e97520c1c12c1f2d95188789affe7717

    SHA256

    fc62c697c47c9f2c317665afb51e174e15543eb224becd5c98a6bccd188167a5

    SHA512

    f8585c58119730ad77b8fdbc2108b7b29d207343f0c4339a7371f01efc97e34a9bde859a2a03074e825e9bb8bde1ff8304aa3cc26f13e0d80e207f1e43889731

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6373462.exe

    Filesize

    620KB

    MD5

    c922045dfe2fe20acfe0751bd155a55d

    SHA1

    c994fa03a1ecf25d72f1f82d485d7763cf25390e

    SHA256

    0015ee3895b5713212ed254dc839c0047afa11446361c76c234ae423b3c763f1

    SHA512

    c1029c3006f1729bc4ec60679b7f6e8bcbbd7aad0e5eefcf8c0822df6a6777201711dd8ca5c3bb8911bf808f0e152f3b3e06b9731b25e4f4e51b98fce071cd8a

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z6373462.exe

    Filesize

    620KB

    MD5

    c922045dfe2fe20acfe0751bd155a55d

    SHA1

    c994fa03a1ecf25d72f1f82d485d7763cf25390e

    SHA256

    0015ee3895b5713212ed254dc839c0047afa11446361c76c234ae423b3c763f1

    SHA512

    c1029c3006f1729bc4ec60679b7f6e8bcbbd7aad0e5eefcf8c0822df6a6777201711dd8ca5c3bb8911bf808f0e152f3b3e06b9731b25e4f4e51b98fce071cd8a

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8035758.exe

    Filesize

    416KB

    MD5

    e2795bc01b50b2c4d90ab0c776e1a269

    SHA1

    0507289a7fdcfefd23fbe23dd46b2247b5d68fa1

    SHA256

    b218a77597ccb2cc3b42b0b53fd17575870e697433f656187ff4c59bfe6d515a

    SHA512

    dafb6af435ab3b84f0ccb77dbe6866cac5b6c3e2cc92072db83bb5c9449c545fbbc17862b2d62eac9fabe93b8cd89613235d0228d78f4daf986f9523dce75bc7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z8035758.exe

    Filesize

    416KB

    MD5

    e2795bc01b50b2c4d90ab0c776e1a269

    SHA1

    0507289a7fdcfefd23fbe23dd46b2247b5d68fa1

    SHA256

    b218a77597ccb2cc3b42b0b53fd17575870e697433f656187ff4c59bfe6d515a

    SHA512

    dafb6af435ab3b84f0ccb77dbe6866cac5b6c3e2cc92072db83bb5c9449c545fbbc17862b2d62eac9fabe93b8cd89613235d0228d78f4daf986f9523dce75bc7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n7448528.exe

    Filesize

    360KB

    MD5

    de3c4809fdd333def21bfcba55da1a1f

    SHA1

    a7fa58339f83dabf837c83dc8dc31e5fc65fd1c5

    SHA256

    afe7078c488a5e884f9ace725da1711a6268dc54d79a4766855643e3eb183660

    SHA512

    8ea7b67738d061c261d5e26f74b6e80fc1ecbed4cfbce101b710195f4eafa041f4ff8a3e1c8b9263253f6bf38bdfcb1301e01d3b1a688329103ecf3145d6c3b4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n7448528.exe

    Filesize

    360KB

    MD5

    de3c4809fdd333def21bfcba55da1a1f

    SHA1

    a7fa58339f83dabf837c83dc8dc31e5fc65fd1c5

    SHA256

    afe7078c488a5e884f9ace725da1711a6268dc54d79a4766855643e3eb183660

    SHA512

    8ea7b67738d061c261d5e26f74b6e80fc1ecbed4cfbce101b710195f4eafa041f4ff8a3e1c8b9263253f6bf38bdfcb1301e01d3b1a688329103ecf3145d6c3b4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\n7448528.exe

    Filesize

    360KB

    MD5

    de3c4809fdd333def21bfcba55da1a1f

    SHA1

    a7fa58339f83dabf837c83dc8dc31e5fc65fd1c5

    SHA256

    afe7078c488a5e884f9ace725da1711a6268dc54d79a4766855643e3eb183660

    SHA512

    8ea7b67738d061c261d5e26f74b6e80fc1ecbed4cfbce101b710195f4eafa041f4ff8a3e1c8b9263253f6bf38bdfcb1301e01d3b1a688329103ecf3145d6c3b4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o3856791.exe

    Filesize

    168KB

    MD5

    05f1bf56723c6af23c89d2bd93e23ee2

    SHA1

    635c5756c28d8a008f46e0cfb5eed5a1e1441b6a

    SHA256

    aa412a0a098d63da8cde641a630cf7c35ab7e67db75fe2f0ceb84f6a4cf09919

    SHA512

    cf0f351c602b4b92f1976e9cb50670852949dca5229c50678d01b6dc301b7b1974e18076bb638a436053542858f119e82007a2131d316c002ca4a0719aafefb4

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\o3856791.exe

    Filesize

    168KB

    MD5

    05f1bf56723c6af23c89d2bd93e23ee2

    SHA1

    635c5756c28d8a008f46e0cfb5eed5a1e1441b6a

    SHA256

    aa412a0a098d63da8cde641a630cf7c35ab7e67db75fe2f0ceb84f6a4cf09919

    SHA512

    cf0f351c602b4b92f1976e9cb50670852949dca5229c50678d01b6dc301b7b1974e18076bb638a436053542858f119e82007a2131d316c002ca4a0719aafefb4

  • memory/480-106-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/480-125-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-103-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/480-107-0x0000000000E10000-0x0000000000E28000-memory.dmp

    Filesize

    96KB

  • memory/480-108-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-109-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-111-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-113-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-115-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-117-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-119-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-121-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-123-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-104-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/480-127-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-129-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-131-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-133-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-135-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB

  • memory/480-139-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/480-101-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/480-100-0x0000000000BC0000-0x0000000000BDA000-memory.dmp

    Filesize

    104KB

  • memory/480-99-0x0000000000400000-0x00000000006F4000-memory.dmp

    Filesize

    3.0MB

  • memory/480-98-0x0000000000270000-0x000000000029D000-memory.dmp

    Filesize

    180KB

  • memory/1256-146-0x0000000000190000-0x00000000001BE000-memory.dmp

    Filesize

    184KB

  • memory/1256-147-0x00000000003D0000-0x00000000003D6000-memory.dmp

    Filesize

    24KB

  • memory/1256-148-0x0000000004D80000-0x0000000004DC0000-memory.dmp

    Filesize

    256KB

  • memory/1256-149-0x0000000004D80000-0x0000000004DC0000-memory.dmp

    Filesize

    256KB