Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/05/2023, 12:21

General

  • Target

    eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe

  • Size

    560KB

  • MD5

    be335d601e2c6e34197ce189533dabad

  • SHA1

    0627bb8020d664229f3e20ed56bb996bd480ce08

  • SHA256

    eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf

  • SHA512

    b2dfbba5d0578fa8d92e5496a11db6c2027c58b10a1b659683511320449ef3efe59cfa1dd7bab5521aad7d7be05150862504b60f7162071611cbeedf596fcb27

  • SSDEEP

    12288:QMrLy90YmNbZ+o+kg/rfPt1ut0w5eVHNbHMH0Np:LyOVd+kgPut0w5IeHKp

Malware Config

Extracted

Family

redline

Botnet

gogen

C2

185.161.248.75:4132

Attributes
  • auth_value

    dfb27ce11afd52277523c8e405853d53

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe
    "C:\Users\Admin\AppData\Local\Temp\eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe
        3⤵
        • Executes dropped EXE
        PID:4744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\d9397249.exe.log

    Filesize

    425B

    MD5

    605f809fab8c19729d39d075f7ffdb53

    SHA1

    c546f877c9bd53563174a90312a8337fdfc5fdd9

    SHA256

    6904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556

    SHA512

    82cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exe

    Filesize

    184KB

    MD5

    d4c640fb500618ad6c9fc5fe7d3e784d

    SHA1

    850df0880e1685ce709b44afbbb365cab4f0fec4

    SHA256

    a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b

    SHA512

    a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exe

    Filesize

    184KB

    MD5

    d4c640fb500618ad6c9fc5fe7d3e784d

    SHA1

    850df0880e1685ce709b44afbbb365cab4f0fec4

    SHA256

    a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b

    SHA512

    a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe

    Filesize

    904KB

    MD5

    da1392ce8a745ff84066b4b89891c820

    SHA1

    da95517cc9fd2904df61fbada3268ba8b074c5f1

    SHA256

    52b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207

    SHA512

    bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe

    Filesize

    904KB

    MD5

    da1392ce8a745ff84066b4b89891c820

    SHA1

    da95517cc9fd2904df61fbada3268ba8b074c5f1

    SHA256

    52b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207

    SHA512

    bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe

    Filesize

    904KB

    MD5

    da1392ce8a745ff84066b4b89891c820

    SHA1

    da95517cc9fd2904df61fbada3268ba8b074c5f1

    SHA256

    52b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207

    SHA512

    bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570

  • memory/392-128-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-158-0x0000000002180000-0x0000000002190000-memory.dmp

    Filesize

    64KB

  • memory/392-129-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-132-0x0000000002180000-0x0000000002190000-memory.dmp

    Filesize

    64KB

  • memory/392-127-0x0000000002180000-0x0000000002190000-memory.dmp

    Filesize

    64KB

  • memory/392-135-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-137-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-139-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-141-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-143-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-145-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-147-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-149-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-151-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-153-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-155-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-157-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-133-0x0000000002420000-0x0000000002436000-memory.dmp

    Filesize

    88KB

  • memory/392-159-0x0000000002180000-0x0000000002190000-memory.dmp

    Filesize

    64KB

  • memory/392-160-0x0000000002180000-0x0000000002190000-memory.dmp

    Filesize

    64KB

  • memory/392-130-0x0000000002180000-0x0000000002190000-memory.dmp

    Filesize

    64KB

  • memory/392-126-0x0000000002420000-0x000000000243C000-memory.dmp

    Filesize

    112KB

  • memory/392-124-0x0000000002160000-0x000000000217E000-memory.dmp

    Filesize

    120KB

  • memory/392-125-0x0000000004A90000-0x0000000004F8E000-memory.dmp

    Filesize

    5.0MB

  • memory/2848-165-0x0000000000820000-0x0000000000908000-memory.dmp

    Filesize

    928KB

  • memory/4744-166-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4744-170-0x0000000005CE0000-0x00000000062E6000-memory.dmp

    Filesize

    6.0MB

  • memory/4744-171-0x0000000005820000-0x000000000592A000-memory.dmp

    Filesize

    1.0MB

  • memory/4744-172-0x0000000005740000-0x0000000005752000-memory.dmp

    Filesize

    72KB

  • memory/4744-173-0x00000000057A0000-0x00000000057DE000-memory.dmp

    Filesize

    248KB

  • memory/4744-174-0x0000000005B20000-0x0000000005B30000-memory.dmp

    Filesize

    64KB

  • memory/4744-175-0x0000000005930000-0x000000000597B000-memory.dmp

    Filesize

    300KB

  • memory/4744-176-0x0000000005B20000-0x0000000005B30000-memory.dmp

    Filesize

    64KB