Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2023, 05:32

General

  • Target

    4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe

  • Size

    1.1MB

  • MD5

    6ebca2a77054da695d23d99488a9c573

  • SHA1

    510ccb61f13c0c68a285d5dc3e58c4f836c1dd02

  • SHA256

    4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a

  • SHA512

    1e103fa2b733ea995af6dfaaff6d8e795abf1668bd9fbdc1d63a10aef5f8d594254386fce9ff1ea4c913f130eb06d51856d5f54b78413b9ed821f3f13664f146

  • SSDEEP

    24576:tyc2UCSTgKddXMGWS0kPG4nTXSaBr932tNCKoNFvn9mYgfwgRaB:IgvgKddXkS0kemd1IgJNl9mmgRa

Malware Config

Extracted

Family

redline

Botnet

lopuh

C2

185.161.248.75:4132

Attributes
  • auth_value

    5852b05de9da526581993068a4e7e915

Extracted

Family

redline

Botnet

horor

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8d506fe48db15c38fb031d07f42d529

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe
    "C:\Users\Admin\AppData\Local\Temp\4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1233563.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1233563.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4510314.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4510314.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3140
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0349115.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0349115.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2024
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3709956.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3709956.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3938882.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3938882.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3308
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3938882.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3938882.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4441571.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4441571.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3228
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4441571.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4441571.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:3156
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 12
          4⤵
          • Program crash
          PID:856
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3156 -ip 3156
    1⤵
      PID:1532

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r3938882.exe.log

      Filesize

      425B

      MD5

      4eaca4566b22b01cd3bc115b9b0b2196

      SHA1

      e743e0792c19f71740416e7b3c061d9f1336bf94

      SHA256

      34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

      SHA512

      bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4441571.exe

      Filesize

      961KB

      MD5

      5d849045d7a1307b45188599092c2e44

      SHA1

      0321164653307bd28ea6c3c08cc57fe6898ec573

      SHA256

      7774d6cfb57d229891cfb249c47dc572b3836858c013c1b54abdc08957908626

      SHA512

      8e4fbbf056265e040cefe0c52340708434f8d500018bb7b70837a5e24a5d017fe1d8b94dc9314000c5cbf2a813d2d0a36c8c16cfe33032bbe1df927168de68ba

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4441571.exe

      Filesize

      961KB

      MD5

      5d849045d7a1307b45188599092c2e44

      SHA1

      0321164653307bd28ea6c3c08cc57fe6898ec573

      SHA256

      7774d6cfb57d229891cfb249c47dc572b3836858c013c1b54abdc08957908626

      SHA512

      8e4fbbf056265e040cefe0c52340708434f8d500018bb7b70837a5e24a5d017fe1d8b94dc9314000c5cbf2a813d2d0a36c8c16cfe33032bbe1df927168de68ba

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4441571.exe

      Filesize

      961KB

      MD5

      5d849045d7a1307b45188599092c2e44

      SHA1

      0321164653307bd28ea6c3c08cc57fe6898ec573

      SHA256

      7774d6cfb57d229891cfb249c47dc572b3836858c013c1b54abdc08957908626

      SHA512

      8e4fbbf056265e040cefe0c52340708434f8d500018bb7b70837a5e24a5d017fe1d8b94dc9314000c5cbf2a813d2d0a36c8c16cfe33032bbe1df927168de68ba

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1233563.exe

      Filesize

      701KB

      MD5

      07f0f4d690dc418bcafb50dcff91c892

      SHA1

      314887625cd9f6fe15a5394ebbb5cd8c72746d03

      SHA256

      9ef2e74971005c1bd07cf8c0cff267f425c0d3aa96608c655a68c8b63759e661

      SHA512

      887a5dc59954d97cee3e74d7fea74bb313287ddab9bd2f24dca5766a892de974c9d37a1a1c90898fc885b9a437ae221eea624a68ffb266514fbf2f194f91af94

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1233563.exe

      Filesize

      701KB

      MD5

      07f0f4d690dc418bcafb50dcff91c892

      SHA1

      314887625cd9f6fe15a5394ebbb5cd8c72746d03

      SHA256

      9ef2e74971005c1bd07cf8c0cff267f425c0d3aa96608c655a68c8b63759e661

      SHA512

      887a5dc59954d97cee3e74d7fea74bb313287ddab9bd2f24dca5766a892de974c9d37a1a1c90898fc885b9a437ae221eea624a68ffb266514fbf2f194f91af94

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3938882.exe

      Filesize

      904KB

      MD5

      6a27ca557cf8ac7b454a5c231160975a

      SHA1

      b058c3af993da43f4b3908c6abba86a3d5112dbd

      SHA256

      cdb0be38750aa1ed8d81ebf78bf70c8fa53faae037c7fd6ee5349351edf7e7ff

      SHA512

      dcc078490c6491446ad3a3a35728db05b8aea131ab2d49d83f1d475e569b52b4d60663188592655c644f7b961f1905a0574dcb7920379d324e76be52ffc4911a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3938882.exe

      Filesize

      904KB

      MD5

      6a27ca557cf8ac7b454a5c231160975a

      SHA1

      b058c3af993da43f4b3908c6abba86a3d5112dbd

      SHA256

      cdb0be38750aa1ed8d81ebf78bf70c8fa53faae037c7fd6ee5349351edf7e7ff

      SHA512

      dcc078490c6491446ad3a3a35728db05b8aea131ab2d49d83f1d475e569b52b4d60663188592655c644f7b961f1905a0574dcb7920379d324e76be52ffc4911a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3938882.exe

      Filesize

      904KB

      MD5

      6a27ca557cf8ac7b454a5c231160975a

      SHA1

      b058c3af993da43f4b3908c6abba86a3d5112dbd

      SHA256

      cdb0be38750aa1ed8d81ebf78bf70c8fa53faae037c7fd6ee5349351edf7e7ff

      SHA512

      dcc078490c6491446ad3a3a35728db05b8aea131ab2d49d83f1d475e569b52b4d60663188592655c644f7b961f1905a0574dcb7920379d324e76be52ffc4911a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4510314.exe

      Filesize

      305KB

      MD5

      6028b9e20ab87fbea63f592e0088fc58

      SHA1

      f247f91951c7dee5353f4f42095b041d3c1b9321

      SHA256

      c5aaf2d4f527d190faf4e4de015c867b218f59b32feafa2b5ae99cd391c46544

      SHA512

      1f0c438a028aae4735b2383c53bec67438aade2016255f3cd3520efaf9296282f1a436df5b4f997c52145895f933107b65c3b785b31543bc984e9a5d96c7e6ae

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4510314.exe

      Filesize

      305KB

      MD5

      6028b9e20ab87fbea63f592e0088fc58

      SHA1

      f247f91951c7dee5353f4f42095b041d3c1b9321

      SHA256

      c5aaf2d4f527d190faf4e4de015c867b218f59b32feafa2b5ae99cd391c46544

      SHA512

      1f0c438a028aae4735b2383c53bec67438aade2016255f3cd3520efaf9296282f1a436df5b4f997c52145895f933107b65c3b785b31543bc984e9a5d96c7e6ae

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0349115.exe

      Filesize

      185KB

      MD5

      9849d9adf777a426b91b6281ef8d4f99

      SHA1

      f3d9f01fc1d0466ffb5c3633a2a8856962a35d67

      SHA256

      f25ea1f85490ac6ec63828fb2ad0b798a7c4569501c8766370fbccf46d57ff77

      SHA512

      11e37d68626b5a88330bf25091e19db03078042e236cf4abad939bd22158365daaeb5c3a6c51a41fa37f73d8e93702e7beab26757dd08450e667852712d2af46

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0349115.exe

      Filesize

      185KB

      MD5

      9849d9adf777a426b91b6281ef8d4f99

      SHA1

      f3d9f01fc1d0466ffb5c3633a2a8856962a35d67

      SHA256

      f25ea1f85490ac6ec63828fb2ad0b798a7c4569501c8766370fbccf46d57ff77

      SHA512

      11e37d68626b5a88330bf25091e19db03078042e236cf4abad939bd22158365daaeb5c3a6c51a41fa37f73d8e93702e7beab26757dd08450e667852712d2af46

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3709956.exe

      Filesize

      145KB

      MD5

      13a25ac5822ba1fe8d84bbf10f90a87d

      SHA1

      1df7663dcac98b8bc5bde966009859a0175420f9

      SHA256

      23fb823ff90b656adecd76722d95153702cb07bfa1771ee254be38d4de51694f

      SHA512

      f4c3686d14bde3dedc81aa248d8f08a6ec14a12ce6aaec7d3de7a79a8a8c0b0068a83f536da3a1bef3a8dd8ab68e07ef6c1ede0f20fec162134c024cb357e518

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3709956.exe

      Filesize

      145KB

      MD5

      13a25ac5822ba1fe8d84bbf10f90a87d

      SHA1

      1df7663dcac98b8bc5bde966009859a0175420f9

      SHA256

      23fb823ff90b656adecd76722d95153702cb07bfa1771ee254be38d4de51694f

      SHA512

      f4c3686d14bde3dedc81aa248d8f08a6ec14a12ce6aaec7d3de7a79a8a8c0b0068a83f536da3a1bef3a8dd8ab68e07ef6c1ede0f20fec162134c024cb357e518

    • memory/1848-192-0x0000000000310000-0x000000000033A000-memory.dmp

      Filesize

      168KB

    • memory/1848-204-0x0000000004FF0000-0x0000000005000000-memory.dmp

      Filesize

      64KB

    • memory/1848-203-0x0000000006510000-0x0000000006560000-memory.dmp

      Filesize

      320KB

    • memory/1848-202-0x0000000006750000-0x00000000067C6000-memory.dmp

      Filesize

      472KB

    • memory/1848-201-0x0000000006C80000-0x00000000071AC000-memory.dmp

      Filesize

      5.2MB

    • memory/1848-200-0x0000000006580000-0x0000000006742000-memory.dmp

      Filesize

      1.8MB

    • memory/1848-199-0x0000000005140000-0x00000000051A6000-memory.dmp

      Filesize

      408KB

    • memory/1848-198-0x00000000050A0000-0x0000000005132000-memory.dmp

      Filesize

      584KB

    • memory/1848-197-0x0000000004FF0000-0x0000000005000000-memory.dmp

      Filesize

      64KB

    • memory/1848-196-0x0000000004D40000-0x0000000004D7C000-memory.dmp

      Filesize

      240KB

    • memory/1848-195-0x0000000004CE0000-0x0000000004CF2000-memory.dmp

      Filesize

      72KB

    • memory/1848-194-0x0000000004DB0000-0x0000000004EBA000-memory.dmp

      Filesize

      1.0MB

    • memory/1848-193-0x0000000005230000-0x0000000005848000-memory.dmp

      Filesize

      6.1MB

    • memory/2024-186-0x00000000024A0000-0x00000000024B0000-memory.dmp

      Filesize

      64KB

    • memory/2024-160-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-166-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-187-0x00000000024A0000-0x00000000024B0000-memory.dmp

      Filesize

      64KB

    • memory/2024-168-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-185-0x00000000024A0000-0x00000000024B0000-memory.dmp

      Filesize

      64KB

    • memory/2024-184-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-182-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-180-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-178-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-176-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-174-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-172-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-170-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-162-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-164-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-154-0x00000000024A0000-0x00000000024B0000-memory.dmp

      Filesize

      64KB

    • memory/2024-155-0x00000000024A0000-0x00000000024B0000-memory.dmp

      Filesize

      64KB

    • memory/2024-156-0x0000000004910000-0x0000000004EB4000-memory.dmp

      Filesize

      5.6MB

    • memory/2024-158-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/2024-157-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3156-221-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3228-218-0x00000000004C0000-0x00000000005B6000-memory.dmp

      Filesize

      984KB

    • memory/3228-220-0x00000000073C0000-0x00000000073D0000-memory.dmp

      Filesize

      64KB

    • memory/3308-210-0x0000000007D80000-0x0000000007D90000-memory.dmp

      Filesize

      64KB

    • memory/3308-209-0x0000000000FB0000-0x0000000001098000-memory.dmp

      Filesize

      928KB

    • memory/3836-211-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3836-219-0x00000000057A0000-0x00000000057B0000-memory.dmp

      Filesize

      64KB