Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    93s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/05/2023, 13:35

General

  • Target

    b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe

  • Size

    1.1MB

  • MD5

    d751c801c8b6018830159a74b6e0be93

  • SHA1

    d11733f998c8bbd482b0d5fe28cfb7fa613545df

  • SHA256

    b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104

  • SHA512

    f96d4833837ad8aaa94759bf4ebedd5096e439553f63f2f3eb1fcf859a579e9612ca6869acbd5897b2f978c5fcbaeef2eef6ff33a4753b837ea4666222764f9e

  • SSDEEP

    24576:Uy0uqe5AgFfIJCumAk0Lu1tOb8auQkz6WKEcIktVDyym:j5HLuR9u1wb8aWQVDyy

Malware Config

Extracted

Family

redline

Botnet

ment

C2

185.161.248.25:4132

Attributes
  • auth_value

    650f2fd9e43f18bed6e23c78d8cfb0af

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe
    "C:\Users\Admin\AppData\Local\Temp\b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8147650.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8147650.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0391532.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0391532.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4800
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6551953.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6551953.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4832
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5094593.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5094593.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5979213.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5979213.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5979213.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5979213.exe
          4⤵
          • Executes dropped EXE
          PID:4384
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 24
            5⤵
            • Program crash
            PID:1308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0533351.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0533351.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0533351.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0533351.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\d0533351.exe.log

    Filesize

    425B

    MD5

    605f809fab8c19729d39d075f7ffdb53

    SHA1

    c546f877c9bd53563174a90312a8337fdfc5fdd9

    SHA256

    6904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556

    SHA512

    82cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0533351.exe

    Filesize

    904KB

    MD5

    68d4073dd3f44d0425933789acb11670

    SHA1

    e4e0792cbc16507508e9b633c77b023675562731

    SHA256

    00b4641c9ebe86ebf36f15ece0014911965cd2c5dd6cd839518b87fae013f5e4

    SHA512

    12408b78d1fb0b6a5ec8ca4cac10fb7e85b613eb16c9f3f7af4b84b2e34082a62b7faba9eaa369d527f7b2a76ad1902652c2bbba11ccc591e1ec628c4cb74046

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0533351.exe

    Filesize

    904KB

    MD5

    68d4073dd3f44d0425933789acb11670

    SHA1

    e4e0792cbc16507508e9b633c77b023675562731

    SHA256

    00b4641c9ebe86ebf36f15ece0014911965cd2c5dd6cd839518b87fae013f5e4

    SHA512

    12408b78d1fb0b6a5ec8ca4cac10fb7e85b613eb16c9f3f7af4b84b2e34082a62b7faba9eaa369d527f7b2a76ad1902652c2bbba11ccc591e1ec628c4cb74046

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0533351.exe

    Filesize

    904KB

    MD5

    68d4073dd3f44d0425933789acb11670

    SHA1

    e4e0792cbc16507508e9b633c77b023675562731

    SHA256

    00b4641c9ebe86ebf36f15ece0014911965cd2c5dd6cd839518b87fae013f5e4

    SHA512

    12408b78d1fb0b6a5ec8ca4cac10fb7e85b613eb16c9f3f7af4b84b2e34082a62b7faba9eaa369d527f7b2a76ad1902652c2bbba11ccc591e1ec628c4cb74046

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8147650.exe

    Filesize

    750KB

    MD5

    a6d99f7d0c0b0a5e487d309cc6cc64d7

    SHA1

    77e2a8707ac39f18c48595c319c288f9ffed2c3e

    SHA256

    2e0ab30748c7214afdb6a9f3a941e86bbb66543b29d1eaaa20b2f478bdd0b5c5

    SHA512

    ee9462b968375a7b58a3d67637bada943846f5fefb88dab80e6939eed04867b26c423963e3314faf73383b3e79f7e6bc1cecec5ea330454a2343582da89e3180

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8147650.exe

    Filesize

    750KB

    MD5

    a6d99f7d0c0b0a5e487d309cc6cc64d7

    SHA1

    77e2a8707ac39f18c48595c319c288f9ffed2c3e

    SHA256

    2e0ab30748c7214afdb6a9f3a941e86bbb66543b29d1eaaa20b2f478bdd0b5c5

    SHA512

    ee9462b968375a7b58a3d67637bada943846f5fefb88dab80e6939eed04867b26c423963e3314faf73383b3e79f7e6bc1cecec5ea330454a2343582da89e3180

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5979213.exe

    Filesize

    963KB

    MD5

    adae3adaf6c3f263f93b4024044e3d7b

    SHA1

    5483184f4907f3e7a46cc228f80cf3568feabdff

    SHA256

    dd8732c9d35f12a8745d25013adad1b5071a83342f8148157b3ea7067dc076d9

    SHA512

    d3718c986d9921422ad57c9201a88a8d3cead54ce523fa515f72719f253e6faeca73b6e74f6c82f066f51153f9b1adfd7333411cf6902daccb065357525402cb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5979213.exe

    Filesize

    963KB

    MD5

    adae3adaf6c3f263f93b4024044e3d7b

    SHA1

    5483184f4907f3e7a46cc228f80cf3568feabdff

    SHA256

    dd8732c9d35f12a8745d25013adad1b5071a83342f8148157b3ea7067dc076d9

    SHA512

    d3718c986d9921422ad57c9201a88a8d3cead54ce523fa515f72719f253e6faeca73b6e74f6c82f066f51153f9b1adfd7333411cf6902daccb065357525402cb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5979213.exe

    Filesize

    963KB

    MD5

    adae3adaf6c3f263f93b4024044e3d7b

    SHA1

    5483184f4907f3e7a46cc228f80cf3568feabdff

    SHA256

    dd8732c9d35f12a8745d25013adad1b5071a83342f8148157b3ea7067dc076d9

    SHA512

    d3718c986d9921422ad57c9201a88a8d3cead54ce523fa515f72719f253e6faeca73b6e74f6c82f066f51153f9b1adfd7333411cf6902daccb065357525402cb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0391532.exe

    Filesize

    306KB

    MD5

    ae2229a0b687259abd2de1413d58b446

    SHA1

    9497ee1a23c52e490e8728b041ac225014fe4c0e

    SHA256

    0d4ceccd81d1c715a61169b78e38c260772b0490bbd03edaea5bad592b8f606f

    SHA512

    009b214ff9f6708897ac4f3b971964f8a8392e8d6c3be20c197498ddf5bf3c4c3056fa90846a3bc7175778782e12ec620741a69b54722b773cdf6d5f95b52104

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0391532.exe

    Filesize

    306KB

    MD5

    ae2229a0b687259abd2de1413d58b446

    SHA1

    9497ee1a23c52e490e8728b041ac225014fe4c0e

    SHA256

    0d4ceccd81d1c715a61169b78e38c260772b0490bbd03edaea5bad592b8f606f

    SHA512

    009b214ff9f6708897ac4f3b971964f8a8392e8d6c3be20c197498ddf5bf3c4c3056fa90846a3bc7175778782e12ec620741a69b54722b773cdf6d5f95b52104

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6551953.exe

    Filesize

    185KB

    MD5

    93df1d24446960f69c430f7a03661044

    SHA1

    f5f8277369142fcb87e04900f70888d6dadaa3e4

    SHA256

    1d435f2226ea81d1397b54f9db862822628045ba4bf66ca1a618b385a0e3f463

    SHA512

    0a268665faaef3364d718ccae27678a9c71c1810edbfe90d05f4b721e20974e735117f0c7b54b34cc3c57293465404d4d22cacebb8f6ca9dfd1c6872e384f4c5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6551953.exe

    Filesize

    185KB

    MD5

    93df1d24446960f69c430f7a03661044

    SHA1

    f5f8277369142fcb87e04900f70888d6dadaa3e4

    SHA256

    1d435f2226ea81d1397b54f9db862822628045ba4bf66ca1a618b385a0e3f463

    SHA512

    0a268665faaef3364d718ccae27678a9c71c1810edbfe90d05f4b721e20974e735117f0c7b54b34cc3c57293465404d4d22cacebb8f6ca9dfd1c6872e384f4c5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5094593.exe

    Filesize

    145KB

    MD5

    4a99329ce8847049163936576027700b

    SHA1

    30474694cd759bc636e922458688f393b730341c

    SHA256

    dc581ae1136adb11daf8b727f8dca787854baee25986c9bad4e3212018bbb554

    SHA512

    756634e8dbe822c323ff0b6a3e1507ce9d163ff35cc2d5c000359ab2eeb4d977d569004a3534f0a10891fc23be9dbbb00404a76cc7ce8327ad6ad68becf1a784

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5094593.exe

    Filesize

    145KB

    MD5

    4a99329ce8847049163936576027700b

    SHA1

    30474694cd759bc636e922458688f393b730341c

    SHA256

    dc581ae1136adb11daf8b727f8dca787854baee25986c9bad4e3212018bbb554

    SHA512

    756634e8dbe822c323ff0b6a3e1507ce9d163ff35cc2d5c000359ab2eeb4d977d569004a3534f0a10891fc23be9dbbb00404a76cc7ce8327ad6ad68becf1a784

  • memory/1516-191-0x0000000006270000-0x00000000062C0000-memory.dmp

    Filesize

    320KB

  • memory/1516-188-0x0000000006970000-0x0000000006B32000-memory.dmp

    Filesize

    1.8MB

  • memory/1516-180-0x0000000005660000-0x0000000005C66000-memory.dmp

    Filesize

    6.0MB

  • memory/1516-179-0x0000000000770000-0x000000000079A000-memory.dmp

    Filesize

    168KB

  • memory/1516-192-0x00000000051C0000-0x00000000051D0000-memory.dmp

    Filesize

    64KB

  • memory/1516-190-0x00000000062F0000-0x0000000006366000-memory.dmp

    Filesize

    472KB

  • memory/1516-189-0x0000000007070000-0x000000000759C000-memory.dmp

    Filesize

    5.2MB

  • memory/1516-181-0x00000000051D0000-0x00000000052DA000-memory.dmp

    Filesize

    1.0MB

  • memory/1516-187-0x0000000006050000-0x00000000060E2000-memory.dmp

    Filesize

    584KB

  • memory/1516-186-0x0000000005480000-0x00000000054E6000-memory.dmp

    Filesize

    408KB

  • memory/1516-185-0x00000000052E0000-0x000000000532B000-memory.dmp

    Filesize

    300KB

  • memory/1516-184-0x00000000051C0000-0x00000000051D0000-memory.dmp

    Filesize

    64KB

  • memory/1516-183-0x0000000005160000-0x000000000519E000-memory.dmp

    Filesize

    248KB

  • memory/1516-182-0x0000000005100000-0x0000000005112000-memory.dmp

    Filesize

    72KB

  • memory/4384-199-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4492-198-0x0000000007E20000-0x0000000007E30000-memory.dmp

    Filesize

    64KB

  • memory/4492-197-0x0000000000F30000-0x0000000001028000-memory.dmp

    Filesize

    992KB

  • memory/4652-207-0x00000000077A0000-0x00000000077B0000-memory.dmp

    Filesize

    64KB

  • memory/4652-205-0x00000000009A0000-0x0000000000A88000-memory.dmp

    Filesize

    928KB

  • memory/4832-146-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-156-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-170-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-168-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-164-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-166-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-150-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-162-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-148-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-152-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-173-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/4832-172-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-160-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-145-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-144-0x00000000024C0000-0x00000000024DC000-memory.dmp

    Filesize

    112KB

  • memory/4832-143-0x0000000004C60000-0x000000000515E000-memory.dmp

    Filesize

    5.0MB

  • memory/4832-174-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/4832-158-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-154-0x00000000024C0000-0x00000000024D7000-memory.dmp

    Filesize

    92KB

  • memory/4832-141-0x0000000004C50000-0x0000000004C60000-memory.dmp

    Filesize

    64KB

  • memory/4832-142-0x0000000002160000-0x000000000217E000-memory.dmp

    Filesize

    120KB

  • memory/4880-208-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4880-212-0x0000000002260000-0x00000000022AB000-memory.dmp

    Filesize

    300KB

  • memory/4880-213-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB