Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2023, 01:30

General

  • Target

    fecf856b99edb62d300108f908c3fd958e74291ab84f9f3114caaaf9de229680.exe

  • Size

    1.1MB

  • MD5

    88c1ee32fb16e295b2e845bd8dd51b93

  • SHA1

    6be47a42849f15f565da66dfa097f6b5265f5075

  • SHA256

    fecf856b99edb62d300108f908c3fd958e74291ab84f9f3114caaaf9de229680

  • SHA512

    577ba596c746d173c7a6718e3af8c9c166a28813cbbb73abecc370bb54ff73edfe99c25f432182b037df90c393eade4577c3f8a86c8b15e2a26bb5677fcf443e

  • SSDEEP

    24576:+yABLYhtlEtECOl426WoU44ZkiyW0RHWNBc2DX3MI:NAurlEtEe8xy2o

Malware Config

Extracted

Family

redline

Botnet

mufta

C2

185.161.248.75:4132

Attributes
  • auth_value

    171bdaad6dbf652c48d4e9334c756dfa

Extracted

Family

redline

Botnet

fuga

C2

185.161.248.75:4132

Attributes
  • auth_value

    7c5144ad645deb9fa21680fdaee0d51f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fecf856b99edb62d300108f908c3fd958e74291ab84f9f3114caaaf9de229680.exe
    "C:\Users\Admin\AppData\Local\Temp\fecf856b99edb62d300108f908c3fd958e74291ab84f9f3114caaaf9de229680.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7419505.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7419505.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5816283.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5816283.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3456
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1336087.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1336087.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1276
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3272144.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3272144.exe
          4⤵
          • Executes dropped EXE
          PID:5080
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 928
            5⤵
            • Program crash
            PID:2384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4660955.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4660955.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3052
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4660955.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4660955.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1636
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1224
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of UnmapMainImage
              PID:3952
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 12
                7⤵
                • Program crash
                PID:3008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1024465.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1024465.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1024465.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1024465.exe
        3⤵
        • Executes dropped EXE
        PID:2088
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1024465.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1024465.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:2240
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 12
          4⤵
          • Program crash
          PID:4048
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5080 -ip 5080
    1⤵
      PID:2520
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3952 -ip 3952
      1⤵
        PID:1196
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2240 -ip 2240
        1⤵
          PID:4436

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1024465.exe

          Filesize

          902KB

          MD5

          cd8d09cf3840ce708f8a10204de0781d

          SHA1

          e6c421222422390d2995f1955c4ecbc7013abe69

          SHA256

          1f37d428b893a71ffe8b3cd36d8d3fed0844c88aa11764fc078fc81f3ee6cf2c

          SHA512

          f2d81403b5c8757f82d106854336b9e710921dd2b746aa796f0cfacd5beb43792939c9afa170d8b65d48602e0c686492f45460f7e71b9b24465b18b31b16bebc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1024465.exe

          Filesize

          902KB

          MD5

          cd8d09cf3840ce708f8a10204de0781d

          SHA1

          e6c421222422390d2995f1955c4ecbc7013abe69

          SHA256

          1f37d428b893a71ffe8b3cd36d8d3fed0844c88aa11764fc078fc81f3ee6cf2c

          SHA512

          f2d81403b5c8757f82d106854336b9e710921dd2b746aa796f0cfacd5beb43792939c9afa170d8b65d48602e0c686492f45460f7e71b9b24465b18b31b16bebc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1024465.exe

          Filesize

          902KB

          MD5

          cd8d09cf3840ce708f8a10204de0781d

          SHA1

          e6c421222422390d2995f1955c4ecbc7013abe69

          SHA256

          1f37d428b893a71ffe8b3cd36d8d3fed0844c88aa11764fc078fc81f3ee6cf2c

          SHA512

          f2d81403b5c8757f82d106854336b9e710921dd2b746aa796f0cfacd5beb43792939c9afa170d8b65d48602e0c686492f45460f7e71b9b24465b18b31b16bebc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1024465.exe

          Filesize

          902KB

          MD5

          cd8d09cf3840ce708f8a10204de0781d

          SHA1

          e6c421222422390d2995f1955c4ecbc7013abe69

          SHA256

          1f37d428b893a71ffe8b3cd36d8d3fed0844c88aa11764fc078fc81f3ee6cf2c

          SHA512

          f2d81403b5c8757f82d106854336b9e710921dd2b746aa796f0cfacd5beb43792939c9afa170d8b65d48602e0c686492f45460f7e71b9b24465b18b31b16bebc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7419505.exe

          Filesize

          749KB

          MD5

          f4dbfddb199e8debc33d41981f15c7ac

          SHA1

          05dc4ba214f6127afcfa06203a10425c254b09a2

          SHA256

          531fdd5d697eae030b3c77519c6036e5c2929750e2983a8df4039281d89ecfa1

          SHA512

          51d00d60bf444a5a0be8531054b060340fe0fff91122956948a8927bd2265a8a910b8a08b8df21de6825c587c5faaae7b2e97e67004fbca610d983cff33d0e99

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7419505.exe

          Filesize

          749KB

          MD5

          f4dbfddb199e8debc33d41981f15c7ac

          SHA1

          05dc4ba214f6127afcfa06203a10425c254b09a2

          SHA256

          531fdd5d697eae030b3c77519c6036e5c2929750e2983a8df4039281d89ecfa1

          SHA512

          51d00d60bf444a5a0be8531054b060340fe0fff91122956948a8927bd2265a8a910b8a08b8df21de6825c587c5faaae7b2e97e67004fbca610d983cff33d0e99

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4660955.exe

          Filesize

          962KB

          MD5

          fac197d7e6c745cf80441cebfafe94f6

          SHA1

          dcfe1c5ed6024849aefa127bcff39bb66452ba78

          SHA256

          af86fab45bfd79e5cfd663dbd13e29cb7215d8848caba495c7b5fb8652eb8715

          SHA512

          2d73d4ca68b8abc29eeea6e6d79da039e061684a1fd33b1470d6edc7144e3339f5c33957d7860d332b3e930c1902d0f3ce411ff4412d5a5b584fe2303c98b638

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4660955.exe

          Filesize

          962KB

          MD5

          fac197d7e6c745cf80441cebfafe94f6

          SHA1

          dcfe1c5ed6024849aefa127bcff39bb66452ba78

          SHA256

          af86fab45bfd79e5cfd663dbd13e29cb7215d8848caba495c7b5fb8652eb8715

          SHA512

          2d73d4ca68b8abc29eeea6e6d79da039e061684a1fd33b1470d6edc7144e3339f5c33957d7860d332b3e930c1902d0f3ce411ff4412d5a5b584fe2303c98b638

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4660955.exe

          Filesize

          962KB

          MD5

          fac197d7e6c745cf80441cebfafe94f6

          SHA1

          dcfe1c5ed6024849aefa127bcff39bb66452ba78

          SHA256

          af86fab45bfd79e5cfd663dbd13e29cb7215d8848caba495c7b5fb8652eb8715

          SHA512

          2d73d4ca68b8abc29eeea6e6d79da039e061684a1fd33b1470d6edc7144e3339f5c33957d7860d332b3e930c1902d0f3ce411ff4412d5a5b584fe2303c98b638

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5816283.exe

          Filesize

          305KB

          MD5

          0fd93596d6063b8722d5473408950773

          SHA1

          4ac58161c965a130dd36d167e27f8d255fae0bcb

          SHA256

          9faa8fb0f555cf1e262457db70ef8af73f1a8ab3e4afcf24f1459a81f55c7d99

          SHA512

          f408604263dfcfb75e6d61a151312ba09a7cc4b81554b39320a67a84a16326081d266cbb4387d738439631d627f07cf1e7155835d8f4f5a8361947a88664f54b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5816283.exe

          Filesize

          305KB

          MD5

          0fd93596d6063b8722d5473408950773

          SHA1

          4ac58161c965a130dd36d167e27f8d255fae0bcb

          SHA256

          9faa8fb0f555cf1e262457db70ef8af73f1a8ab3e4afcf24f1459a81f55c7d99

          SHA512

          f408604263dfcfb75e6d61a151312ba09a7cc4b81554b39320a67a84a16326081d266cbb4387d738439631d627f07cf1e7155835d8f4f5a8361947a88664f54b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1336087.exe

          Filesize

          183KB

          MD5

          d18dd7e957d8eab39abe21eefd498331

          SHA1

          2d7b11252dbb1ed8cefff8d63d447b0f697a0060

          SHA256

          57f8f54609021997865fed724894ad76b78b39a48a51b47a1d97a92eb836c440

          SHA512

          c383080be8f9fbb5fd313204cc47ca9ecca8b6148362aa5ef76c219217971184472d0c4be2f1d7e9c9fbee561079b34357346507ddb882d779b06741a5ad0581

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1336087.exe

          Filesize

          183KB

          MD5

          d18dd7e957d8eab39abe21eefd498331

          SHA1

          2d7b11252dbb1ed8cefff8d63d447b0f697a0060

          SHA256

          57f8f54609021997865fed724894ad76b78b39a48a51b47a1d97a92eb836c440

          SHA512

          c383080be8f9fbb5fd313204cc47ca9ecca8b6148362aa5ef76c219217971184472d0c4be2f1d7e9c9fbee561079b34357346507ddb882d779b06741a5ad0581

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3272144.exe

          Filesize

          145KB

          MD5

          f3dbda8ce2ce5ab20bb537ed402bc7ad

          SHA1

          5d3d2cd0adc00fc0b8327f8734bd7aab10dfbb4d

          SHA256

          83ec5ff710d45511afcb097a143b38098e2b7d12374855eaa7b107cf34f21905

          SHA512

          ad5b68bda307f61d7b035962dddacb01b11281b3fa1202929db88fe514ac4cfb9e0f1bc7cb753356c6e6cb2e73cf051908d4043786728cb10493bbd6815a5c41

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3272144.exe

          Filesize

          145KB

          MD5

          f3dbda8ce2ce5ab20bb537ed402bc7ad

          SHA1

          5d3d2cd0adc00fc0b8327f8734bd7aab10dfbb4d

          SHA256

          83ec5ff710d45511afcb097a143b38098e2b7d12374855eaa7b107cf34f21905

          SHA512

          ad5b68bda307f61d7b035962dddacb01b11281b3fa1202929db88fe514ac4cfb9e0f1bc7cb753356c6e6cb2e73cf051908d4043786728cb10493bbd6815a5c41

        • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

          Filesize

          962KB

          MD5

          fac197d7e6c745cf80441cebfafe94f6

          SHA1

          dcfe1c5ed6024849aefa127bcff39bb66452ba78

          SHA256

          af86fab45bfd79e5cfd663dbd13e29cb7215d8848caba495c7b5fb8652eb8715

          SHA512

          2d73d4ca68b8abc29eeea6e6d79da039e061684a1fd33b1470d6edc7144e3339f5c33957d7860d332b3e930c1902d0f3ce411ff4412d5a5b584fe2303c98b638

        • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

          Filesize

          962KB

          MD5

          fac197d7e6c745cf80441cebfafe94f6

          SHA1

          dcfe1c5ed6024849aefa127bcff39bb66452ba78

          SHA256

          af86fab45bfd79e5cfd663dbd13e29cb7215d8848caba495c7b5fb8652eb8715

          SHA512

          2d73d4ca68b8abc29eeea6e6d79da039e061684a1fd33b1470d6edc7144e3339f5c33957d7860d332b3e930c1902d0f3ce411ff4412d5a5b584fe2303c98b638

        • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

          Filesize

          962KB

          MD5

          fac197d7e6c745cf80441cebfafe94f6

          SHA1

          dcfe1c5ed6024849aefa127bcff39bb66452ba78

          SHA256

          af86fab45bfd79e5cfd663dbd13e29cb7215d8848caba495c7b5fb8652eb8715

          SHA512

          2d73d4ca68b8abc29eeea6e6d79da039e061684a1fd33b1470d6edc7144e3339f5c33957d7860d332b3e930c1902d0f3ce411ff4412d5a5b584fe2303c98b638

        • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

          Filesize

          962KB

          MD5

          fac197d7e6c745cf80441cebfafe94f6

          SHA1

          dcfe1c5ed6024849aefa127bcff39bb66452ba78

          SHA256

          af86fab45bfd79e5cfd663dbd13e29cb7215d8848caba495c7b5fb8652eb8715

          SHA512

          2d73d4ca68b8abc29eeea6e6d79da039e061684a1fd33b1470d6edc7144e3339f5c33957d7860d332b3e930c1902d0f3ce411ff4412d5a5b584fe2303c98b638

        • memory/1224-225-0x0000000007420000-0x0000000007430000-memory.dmp

          Filesize

          64KB

        • memory/1276-166-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-162-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-183-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/1276-184-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/1276-185-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/1276-186-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/1276-187-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/1276-188-0x00000000049B0000-0x00000000049C0000-memory.dmp

          Filesize

          64KB

        • memory/1276-180-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-178-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-154-0x00000000049C0000-0x0000000004F64000-memory.dmp

          Filesize

          5.6MB

        • memory/1276-155-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-176-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-174-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-156-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-158-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-172-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-160-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-170-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-182-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-168-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1276-164-0x0000000004960000-0x0000000004976000-memory.dmp

          Filesize

          88KB

        • memory/1636-209-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1636-205-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1636-202-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1636-224-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1636-199-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/2240-230-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3052-198-0x0000000007D60000-0x0000000007D70000-memory.dmp

          Filesize

          64KB

        • memory/3052-197-0x0000000000ED0000-0x0000000000FC8000-memory.dmp

          Filesize

          992KB

        • memory/4512-210-0x0000000007AB0000-0x0000000007AC0000-memory.dmp

          Filesize

          64KB

        • memory/4512-208-0x0000000000BC0000-0x0000000000CA8000-memory.dmp

          Filesize

          928KB

        • memory/5080-193-0x00000000007D0000-0x00000000007FA000-memory.dmp

          Filesize

          168KB