Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2023, 11:01

General

  • Target

    2454.exe

  • Size

    1.0MB

  • MD5

    a2e3ada01f6c8ce8724a7903064f21ea

  • SHA1

    38199193c3d02408b937b32167e38bb9fae1c6f6

  • SHA256

    86f3a75d3c1fdb2c101a9fd830930f91254e0dd70a353007b0719abafbf22c25

  • SHA512

    72e0173bbf937ed30d6359c42f1489218d46695732f55504356f68ba94c179009829c8af004c4270e19954965faf75559aeb3f70f8e2e81cacd9993d59604bf9

  • SSDEEP

    24576:/yX0i0tabVsXRmBOmfeGxi5LsxZWk1GekCjGeKJ:KkikLXRMGGxiZkZNjtK

Malware Config

Extracted

Family

redline

Botnet

meren

C2

77.91.68.253:19065

Attributes
  • auth_value

    a26557b435e44b55fdd4708fbba97d21

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2454.exe
    "C:\Users\Admin\AppData\Local\Temp\2454.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7210358.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7210358.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8773196.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8773196.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1356
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6461916.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6461916.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:524
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9249219.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9249219.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7210358.exe

    Filesize

    749KB

    MD5

    ad34eba2c2f3b4abbd912a4d812da842

    SHA1

    6ef94d130315bf1b8d5c053da3a328ee347d0ae9

    SHA256

    839ace289e14414aa707664722de9a97d5313ebf13b441fbb67a9d0adf141088

    SHA512

    2cf5dc22a8c2b19de7964cec4f53d27392af7dd863b345e8910c5afa895b54e036d9107805b7c4ac3e154a9ddaf54ed3056dc8a7a44bf62b0f23aa56f467ac9b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7210358.exe

    Filesize

    749KB

    MD5

    ad34eba2c2f3b4abbd912a4d812da842

    SHA1

    6ef94d130315bf1b8d5c053da3a328ee347d0ae9

    SHA256

    839ace289e14414aa707664722de9a97d5313ebf13b441fbb67a9d0adf141088

    SHA512

    2cf5dc22a8c2b19de7964cec4f53d27392af7dd863b345e8910c5afa895b54e036d9107805b7c4ac3e154a9ddaf54ed3056dc8a7a44bf62b0f23aa56f467ac9b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8773196.exe

    Filesize

    304KB

    MD5

    f479fef38f010fac216e0a555ab77f3b

    SHA1

    4dd31e069407a733a302b72f22863bd5791c3bc3

    SHA256

    3930da0be90c21f96c347340bd4539209cb8176d584ae772885627936ede0f4e

    SHA512

    86102732de2e89aac36a3cc387d451ee28e1bc54e5fb7e19ea880f836499a706eafcfd0805016f7095827f84a3cad03e12630f83de0ce779fc5a2b99cf3360af

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8773196.exe

    Filesize

    304KB

    MD5

    f479fef38f010fac216e0a555ab77f3b

    SHA1

    4dd31e069407a733a302b72f22863bd5791c3bc3

    SHA256

    3930da0be90c21f96c347340bd4539209cb8176d584ae772885627936ede0f4e

    SHA512

    86102732de2e89aac36a3cc387d451ee28e1bc54e5fb7e19ea880f836499a706eafcfd0805016f7095827f84a3cad03e12630f83de0ce779fc5a2b99cf3360af

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6461916.exe

    Filesize

    184KB

    MD5

    9d72824609f845f8dd6729fb784b941d

    SHA1

    38c240b3e32512ba0c8cc4c6b4e29899c69316a7

    SHA256

    2b8417fdb30ed15db7d8e8d0678b943017761053f379170649640a3c772bfe2e

    SHA512

    b803538fe1f32fe023336ceb77033b470840d7cc774a73997c75037a8876713ab07bc102fc11a9d1719ca64968d05450b21d3a1936ad902f650111ccbb8ee341

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6461916.exe

    Filesize

    184KB

    MD5

    9d72824609f845f8dd6729fb784b941d

    SHA1

    38c240b3e32512ba0c8cc4c6b4e29899c69316a7

    SHA256

    2b8417fdb30ed15db7d8e8d0678b943017761053f379170649640a3c772bfe2e

    SHA512

    b803538fe1f32fe023336ceb77033b470840d7cc774a73997c75037a8876713ab07bc102fc11a9d1719ca64968d05450b21d3a1936ad902f650111ccbb8ee341

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9249219.exe

    Filesize

    145KB

    MD5

    e6093c507d4e9685110f01e9b4e39870

    SHA1

    f774126cd3da7eacbebdc210fac15262be4ddc9d

    SHA256

    032b3a840216350f9ad1395e63cdd8a36065a6c7c1beded71a40a7699dafc0ac

    SHA512

    e49299bb3b7b6094dddbe0122c9160fab680cd15cbf2dcfae434e66f66d07a3256dc61d7a54b371d6f844ba5dbf4af11c42c5c5ad27ad70f5ea85dd38d060566

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9249219.exe

    Filesize

    145KB

    MD5

    e6093c507d4e9685110f01e9b4e39870

    SHA1

    f774126cd3da7eacbebdc210fac15262be4ddc9d

    SHA256

    032b3a840216350f9ad1395e63cdd8a36065a6c7c1beded71a40a7699dafc0ac

    SHA512

    e49299bb3b7b6094dddbe0122c9160fab680cd15cbf2dcfae434e66f66d07a3256dc61d7a54b371d6f844ba5dbf4af11c42c5c5ad27ad70f5ea85dd38d060566

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7210358.exe

    Filesize

    749KB

    MD5

    ad34eba2c2f3b4abbd912a4d812da842

    SHA1

    6ef94d130315bf1b8d5c053da3a328ee347d0ae9

    SHA256

    839ace289e14414aa707664722de9a97d5313ebf13b441fbb67a9d0adf141088

    SHA512

    2cf5dc22a8c2b19de7964cec4f53d27392af7dd863b345e8910c5afa895b54e036d9107805b7c4ac3e154a9ddaf54ed3056dc8a7a44bf62b0f23aa56f467ac9b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v7210358.exe

    Filesize

    749KB

    MD5

    ad34eba2c2f3b4abbd912a4d812da842

    SHA1

    6ef94d130315bf1b8d5c053da3a328ee347d0ae9

    SHA256

    839ace289e14414aa707664722de9a97d5313ebf13b441fbb67a9d0adf141088

    SHA512

    2cf5dc22a8c2b19de7964cec4f53d27392af7dd863b345e8910c5afa895b54e036d9107805b7c4ac3e154a9ddaf54ed3056dc8a7a44bf62b0f23aa56f467ac9b

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8773196.exe

    Filesize

    304KB

    MD5

    f479fef38f010fac216e0a555ab77f3b

    SHA1

    4dd31e069407a733a302b72f22863bd5791c3bc3

    SHA256

    3930da0be90c21f96c347340bd4539209cb8176d584ae772885627936ede0f4e

    SHA512

    86102732de2e89aac36a3cc387d451ee28e1bc54e5fb7e19ea880f836499a706eafcfd0805016f7095827f84a3cad03e12630f83de0ce779fc5a2b99cf3360af

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8773196.exe

    Filesize

    304KB

    MD5

    f479fef38f010fac216e0a555ab77f3b

    SHA1

    4dd31e069407a733a302b72f22863bd5791c3bc3

    SHA256

    3930da0be90c21f96c347340bd4539209cb8176d584ae772885627936ede0f4e

    SHA512

    86102732de2e89aac36a3cc387d451ee28e1bc54e5fb7e19ea880f836499a706eafcfd0805016f7095827f84a3cad03e12630f83de0ce779fc5a2b99cf3360af

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\a6461916.exe

    Filesize

    184KB

    MD5

    9d72824609f845f8dd6729fb784b941d

    SHA1

    38c240b3e32512ba0c8cc4c6b4e29899c69316a7

    SHA256

    2b8417fdb30ed15db7d8e8d0678b943017761053f379170649640a3c772bfe2e

    SHA512

    b803538fe1f32fe023336ceb77033b470840d7cc774a73997c75037a8876713ab07bc102fc11a9d1719ca64968d05450b21d3a1936ad902f650111ccbb8ee341

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\a6461916.exe

    Filesize

    184KB

    MD5

    9d72824609f845f8dd6729fb784b941d

    SHA1

    38c240b3e32512ba0c8cc4c6b4e29899c69316a7

    SHA256

    2b8417fdb30ed15db7d8e8d0678b943017761053f379170649640a3c772bfe2e

    SHA512

    b803538fe1f32fe023336ceb77033b470840d7cc774a73997c75037a8876713ab07bc102fc11a9d1719ca64968d05450b21d3a1936ad902f650111ccbb8ee341

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\b9249219.exe

    Filesize

    145KB

    MD5

    e6093c507d4e9685110f01e9b4e39870

    SHA1

    f774126cd3da7eacbebdc210fac15262be4ddc9d

    SHA256

    032b3a840216350f9ad1395e63cdd8a36065a6c7c1beded71a40a7699dafc0ac

    SHA512

    e49299bb3b7b6094dddbe0122c9160fab680cd15cbf2dcfae434e66f66d07a3256dc61d7a54b371d6f844ba5dbf4af11c42c5c5ad27ad70f5ea85dd38d060566

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\b9249219.exe

    Filesize

    145KB

    MD5

    e6093c507d4e9685110f01e9b4e39870

    SHA1

    f774126cd3da7eacbebdc210fac15262be4ddc9d

    SHA256

    032b3a840216350f9ad1395e63cdd8a36065a6c7c1beded71a40a7699dafc0ac

    SHA512

    e49299bb3b7b6094dddbe0122c9160fab680cd15cbf2dcfae434e66f66d07a3256dc61d7a54b371d6f844ba5dbf4af11c42c5c5ad27ad70f5ea85dd38d060566

  • memory/524-93-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-111-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-89-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-95-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-97-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-99-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-101-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-103-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-105-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-107-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-109-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-91-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-113-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-114-0x0000000004910000-0x0000000004950000-memory.dmp

    Filesize

    256KB

  • memory/524-115-0x0000000004910000-0x0000000004950000-memory.dmp

    Filesize

    256KB

  • memory/524-87-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-86-0x0000000000A70000-0x0000000000A86000-memory.dmp

    Filesize

    88KB

  • memory/524-85-0x0000000000A70000-0x0000000000A8C000-memory.dmp

    Filesize

    112KB

  • memory/524-84-0x0000000000950000-0x000000000096E000-memory.dmp

    Filesize

    120KB

  • memory/1540-122-0x0000000000CB0000-0x0000000000CDA000-memory.dmp

    Filesize

    168KB

  • memory/1540-123-0x00000000006B0000-0x00000000006F0000-memory.dmp

    Filesize

    256KB

  • memory/1540-124-0x00000000006B0000-0x00000000006F0000-memory.dmp

    Filesize

    256KB