Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2023, 14:06

General

  • Target

    debugger.exe

  • Size

    1.0MB

  • MD5

    3ee11d1537ebfdf893f56c6944f8b1f5

  • SHA1

    db01e2cb5dbdf1c3b387d276801142f75301e09c

  • SHA256

    c1b96a261643e29186af75d1c13f4b310a9563c6bf626d6d074ad01109e8c43b

  • SHA512

    a64ee04198b29641e52e148e132871b217b82f576c160ec1ff222f80724725a9ca879264b6118d082e107c4da7e343563a322ad97c4aa9c4fd0ee8df4badd890

  • SSDEEP

    24576:YymYLt3exQBLSSOkqZDhWFBuoNvRH/eR5s:fRhbJOrZohez

Malware Config

Extracted

Family

redline

Botnet

deren

C2

77.91.68.253:19065

Attributes
  • auth_value

    04a169f1fb198bfbeca74d0e06ea2d54

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\debugger.exe
    "C:\Users\Admin\AppData\Local\Temp\debugger.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7513955.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7513955.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6912210.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6912210.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2196733.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2196733.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1416
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8579621.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8579621.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5548136.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5548136.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5088
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5548136.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5548136.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:1004
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 12
            5⤵
            • Program crash
            PID:3932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7868496.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7868496.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4908
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1004 -ip 1004
    1⤵
      PID:3140

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7868496.exe

      Filesize

      284KB

      MD5

      0b0a41cf381c45769e6ce40ec8c97593

      SHA1

      9c0e57809d9ddf1132b97aef34cf83173f883c35

      SHA256

      c224ec9295f4afea2811aa515de7016c2e51a66b060b8f25747eb81c8f990424

      SHA512

      4652592fcdfc151660132257a6439878f3db8a054fc808b109688802690d6e7ff3a49d552a678aa9f6daec818d6d5ab3f0e4e55d524baba81896c7e525a293d8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7868496.exe

      Filesize

      284KB

      MD5

      0b0a41cf381c45769e6ce40ec8c97593

      SHA1

      9c0e57809d9ddf1132b97aef34cf83173f883c35

      SHA256

      c224ec9295f4afea2811aa515de7016c2e51a66b060b8f25747eb81c8f990424

      SHA512

      4652592fcdfc151660132257a6439878f3db8a054fc808b109688802690d6e7ff3a49d552a678aa9f6daec818d6d5ab3f0e4e55d524baba81896c7e525a293d8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7513955.exe

      Filesize

      750KB

      MD5

      2c4cb889f0cabf2b25824be29cf29d1d

      SHA1

      efecc9182324b87b0a6a42ea7fb7d23e5c8a7053

      SHA256

      30f02e714a1c9f82eeeb9fd4993258e58b73299e80fda695a928e51b3b8c49f2

      SHA512

      949c29850a8656569e5d06dd1b3ce942714de459557b31d53d08fc71a26a7582bc3bd4cd3a96f73206761632faa2b94746ac4e600c490752faf0cb3cec6e1bb8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7513955.exe

      Filesize

      750KB

      MD5

      2c4cb889f0cabf2b25824be29cf29d1d

      SHA1

      efecc9182324b87b0a6a42ea7fb7d23e5c8a7053

      SHA256

      30f02e714a1c9f82eeeb9fd4993258e58b73299e80fda695a928e51b3b8c49f2

      SHA512

      949c29850a8656569e5d06dd1b3ce942714de459557b31d53d08fc71a26a7582bc3bd4cd3a96f73206761632faa2b94746ac4e600c490752faf0cb3cec6e1bb8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5548136.exe

      Filesize

      964KB

      MD5

      207c903d98c257c8032ac92fdae371aa

      SHA1

      4dab524f91a23fba30ed370c59ef6eb7355f4fa4

      SHA256

      cc6b9bf0bcea3b82db51812f929f3814aa20d151cba0d1e05b6e3cf3a7736095

      SHA512

      9b37f860f9f80dd44e4931d66c91bef2d4861e22ca2d1604b0169b28a3b4700a6e17ff1d50b6fec67e3af22125cde8477e0ae7d5b97e90e3147982477f7ef333

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5548136.exe

      Filesize

      964KB

      MD5

      207c903d98c257c8032ac92fdae371aa

      SHA1

      4dab524f91a23fba30ed370c59ef6eb7355f4fa4

      SHA256

      cc6b9bf0bcea3b82db51812f929f3814aa20d151cba0d1e05b6e3cf3a7736095

      SHA512

      9b37f860f9f80dd44e4931d66c91bef2d4861e22ca2d1604b0169b28a3b4700a6e17ff1d50b6fec67e3af22125cde8477e0ae7d5b97e90e3147982477f7ef333

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5548136.exe

      Filesize

      964KB

      MD5

      207c903d98c257c8032ac92fdae371aa

      SHA1

      4dab524f91a23fba30ed370c59ef6eb7355f4fa4

      SHA256

      cc6b9bf0bcea3b82db51812f929f3814aa20d151cba0d1e05b6e3cf3a7736095

      SHA512

      9b37f860f9f80dd44e4931d66c91bef2d4861e22ca2d1604b0169b28a3b4700a6e17ff1d50b6fec67e3af22125cde8477e0ae7d5b97e90e3147982477f7ef333

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6912210.exe

      Filesize

      306KB

      MD5

      2e93245450ba7366e10e8c5953f0cebd

      SHA1

      191003be2b66f7980e3c22a30dc335150d33c088

      SHA256

      a1162a80f7059f5c1c8924f9495f20350768a10ed60803ab15755763a46fe7c8

      SHA512

      dea3a87860f4fc84a1522d9b682840e956ed5cbab8853f58499f5b39797ac1a4ae1bd7da5db1bc938a05c340fd87a7d6e070548f52e7e1fe9bbd24e557ca7527

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6912210.exe

      Filesize

      306KB

      MD5

      2e93245450ba7366e10e8c5953f0cebd

      SHA1

      191003be2b66f7980e3c22a30dc335150d33c088

      SHA256

      a1162a80f7059f5c1c8924f9495f20350768a10ed60803ab15755763a46fe7c8

      SHA512

      dea3a87860f4fc84a1522d9b682840e956ed5cbab8853f58499f5b39797ac1a4ae1bd7da5db1bc938a05c340fd87a7d6e070548f52e7e1fe9bbd24e557ca7527

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2196733.exe

      Filesize

      145KB

      MD5

      8ff2c6942f5028c1706f73daf292f626

      SHA1

      944bae2af0f2dca03f7a407ff548b201b6275555

      SHA256

      337ff576602717930d17a9e73cf29cef06373f9baeb66cf1be7fae27ca3456ea

      SHA512

      cc8020efaa274d4491f7cbbeab6a1abf886c1daade5d23cec372059238bce97132863b8a4ddca3717e127f6478853e3583f042ea3d8351dba5dee1a258d3d3d2

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2196733.exe

      Filesize

      145KB

      MD5

      8ff2c6942f5028c1706f73daf292f626

      SHA1

      944bae2af0f2dca03f7a407ff548b201b6275555

      SHA256

      337ff576602717930d17a9e73cf29cef06373f9baeb66cf1be7fae27ca3456ea

      SHA512

      cc8020efaa274d4491f7cbbeab6a1abf886c1daade5d23cec372059238bce97132863b8a4ddca3717e127f6478853e3583f042ea3d8351dba5dee1a258d3d3d2

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8579621.exe

      Filesize

      184KB

      MD5

      830c3594bc1a275dd1003ec604a423fd

      SHA1

      52c3b361c4312fc84c43b722d6ed6dc7411993c1

      SHA256

      8eba96c2c821bc5075f917489f4b79217ea744ef51fa493f3ac24c607060cbd7

      SHA512

      f72b349c7987f9f3ad4d0980c6f4272a746612e05fb5399e183f16ccac3f91c75d008dc4f34c4bcdabaed8f5363f62d7b5ec9af1a581d4156a4414fbcf201d81

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8579621.exe

      Filesize

      184KB

      MD5

      830c3594bc1a275dd1003ec604a423fd

      SHA1

      52c3b361c4312fc84c43b722d6ed6dc7411993c1

      SHA256

      8eba96c2c821bc5075f917489f4b79217ea744ef51fa493f3ac24c607060cbd7

      SHA512

      f72b349c7987f9f3ad4d0980c6f4272a746612e05fb5399e183f16ccac3f91c75d008dc4f34c4bcdabaed8f5363f62d7b5ec9af1a581d4156a4414fbcf201d81

    • memory/1004-211-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/1416-157-0x0000000005500000-0x0000000005512000-memory.dmp

      Filesize

      72KB

    • memory/1416-158-0x0000000005590000-0x00000000055CC000-memory.dmp

      Filesize

      240KB

    • memory/1416-159-0x0000000005580000-0x0000000005590000-memory.dmp

      Filesize

      64KB

    • memory/1416-160-0x00000000058A0000-0x0000000005932000-memory.dmp

      Filesize

      584KB

    • memory/1416-161-0x0000000006620000-0x0000000006BC4000-memory.dmp

      Filesize

      5.6MB

    • memory/1416-162-0x0000000005940000-0x00000000059A6000-memory.dmp

      Filesize

      408KB

    • memory/1416-163-0x0000000006520000-0x0000000006596000-memory.dmp

      Filesize

      472KB

    • memory/1416-164-0x00000000065A0000-0x00000000065F0000-memory.dmp

      Filesize

      320KB

    • memory/1416-165-0x0000000006DA0000-0x0000000006F62000-memory.dmp

      Filesize

      1.8MB

    • memory/1416-166-0x0000000005580000-0x0000000005590000-memory.dmp

      Filesize

      64KB

    • memory/1416-167-0x00000000074A0000-0x00000000079CC000-memory.dmp

      Filesize

      5.2MB

    • memory/1416-156-0x00000000055D0000-0x00000000056DA000-memory.dmp

      Filesize

      1.0MB

    • memory/1416-155-0x0000000005A50000-0x0000000006068000-memory.dmp

      Filesize

      6.1MB

    • memory/1416-154-0x0000000000B30000-0x0000000000B5A000-memory.dmp

      Filesize

      168KB

    • memory/2744-191-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-172-0x00000000049C0000-0x00000000049D0000-memory.dmp

      Filesize

      64KB

    • memory/2744-179-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-181-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-183-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-185-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-187-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-189-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-174-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-193-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-195-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-197-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-199-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-201-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-202-0x00000000049C0000-0x00000000049D0000-memory.dmp

      Filesize

      64KB

    • memory/2744-203-0x00000000049C0000-0x00000000049D0000-memory.dmp

      Filesize

      64KB

    • memory/2744-204-0x00000000049C0000-0x00000000049D0000-memory.dmp

      Filesize

      64KB

    • memory/2744-177-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-175-0x00000000021E0000-0x00000000021F6000-memory.dmp

      Filesize

      88KB

    • memory/2744-173-0x00000000049C0000-0x00000000049D0000-memory.dmp

      Filesize

      64KB

    • memory/4908-220-0x0000000004B10000-0x0000000004B20000-memory.dmp

      Filesize

      64KB

    • memory/4908-237-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-218-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-1132-0x0000000004B10000-0x0000000004B20000-memory.dmp

      Filesize

      64KB

    • memory/4908-221-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-222-0x0000000004B10000-0x0000000004B20000-memory.dmp

      Filesize

      64KB

    • memory/4908-225-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-224-0x0000000004B10000-0x0000000004B20000-memory.dmp

      Filesize

      64KB

    • memory/4908-227-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-229-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-231-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-233-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-235-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-217-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-239-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-241-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-243-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-245-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-247-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-249-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-251-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-253-0x00000000049C0000-0x00000000049FC000-memory.dmp

      Filesize

      240KB

    • memory/4908-1128-0x0000000004B10000-0x0000000004B20000-memory.dmp

      Filesize

      64KB

    • memory/4908-1130-0x0000000004B10000-0x0000000004B20000-memory.dmp

      Filesize

      64KB

    • memory/4908-1131-0x0000000004B10000-0x0000000004B20000-memory.dmp

      Filesize

      64KB

    • memory/5088-209-0x00000000003C0000-0x00000000004B8000-memory.dmp

      Filesize

      992KB

    • memory/5088-210-0x0000000007130000-0x0000000007140000-memory.dmp

      Filesize

      64KB