Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2023, 13:40

General

  • Target

    596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe

  • Size

    875KB

  • MD5

    63ddb67ad363faf3396f502ac48fd53b

  • SHA1

    76c3d878cf033c6ab6b99c67961521924bc9ffc2

  • SHA256

    596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458

  • SHA512

    9eb22e6cf4c0f18e6167b98d5ef317ba41b00abeab3347f7235fc0b4f319a45a0c35292cf758f8ef15824fba964721b65e02428755e6b951ba7ae786c0a95f4a

  • SSDEEP

    24576:RyouBg05worjeV5GUkDnJisD5eMh2s7Q:EZBg05jifcJikBhn

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.122:19062

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

mesu

C2

83.97.73.122:19062

Attributes
  • auth_value

    8ede6a157d1d9509a21427d10e999ba2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe
    "C:\Users\Admin\AppData\Local\Temp\596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5788787.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5788787.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1194199.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1194199.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1036
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7720053.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7720053.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:628
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9441836.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9441836.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:540
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4962752.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4962752.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3528
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:4344
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3756195.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3756195.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3756195.exe

    Filesize

    328KB

    MD5

    24a529715a3ecdecc7cbc33ac486998f

    SHA1

    a34f941c6c840eaaae4a8bf2c6efaf1e246cccdb

    SHA256

    8b817e4aabbc8e2331485613d27d2dae43a8664cfa12ef9999ea2b4ad15503d1

    SHA512

    8ded7a0bdf3c036abfbbc4c97ec352fddd795b8bd357318669accf77072414735795e80b7e745649306d061c818986c8a3bb3da6a4221da53af856cf29455919

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3756195.exe

    Filesize

    328KB

    MD5

    24a529715a3ecdecc7cbc33ac486998f

    SHA1

    a34f941c6c840eaaae4a8bf2c6efaf1e246cccdb

    SHA256

    8b817e4aabbc8e2331485613d27d2dae43a8664cfa12ef9999ea2b4ad15503d1

    SHA512

    8ded7a0bdf3c036abfbbc4c97ec352fddd795b8bd357318669accf77072414735795e80b7e745649306d061c818986c8a3bb3da6a4221da53af856cf29455919

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5788787.exe

    Filesize

    603KB

    MD5

    7bf61be423d444bc0e1cd8d4ca6fcb3f

    SHA1

    9bbd3ff948786575a12d4f0a0402b9fc963225ee

    SHA256

    0ddc0153a2550d63a673eb549df1b3da1303e7d754c2ce0f197e3d9f8ad8d056

    SHA512

    861d9c090740f3299f21548f5b0638f2472aa5c80f3763d56edb429bdc0c39998c05dc65c1fde064184e0ae53e6e00ea7423ff0c906373c52086b0c50512fc74

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5788787.exe

    Filesize

    603KB

    MD5

    7bf61be423d444bc0e1cd8d4ca6fcb3f

    SHA1

    9bbd3ff948786575a12d4f0a0402b9fc963225ee

    SHA256

    0ddc0153a2550d63a673eb549df1b3da1303e7d754c2ce0f197e3d9f8ad8d056

    SHA512

    861d9c090740f3299f21548f5b0638f2472aa5c80f3763d56edb429bdc0c39998c05dc65c1fde064184e0ae53e6e00ea7423ff0c906373c52086b0c50512fc74

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4962752.exe

    Filesize

    387KB

    MD5

    22d84fa9ae67ff3025abc850fb29a4f9

    SHA1

    d06ea2964d86e3ad86071ddd882539094fe5ab53

    SHA256

    9d778bb2d4d77ce6d27b3d5b5ba9c60a392d8bb4add2967da5ed8a33a215f864

    SHA512

    6e875dd630e8a3f7fcde9f02093b6ea043453cdd709ce6bc7eba0c7304a092048ec0e1122b69874d36e5695956ec56657942d396f186752f6cd4ff3f05524318

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4962752.exe

    Filesize

    387KB

    MD5

    22d84fa9ae67ff3025abc850fb29a4f9

    SHA1

    d06ea2964d86e3ad86071ddd882539094fe5ab53

    SHA256

    9d778bb2d4d77ce6d27b3d5b5ba9c60a392d8bb4add2967da5ed8a33a215f864

    SHA512

    6e875dd630e8a3f7fcde9f02093b6ea043453cdd709ce6bc7eba0c7304a092048ec0e1122b69874d36e5695956ec56657942d396f186752f6cd4ff3f05524318

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1194199.exe

    Filesize

    277KB

    MD5

    5c7b949d398793e12be96aefbfb739dd

    SHA1

    c8d6e34ccf95d93abf570d826cc8b74a34a8e699

    SHA256

    a21644ce52e8a51ccc87e726e5588c1ec7b074117bb424fe6475919cfe8137ec

    SHA512

    8cf98a7211de5c44ca7ae79ae41cb210f341377596fdc7df19c71d4aea4ec1ad79ac85040089554a73abe7c89d122415eefd563081817e847df4784dde7ed7e9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1194199.exe

    Filesize

    277KB

    MD5

    5c7b949d398793e12be96aefbfb739dd

    SHA1

    c8d6e34ccf95d93abf570d826cc8b74a34a8e699

    SHA256

    a21644ce52e8a51ccc87e726e5588c1ec7b074117bb424fe6475919cfe8137ec

    SHA512

    8cf98a7211de5c44ca7ae79ae41cb210f341377596fdc7df19c71d4aea4ec1ad79ac85040089554a73abe7c89d122415eefd563081817e847df4784dde7ed7e9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7720053.exe

    Filesize

    145KB

    MD5

    21c95bf753a929c4cc8d66e27f5a54bf

    SHA1

    decc1e32c0345c7b5be6ea466b30e8866948337a

    SHA256

    727a1c2953af6fe7a2ad85ba33993d2924d518f0431f4887e50fb8e864789550

    SHA512

    bbf973797e4f67e9ca78cebed288bae3334371c2b8448160176b6585a6420b9283db658be54d325d552f74fe70bf5d0501f855072001ebcce867c4747e534f01

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7720053.exe

    Filesize

    145KB

    MD5

    21c95bf753a929c4cc8d66e27f5a54bf

    SHA1

    decc1e32c0345c7b5be6ea466b30e8866948337a

    SHA256

    727a1c2953af6fe7a2ad85ba33993d2924d518f0431f4887e50fb8e864789550

    SHA512

    bbf973797e4f67e9ca78cebed288bae3334371c2b8448160176b6585a6420b9283db658be54d325d552f74fe70bf5d0501f855072001ebcce867c4747e534f01

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9441836.exe

    Filesize

    194KB

    MD5

    6db089daa3a0c136dae9c453fdc92914

    SHA1

    86ed6582cd83d559fb2d1d15aff60098f82e1a55

    SHA256

    019b14ec5c3bc3bfa7027f96164fb1b110798b71ebcb1dea136f68930ef3ea77

    SHA512

    3472f37ba315814b4045eea9d7f30a6c544c166f56223edf6994783914983865eea707afd7e3cc359c55c7c8c277cb1351f4110bc7012f36c87edc0cfa89713e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9441836.exe

    Filesize

    194KB

    MD5

    6db089daa3a0c136dae9c453fdc92914

    SHA1

    86ed6582cd83d559fb2d1d15aff60098f82e1a55

    SHA256

    019b14ec5c3bc3bfa7027f96164fb1b110798b71ebcb1dea136f68930ef3ea77

    SHA512

    3472f37ba315814b4045eea9d7f30a6c544c166f56223edf6994783914983865eea707afd7e3cc359c55c7c8c277cb1351f4110bc7012f36c87edc0cfa89713e

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • memory/628-166-0x0000000006A90000-0x0000000006B06000-memory.dmp

    Filesize

    472KB

  • memory/628-158-0x0000000005960000-0x000000000599C000-memory.dmp

    Filesize

    240KB

  • memory/628-164-0x00000000079D0000-0x0000000007EFC000-memory.dmp

    Filesize

    5.2MB

  • memory/628-167-0x0000000006B10000-0x0000000006B60000-memory.dmp

    Filesize

    320KB

  • memory/628-163-0x00000000072D0000-0x0000000007492000-memory.dmp

    Filesize

    1.8MB

  • memory/628-162-0x0000000006850000-0x00000000068E2000-memory.dmp

    Filesize

    584KB

  • memory/628-154-0x0000000000F20000-0x0000000000F4A000-memory.dmp

    Filesize

    168KB

  • memory/628-161-0x0000000006D20000-0x00000000072C4000-memory.dmp

    Filesize

    5.6MB

  • memory/628-160-0x0000000005C60000-0x0000000005CC6000-memory.dmp

    Filesize

    408KB

  • memory/628-155-0x0000000005E40000-0x0000000006458000-memory.dmp

    Filesize

    6.1MB

  • memory/628-156-0x00000000059C0000-0x0000000005ACA000-memory.dmp

    Filesize

    1.0MB

  • memory/628-157-0x0000000005900000-0x0000000005912000-memory.dmp

    Filesize

    72KB

  • memory/628-159-0x00000000058C0000-0x00000000058D0000-memory.dmp

    Filesize

    64KB

  • memory/628-165-0x00000000058C0000-0x00000000058D0000-memory.dmp

    Filesize

    64KB

  • memory/3528-190-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3528-189-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3528-182-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3788-195-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3788-213-0x0000000005AA0000-0x0000000005AB0000-memory.dmp

    Filesize

    64KB

  • memory/4120-173-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB