Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    89s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2023, 17:29

General

  • Target

    7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe

  • Size

    873KB

  • MD5

    cc6615423fc738dc1fc8513f5a5140c5

  • SHA1

    4efa6396b3fc9730e757bfd561424681655847de

  • SHA256

    7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2

  • SHA512

    d9b7b6ecb704b33e40e2544ef763dbc685c4f78b5fff5094ae9782468436dae1313506f3230e00e788d539b05de19baa9194b0e4134c73ece0265f289868f8d6

  • SSDEEP

    12288:5Mrwy90q3IuHZVP6p3vVrYx7xUw/HUG4CTtGHzAYmBZAmhIXVHtIPd2BhUgMM:tyDTHZo0x3/USTtcyd2BWy

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

mesu

C2

83.97.73.122:19062

Attributes
  • auth_value

    8ede6a157d1d9509a21427d10e999ba2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe
    "C:\Users\Admin\AppData\Local\Temp\7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0554919.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0554919.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9991916.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9991916.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1520
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0559112.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0559112.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3980
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3844
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3195028.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3195028.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4648649.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4648649.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2480
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4208
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:4216
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1553065.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1553065.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5036
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1553065.exe

    Filesize

    329KB

    MD5

    dcad1176451d13e7f44ff6373259c266

    SHA1

    b750f05fc18240bfa49a2ae6a74a85443b38aa55

    SHA256

    6bb735474a83f4d0b2790a784e2732ba68a73057fce7b60b9d59139dd4a7e58f

    SHA512

    fe4b9f92ebddb459bdadeead388507d3ed6b2e75b6c5164975c98204b804980d6bb57b458121cd3174a30721dc01dd98de67f40b8209f3dca778b6d9babd0e41

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1553065.exe

    Filesize

    329KB

    MD5

    dcad1176451d13e7f44ff6373259c266

    SHA1

    b750f05fc18240bfa49a2ae6a74a85443b38aa55

    SHA256

    6bb735474a83f4d0b2790a784e2732ba68a73057fce7b60b9d59139dd4a7e58f

    SHA512

    fe4b9f92ebddb459bdadeead388507d3ed6b2e75b6c5164975c98204b804980d6bb57b458121cd3174a30721dc01dd98de67f40b8209f3dca778b6d9babd0e41

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0554919.exe

    Filesize

    602KB

    MD5

    db40592537df88dfb454cf82f6adbbba

    SHA1

    e4be675fd596b083093eab499eec2a9ed5acc04b

    SHA256

    a0703feb3569996108e364369477cff1f1bedda09fa408217a1742962eae70b7

    SHA512

    9bb531eb2308c7bcb1e6f9a528406d96d52f6dbcac4b1287b47048444265b1fb9d20397a9625ee27b47be0293d915bd168ed5da91912da98475785dba4069f76

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0554919.exe

    Filesize

    602KB

    MD5

    db40592537df88dfb454cf82f6adbbba

    SHA1

    e4be675fd596b083093eab499eec2a9ed5acc04b

    SHA256

    a0703feb3569996108e364369477cff1f1bedda09fa408217a1742962eae70b7

    SHA512

    9bb531eb2308c7bcb1e6f9a528406d96d52f6dbcac4b1287b47048444265b1fb9d20397a9625ee27b47be0293d915bd168ed5da91912da98475785dba4069f76

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4648649.exe

    Filesize

    387KB

    MD5

    12ce9b99465c4c9975a94b3b5eb7b4a6

    SHA1

    1164dcddb9bb3101e54a5546e1eaf1e4fda834a9

    SHA256

    c130cb240508b5ff806c0e00ac0368c7f580e3e3a9723fea708a84fb76ccfbef

    SHA512

    2d830f71712fac9b4216c2f033f7a0720b03c1855e9f50b01b4508bb499a61fce30b8727bdd421db9d6479a1c8259e08437383db08c0706e2f4859e6a632b9d1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4648649.exe

    Filesize

    387KB

    MD5

    12ce9b99465c4c9975a94b3b5eb7b4a6

    SHA1

    1164dcddb9bb3101e54a5546e1eaf1e4fda834a9

    SHA256

    c130cb240508b5ff806c0e00ac0368c7f580e3e3a9723fea708a84fb76ccfbef

    SHA512

    2d830f71712fac9b4216c2f033f7a0720b03c1855e9f50b01b4508bb499a61fce30b8727bdd421db9d6479a1c8259e08437383db08c0706e2f4859e6a632b9d1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9991916.exe

    Filesize

    276KB

    MD5

    d55d643bfa3e7943afa8910e4469d4e6

    SHA1

    280d847d91600b4cd2ac33910d26919019a36870

    SHA256

    19c3a7a50f2161cb3db4aaf935f9f302a57a90523a80e949f19fbd486fd724eb

    SHA512

    9639c12b4a757f68ccc85db5f285f4579f173f0c4566c07d660c67a33214e32a5922e516a29b8248bda462b40eab77b57c2ca824f685283ab0c293fe4acf0d95

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9991916.exe

    Filesize

    276KB

    MD5

    d55d643bfa3e7943afa8910e4469d4e6

    SHA1

    280d847d91600b4cd2ac33910d26919019a36870

    SHA256

    19c3a7a50f2161cb3db4aaf935f9f302a57a90523a80e949f19fbd486fd724eb

    SHA512

    9639c12b4a757f68ccc85db5f285f4579f173f0c4566c07d660c67a33214e32a5922e516a29b8248bda462b40eab77b57c2ca824f685283ab0c293fe4acf0d95

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0559112.exe

    Filesize

    194KB

    MD5

    dcd7786330740ce656bcebd9dffffdeb

    SHA1

    686c609f99f441959cb03aae512a8a0e26f4cfb1

    SHA256

    624d72dd38975e72006c19130b60919762f74e05998e15643cf23ca5fdb6f6e0

    SHA512

    2440df0459e4d7ce69a999e370ef928320d7679c70a6f02951352e8fc5d7633b8f858ac59489c62007872a773747ca6e2ac125ba56efc2ad20df764af903c114

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0559112.exe

    Filesize

    194KB

    MD5

    dcd7786330740ce656bcebd9dffffdeb

    SHA1

    686c609f99f441959cb03aae512a8a0e26f4cfb1

    SHA256

    624d72dd38975e72006c19130b60919762f74e05998e15643cf23ca5fdb6f6e0

    SHA512

    2440df0459e4d7ce69a999e370ef928320d7679c70a6f02951352e8fc5d7633b8f858ac59489c62007872a773747ca6e2ac125ba56efc2ad20df764af903c114

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3195028.exe

    Filesize

    145KB

    MD5

    c6b27e50776a06174ccf06bbc7fc4660

    SHA1

    1e8fda6644055b2e760372968c3990c17483258c

    SHA256

    066a62cc4e594fa71056680c0d5f4ea3f29142061c4397f47c067f2e7d248204

    SHA512

    4263c35f92e3ab4d9b842c73ed6015ee8ab317fa289be0ae7ad81fd68b308d97569d64c31051d3ba279221d25e899c9fafe336faf757004c24fb77a21cfff803

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3195028.exe

    Filesize

    145KB

    MD5

    c6b27e50776a06174ccf06bbc7fc4660

    SHA1

    1e8fda6644055b2e760372968c3990c17483258c

    SHA256

    066a62cc4e594fa71056680c0d5f4ea3f29142061c4397f47c067f2e7d248204

    SHA512

    4263c35f92e3ab4d9b842c73ed6015ee8ab317fa289be0ae7ad81fd68b308d97569d64c31051d3ba279221d25e899c9fafe336faf757004c24fb77a21cfff803

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • memory/1760-196-0x00000000001B0000-0x00000000001DA000-memory.dmp

    Filesize

    168KB

  • memory/1760-215-0x0000000004970000-0x0000000004980000-memory.dmp

    Filesize

    64KB

  • memory/3600-163-0x00000000003E0000-0x000000000040A000-memory.dmp

    Filesize

    168KB

  • memory/3600-170-0x0000000005EE0000-0x0000000006484000-memory.dmp

    Filesize

    5.6MB

  • memory/3600-175-0x0000000006660000-0x0000000006822000-memory.dmp

    Filesize

    1.8MB

  • memory/3600-176-0x0000000006D60000-0x000000000728C000-memory.dmp

    Filesize

    5.2MB

  • memory/3600-177-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/3600-172-0x0000000005DD0000-0x0000000005E46000-memory.dmp

    Filesize

    472KB

  • memory/3600-171-0x0000000005260000-0x00000000052C6000-memory.dmp

    Filesize

    408KB

  • memory/3600-164-0x0000000005310000-0x0000000005928000-memory.dmp

    Filesize

    6.1MB

  • memory/3600-165-0x0000000004E80000-0x0000000004F8A000-memory.dmp

    Filesize

    1.0MB

  • memory/3600-173-0x0000000005E50000-0x0000000005EA0000-memory.dmp

    Filesize

    320KB

  • memory/3600-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3600-169-0x0000000005150000-0x00000000051E2000-memory.dmp

    Filesize

    584KB

  • memory/3600-168-0x0000000004E40000-0x0000000004E7C000-memory.dmp

    Filesize

    240KB

  • memory/3600-167-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/3844-155-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4208-190-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4208-193-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4208-183-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB