Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2023, 02:43

General

  • Target

    61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe

  • Size

    983KB

  • MD5

    9cc731cd92badaff73f62dcde7cfe76d

  • SHA1

    aebbfb76f20e49c2562c993d9adb7ae7eb82a82e

  • SHA256

    61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5

  • SHA512

    5ec2c4d7bba9928b23b4f8a6c674c977939d7a2880d6133c8bb05cd17dcdd8640bf257f0be82a2bba74e46ff80b25b7683c6b6d96634516be0a7069d9176e456

  • SSDEEP

    24576:Ny0AolmsblI/NnDfpWt3rSA0reF1TGToh6USLFLkfFHl:oqlNlI5fpWtCaG0h6US9

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.122:19062

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe
    "C:\Users\Admin\AppData\Local\Temp\61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3438147.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3438147.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8065700.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8065700.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3012
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9785305.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9785305.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4312
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2452
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6402671.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6402671.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7602340.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7602340.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:32
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:640
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:4080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4490962.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4490962.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4490962.exe

    Filesize

    328KB

    MD5

    a1e7e01897ae3c4c1e98579ffe771024

    SHA1

    ca256a28ca8b8ad3f839fa2fa8e424503a4da8c1

    SHA256

    66afd6607b585cd90f3d6bd0a5cedf09c7d371b7efa5fa3a17b15fe4b7b8b1d8

    SHA512

    288368d1361f0f7a089d0f9dd9be4799c5d324837f99166c811954829b05255f3f9b2c0657e19d5bf488482d781b281fea8397ab2a97719be3c83482a3156128

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4490962.exe

    Filesize

    328KB

    MD5

    a1e7e01897ae3c4c1e98579ffe771024

    SHA1

    ca256a28ca8b8ad3f839fa2fa8e424503a4da8c1

    SHA256

    66afd6607b585cd90f3d6bd0a5cedf09c7d371b7efa5fa3a17b15fe4b7b8b1d8

    SHA512

    288368d1361f0f7a089d0f9dd9be4799c5d324837f99166c811954829b05255f3f9b2c0657e19d5bf488482d781b281fea8397ab2a97719be3c83482a3156128

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3438147.exe

    Filesize

    661KB

    MD5

    a691a6cbe0c0838e418caa0c1192536d

    SHA1

    72135541f4de08ae2b566d85216afaf9162df0c7

    SHA256

    fb9dba55903b96c5b1096830329db3e96dd93809de72e7ca232ac2c44e922e79

    SHA512

    8515663ce9cfd2145e0edf77fe81c9faa69ec63703dc1f7b25b225efdd7328aa66d886e6570ba335ce5e0a7776f5f25845c8ccc09901085c8d10a9fca5dae71f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3438147.exe

    Filesize

    661KB

    MD5

    a691a6cbe0c0838e418caa0c1192536d

    SHA1

    72135541f4de08ae2b566d85216afaf9162df0c7

    SHA256

    fb9dba55903b96c5b1096830329db3e96dd93809de72e7ca232ac2c44e922e79

    SHA512

    8515663ce9cfd2145e0edf77fe81c9faa69ec63703dc1f7b25b225efdd7328aa66d886e6570ba335ce5e0a7776f5f25845c8ccc09901085c8d10a9fca5dae71f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7602340.exe

    Filesize

    388KB

    MD5

    3208193595afc60984d6291d42a52d8a

    SHA1

    87080a82d38baa664c71b7d6fbb8eb197285ab8b

    SHA256

    1f27779c93074a5df541e900e8369991cc8f107c7c4ab357bc14f51d4724c83f

    SHA512

    1fc131805afad9e09a64ce6e3bb74771e005d13abf0c06de1817e3d540d0c13745eafe17d4422b535fd2d7c3bff83cfc199693052833c17e4b183d1f9737416c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7602340.exe

    Filesize

    388KB

    MD5

    3208193595afc60984d6291d42a52d8a

    SHA1

    87080a82d38baa664c71b7d6fbb8eb197285ab8b

    SHA256

    1f27779c93074a5df541e900e8369991cc8f107c7c4ab357bc14f51d4724c83f

    SHA512

    1fc131805afad9e09a64ce6e3bb74771e005d13abf0c06de1817e3d540d0c13745eafe17d4422b535fd2d7c3bff83cfc199693052833c17e4b183d1f9737416c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8065700.exe

    Filesize

    280KB

    MD5

    baa7b41c28e0f8851d7b39dda199ecbb

    SHA1

    90a7c4d0bf7676aa105d8f9407ef6e5cd047aca2

    SHA256

    9a2e7b122bf648d4f134d50f93b914dab9145e7c8fbfc5e22aea11cc3f90858a

    SHA512

    a1ce6b72a1641b188359f05ca69e3409dd6ce4b68ac73e852edb9e783151dfd2a474182796f791a922ba3193b2b735c455fe98f7dc3c1f6d04b2593bf812ac2f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8065700.exe

    Filesize

    280KB

    MD5

    baa7b41c28e0f8851d7b39dda199ecbb

    SHA1

    90a7c4d0bf7676aa105d8f9407ef6e5cd047aca2

    SHA256

    9a2e7b122bf648d4f134d50f93b914dab9145e7c8fbfc5e22aea11cc3f90858a

    SHA512

    a1ce6b72a1641b188359f05ca69e3409dd6ce4b68ac73e852edb9e783151dfd2a474182796f791a922ba3193b2b735c455fe98f7dc3c1f6d04b2593bf812ac2f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9785305.exe

    Filesize

    194KB

    MD5

    87544c36e91098b90af9dc32dd9e5f42

    SHA1

    cf39d6a23faf7c6fb13e539312ddce9b26c97a6b

    SHA256

    273e530388871c1ea7dd4fb8916534dc155778b41ffa13a9d363a82faad358c5

    SHA512

    3501757d4bc3ac49a113dbe13d4903e953fdeb7e58480aed266abebf96261335bf3e8728b75d09676a4d204b569873a23d198d959eec9bbbfb5d586a5d834ebe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9785305.exe

    Filesize

    194KB

    MD5

    87544c36e91098b90af9dc32dd9e5f42

    SHA1

    cf39d6a23faf7c6fb13e539312ddce9b26c97a6b

    SHA256

    273e530388871c1ea7dd4fb8916534dc155778b41ffa13a9d363a82faad358c5

    SHA512

    3501757d4bc3ac49a113dbe13d4903e953fdeb7e58480aed266abebf96261335bf3e8728b75d09676a4d204b569873a23d198d959eec9bbbfb5d586a5d834ebe

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6402671.exe

    Filesize

    146KB

    MD5

    e41b704bc07499a119021dee9d53ab7c

    SHA1

    f55aaacb0522c2c87b74f3914d1fe9364609eb80

    SHA256

    bb1bcbb437261160db773aff7221bfc5870bdd8da02ab904aa1a3b080e31ead8

    SHA512

    01f004653a7dcfc41c01d3a520ccc6998fe7dc48877bedffc5df8dca4b44890687aa68f9f9e1250addb3c55143081ac54d9890595b6d159ac0c4b2cf7d673973

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6402671.exe

    Filesize

    146KB

    MD5

    e41b704bc07499a119021dee9d53ab7c

    SHA1

    f55aaacb0522c2c87b74f3914d1fe9364609eb80

    SHA256

    bb1bcbb437261160db773aff7221bfc5870bdd8da02ab904aa1a3b080e31ead8

    SHA512

    01f004653a7dcfc41c01d3a520ccc6998fe7dc48877bedffc5df8dca4b44890687aa68f9f9e1250addb3c55143081ac54d9890595b6d159ac0c4b2cf7d673973

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • memory/640-183-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/640-193-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/640-192-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1128-215-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/1128-196-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2452-155-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3096-163-0x0000000000E00000-0x0000000000E2A000-memory.dmp

    Filesize

    168KB

  • memory/3096-177-0x0000000007010000-0x0000000007060000-memory.dmp

    Filesize

    320KB

  • memory/3096-176-0x0000000007240000-0x00000000072B6000-memory.dmp

    Filesize

    472KB

  • memory/3096-175-0x0000000005890000-0x00000000058A0000-memory.dmp

    Filesize

    64KB

  • memory/3096-174-0x0000000007770000-0x0000000007C9C000-memory.dmp

    Filesize

    5.2MB

  • memory/3096-173-0x0000000007070000-0x0000000007232000-memory.dmp

    Filesize

    1.8MB

  • memory/3096-171-0x0000000005C90000-0x0000000005CF6000-memory.dmp

    Filesize

    408KB

  • memory/3096-170-0x0000000006340000-0x00000000063D2000-memory.dmp

    Filesize

    584KB

  • memory/3096-169-0x00000000068F0000-0x0000000006E94000-memory.dmp

    Filesize

    5.6MB

  • memory/3096-168-0x0000000005890000-0x00000000058A0000-memory.dmp

    Filesize

    64KB

  • memory/3096-167-0x0000000005830000-0x000000000586C000-memory.dmp

    Filesize

    240KB

  • memory/3096-166-0x00000000057D0000-0x00000000057E2000-memory.dmp

    Filesize

    72KB

  • memory/3096-165-0x00000000058A0000-0x00000000059AA000-memory.dmp

    Filesize

    1.0MB

  • memory/3096-164-0x0000000005D20000-0x0000000006338000-memory.dmp

    Filesize

    6.1MB