Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2023, 03:37

General

  • Target

    274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe

  • Size

    982KB

  • MD5

    f65c66ba8ea681ba82e8968caba9b4c1

  • SHA1

    66fb90c141aac694505700a160497707bfc4ebd7

  • SHA256

    274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db

  • SHA512

    9011910d8fdbee5421e64b4c636a7ba92c1045a723678f7db3e1bb318ac987ffb811109ef0c3e1f411c80bd91d5ea6d005131265eedc556d6871ca3ddd70a61d

  • SSDEEP

    24576:9ysfWgKl+iukk2QcPAet8TGIohkFC5U25FBkf7KUKPRdY:Ytgfid3IeWG/hZ5U2ZYkPR

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe
    "C:\Users\Admin\AppData\Local\Temp\274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5274672.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5274672.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6732685.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6732685.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3484
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4557051.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4557051.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3400
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1412
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9413574.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9413574.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957785.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957785.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:560
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:2348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5630120.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5630120.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5630120.exe

    Filesize

    328KB

    MD5

    d2a8ff9e217d7248dd8371a776946b9b

    SHA1

    0169eb654e353326c1a2dde821ad94d5c80667b0

    SHA256

    76b3dadec94b9da855e84bfef6a61b1fbcda45a58a5baf6ecf8d986a0b27eec4

    SHA512

    c82e6f477e09c80d05358ad0d805b098ff00f7119a5e1cfa50b73d3de952893514000cfab139190c783251716c97e17c14d69c58c1133d003630544ea48afcc2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5630120.exe

    Filesize

    328KB

    MD5

    d2a8ff9e217d7248dd8371a776946b9b

    SHA1

    0169eb654e353326c1a2dde821ad94d5c80667b0

    SHA256

    76b3dadec94b9da855e84bfef6a61b1fbcda45a58a5baf6ecf8d986a0b27eec4

    SHA512

    c82e6f477e09c80d05358ad0d805b098ff00f7119a5e1cfa50b73d3de952893514000cfab139190c783251716c97e17c14d69c58c1133d003630544ea48afcc2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5274672.exe

    Filesize

    661KB

    MD5

    ebc705f0a2b446a970d1f13a197c1863

    SHA1

    10fcafb78b6d2ce729cd96d433bc6c4f1cf350fc

    SHA256

    1d89b5afcf7c19ba8adbeacb57d0366f0216775336ad52a27522b5e45c08f2ef

    SHA512

    eb3288f7b598e793d5ac6b8f29101293d4c2015366ad60f1414ba0f2e03921000cbcd5ce704455220cf7580d721593539ad208480e2d2b3ce46744297b508d08

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5274672.exe

    Filesize

    661KB

    MD5

    ebc705f0a2b446a970d1f13a197c1863

    SHA1

    10fcafb78b6d2ce729cd96d433bc6c4f1cf350fc

    SHA256

    1d89b5afcf7c19ba8adbeacb57d0366f0216775336ad52a27522b5e45c08f2ef

    SHA512

    eb3288f7b598e793d5ac6b8f29101293d4c2015366ad60f1414ba0f2e03921000cbcd5ce704455220cf7580d721593539ad208480e2d2b3ce46744297b508d08

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957785.exe

    Filesize

    388KB

    MD5

    459046375bb8ab2a17dcdfbcfc1231e4

    SHA1

    aec5e309429d90ed7cb4fcf6253ca412da4a5f56

    SHA256

    1e19c33b5864cd041c69d499cc1ce24d886ac3f97ec292034fdbda7123c56a80

    SHA512

    ba565c9bd8e580408e6ecb1f7dc0751e6b04fb9ba0a736e133b23908ec4ffbaccf60892355043531cda7a78cea5ccf7cc1405b8964a3dfa09eb6bbc8fc8b6ad3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957785.exe

    Filesize

    388KB

    MD5

    459046375bb8ab2a17dcdfbcfc1231e4

    SHA1

    aec5e309429d90ed7cb4fcf6253ca412da4a5f56

    SHA256

    1e19c33b5864cd041c69d499cc1ce24d886ac3f97ec292034fdbda7123c56a80

    SHA512

    ba565c9bd8e580408e6ecb1f7dc0751e6b04fb9ba0a736e133b23908ec4ffbaccf60892355043531cda7a78cea5ccf7cc1405b8964a3dfa09eb6bbc8fc8b6ad3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6732685.exe

    Filesize

    280KB

    MD5

    2819d7c3a2568b90a7c51c3d432344ef

    SHA1

    5c8b5df3ca1019af75010fe4e08b8292d4b0de34

    SHA256

    aeadfc310fabe4b5c2e3d8e3038c5da215e98401b85878ec1f2770b99a74c822

    SHA512

    ce4811850f9a4f0959a643972a2992b4dbcb0f97d0a4a817b352539c13be53039de733fa066626d6230140e8c4f702551636e8abc58b667a396997fc959ca02d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6732685.exe

    Filesize

    280KB

    MD5

    2819d7c3a2568b90a7c51c3d432344ef

    SHA1

    5c8b5df3ca1019af75010fe4e08b8292d4b0de34

    SHA256

    aeadfc310fabe4b5c2e3d8e3038c5da215e98401b85878ec1f2770b99a74c822

    SHA512

    ce4811850f9a4f0959a643972a2992b4dbcb0f97d0a4a817b352539c13be53039de733fa066626d6230140e8c4f702551636e8abc58b667a396997fc959ca02d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4557051.exe

    Filesize

    194KB

    MD5

    a7dbf6ffa21f11b684d94679ad22e60f

    SHA1

    81da35a65b96d8239724a5ebdf601ff949817dd5

    SHA256

    e8a901db57eaf694984d4dd0260362416a53fca25e4743df52689fc10e1af2ad

    SHA512

    3614de08d424238eefc21da76c229fee6f3bf280e94cebe6fda5a5ae8282ae1f72a245fb65b8e2061e395ca1724dbc111155f2172e9c012c98b7c6b40a60254c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4557051.exe

    Filesize

    194KB

    MD5

    a7dbf6ffa21f11b684d94679ad22e60f

    SHA1

    81da35a65b96d8239724a5ebdf601ff949817dd5

    SHA256

    e8a901db57eaf694984d4dd0260362416a53fca25e4743df52689fc10e1af2ad

    SHA512

    3614de08d424238eefc21da76c229fee6f3bf280e94cebe6fda5a5ae8282ae1f72a245fb65b8e2061e395ca1724dbc111155f2172e9c012c98b7c6b40a60254c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9413574.exe

    Filesize

    145KB

    MD5

    467b44a8797446f4822caa6c2c14c43f

    SHA1

    ebab4517f69360fff885ac28c27803109638041d

    SHA256

    2a9779a14382b296dad065a8532021537768ac4a6c624f0c0f5ae4f2bb792243

    SHA512

    0846af78c81ec30f81bf56cf95cfdca2cbb424a2a8e0a07361e87407ff5c4d6c32cb5b43aa3d3915ac650f819798ef6065c7a1f35f173e1114225997bae4b87a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9413574.exe

    Filesize

    145KB

    MD5

    467b44a8797446f4822caa6c2c14c43f

    SHA1

    ebab4517f69360fff885ac28c27803109638041d

    SHA256

    2a9779a14382b296dad065a8532021537768ac4a6c624f0c0f5ae4f2bb792243

    SHA512

    0846af78c81ec30f81bf56cf95cfdca2cbb424a2a8e0a07361e87407ff5c4d6c32cb5b43aa3d3915ac650f819798ef6065c7a1f35f173e1114225997bae4b87a

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • memory/560-183-0x0000000000300000-0x0000000000338000-memory.dmp

    Filesize

    224KB

  • memory/560-193-0x0000000000300000-0x0000000000338000-memory.dmp

    Filesize

    224KB

  • memory/560-190-0x0000000000300000-0x0000000000338000-memory.dmp

    Filesize

    224KB

  • memory/916-215-0x0000000005540000-0x0000000005550000-memory.dmp

    Filesize

    64KB

  • memory/916-199-0x0000000000950000-0x000000000097A000-memory.dmp

    Filesize

    168KB

  • memory/1412-155-0x0000000001140000-0x000000000114A000-memory.dmp

    Filesize

    40KB

  • memory/1524-163-0x0000000000A90000-0x0000000000ABA000-memory.dmp

    Filesize

    168KB

  • memory/1524-177-0x0000000005830000-0x0000000005840000-memory.dmp

    Filesize

    64KB

  • memory/1524-176-0x00000000074D0000-0x00000000079FC000-memory.dmp

    Filesize

    5.2MB

  • memory/1524-175-0x0000000006DD0000-0x0000000006F92000-memory.dmp

    Filesize

    1.8MB

  • memory/1524-174-0x0000000006BB0000-0x0000000006C00000-memory.dmp

    Filesize

    320KB

  • memory/1524-173-0x0000000006B30000-0x0000000006BA6000-memory.dmp

    Filesize

    472KB

  • memory/1524-171-0x00000000058E0000-0x0000000005946000-memory.dmp

    Filesize

    408KB

  • memory/1524-170-0x0000000006580000-0x0000000006B24000-memory.dmp

    Filesize

    5.6MB

  • memory/1524-169-0x0000000005840000-0x00000000058D2000-memory.dmp

    Filesize

    584KB

  • memory/1524-168-0x0000000005830000-0x0000000005840000-memory.dmp

    Filesize

    64KB

  • memory/1524-167-0x00000000054C0000-0x00000000054FC000-memory.dmp

    Filesize

    240KB

  • memory/1524-166-0x0000000005460000-0x0000000005472000-memory.dmp

    Filesize

    72KB

  • memory/1524-165-0x0000000005530000-0x000000000563A000-memory.dmp

    Filesize

    1.0MB

  • memory/1524-164-0x00000000059B0000-0x0000000005FC8000-memory.dmp

    Filesize

    6.1MB