Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25/05/2023, 06:33

General

  • Target

    5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe

  • Size

    983KB

  • MD5

    bdefa1b937fc3af328eb0f4ebbe9e90d

  • SHA1

    c328d56c7cf0ca1086a7c804ad7715fb31baa866

  • SHA256

    5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693

  • SHA512

    bd62f337206ec902b1ac016d891c2cd73c4c753f7287ed06b0357e4d979221c089b5901e5655c5734a91d3f340c066c11651921646c9ec8798842235a349b692

  • SSDEEP

    24576:hy5GupUBytPtnoITkADh+duWb5FjkfLnyu:UTvJoAkyhgb7

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe
    "C:\Users\Admin\AppData\Local\Temp\5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9477797.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9477797.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7780836.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7780836.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8413398.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8413398.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4556
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4748
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9104391.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9104391.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3450585.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3450585.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5000
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4104
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:4620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5336092.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5336092.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4424
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1332

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5336092.exe

    Filesize

    328KB

    MD5

    b4a2d38338cdfbef1a4d6c0231157d3c

    SHA1

    6e0aa375ab2d9602bb9dbc385cb3fbc64257a351

    SHA256

    28554c78ee12a01c6e18fc1b19d7035e92409e517662a5f46b33bebd4adf66aa

    SHA512

    698de6a32c628c2fd323ba6546b60017e4f259881162deae8cfe8942152e45943159e3e8c44bb87b2d253a20af89d47f8b00d40eaee66073b341e37d11c5abe5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5336092.exe

    Filesize

    328KB

    MD5

    b4a2d38338cdfbef1a4d6c0231157d3c

    SHA1

    6e0aa375ab2d9602bb9dbc385cb3fbc64257a351

    SHA256

    28554c78ee12a01c6e18fc1b19d7035e92409e517662a5f46b33bebd4adf66aa

    SHA512

    698de6a32c628c2fd323ba6546b60017e4f259881162deae8cfe8942152e45943159e3e8c44bb87b2d253a20af89d47f8b00d40eaee66073b341e37d11c5abe5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9477797.exe

    Filesize

    661KB

    MD5

    ecfb9e61f622e9fc1be556b92c9184b9

    SHA1

    808e6257fe63ca3f791cfbed67489902b95861c5

    SHA256

    139db3a6503b0dd1d935eb8cb3f96e9e805d1ef861f5f7acfea363ecbd3717e9

    SHA512

    aaf2bec7424d7b0f546bad90a41fcfa5aebf8a624847a178e5a7beadda5b017a9d2eba9d069e3b66f85bc5100c1477064b1e50c92e33be2bba3031822266904d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9477797.exe

    Filesize

    661KB

    MD5

    ecfb9e61f622e9fc1be556b92c9184b9

    SHA1

    808e6257fe63ca3f791cfbed67489902b95861c5

    SHA256

    139db3a6503b0dd1d935eb8cb3f96e9e805d1ef861f5f7acfea363ecbd3717e9

    SHA512

    aaf2bec7424d7b0f546bad90a41fcfa5aebf8a624847a178e5a7beadda5b017a9d2eba9d069e3b66f85bc5100c1477064b1e50c92e33be2bba3031822266904d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3450585.exe

    Filesize

    388KB

    MD5

    808461358a8761a7b0fb0cdc37438b95

    SHA1

    e01c4bb4a36e49de7de06a73c8f04f6ecd752529

    SHA256

    602b5091bb0a1bfc3be1b5efa397493af576f93e8b08433989491d11e2d898d9

    SHA512

    a94b8ab15222bb50ecd32abdc45c1519c6f2941e42186c50a2e7b184d3e05d117850fe26833dac707c46f30d4182a7c58942c929ff3f4ca2c4c2f54c352239de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3450585.exe

    Filesize

    388KB

    MD5

    808461358a8761a7b0fb0cdc37438b95

    SHA1

    e01c4bb4a36e49de7de06a73c8f04f6ecd752529

    SHA256

    602b5091bb0a1bfc3be1b5efa397493af576f93e8b08433989491d11e2d898d9

    SHA512

    a94b8ab15222bb50ecd32abdc45c1519c6f2941e42186c50a2e7b184d3e05d117850fe26833dac707c46f30d4182a7c58942c929ff3f4ca2c4c2f54c352239de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7780836.exe

    Filesize

    280KB

    MD5

    dd296c5511e9c3421dbc7b414575cb7d

    SHA1

    b16b83a9fca57b4650896abce0767b331d76df31

    SHA256

    19c7794d880b986fd65ff70245f7c5ade2893f9257317c24fd9be3d0b2ed8db8

    SHA512

    444725a50c3cf120e56cc32d4eeb85a8a1eae78fb37754a70fbef6ef47d77b8864299976699181f7cc09fffb8d447276d94d6e108e08a84547cd0eb6da6f4dcb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7780836.exe

    Filesize

    280KB

    MD5

    dd296c5511e9c3421dbc7b414575cb7d

    SHA1

    b16b83a9fca57b4650896abce0767b331d76df31

    SHA256

    19c7794d880b986fd65ff70245f7c5ade2893f9257317c24fd9be3d0b2ed8db8

    SHA512

    444725a50c3cf120e56cc32d4eeb85a8a1eae78fb37754a70fbef6ef47d77b8864299976699181f7cc09fffb8d447276d94d6e108e08a84547cd0eb6da6f4dcb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8413398.exe

    Filesize

    194KB

    MD5

    1402bfcec119800f6de841e6451952c4

    SHA1

    be3626ba794ad5707888ae447eb96d62c52d22d2

    SHA256

    891ac320ca141290a986bb7edf82e8425a3a6ec1eea3dcf2ed8be5db5eea3abc

    SHA512

    1eeb6b3e0377620f175db028d4358765eb981a2dfe24c9572e9d853e82a5fd29af299a1871763e75ab62d623e95710b63c381140c492e5aacc05e328e281d56d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8413398.exe

    Filesize

    194KB

    MD5

    1402bfcec119800f6de841e6451952c4

    SHA1

    be3626ba794ad5707888ae447eb96d62c52d22d2

    SHA256

    891ac320ca141290a986bb7edf82e8425a3a6ec1eea3dcf2ed8be5db5eea3abc

    SHA512

    1eeb6b3e0377620f175db028d4358765eb981a2dfe24c9572e9d853e82a5fd29af299a1871763e75ab62d623e95710b63c381140c492e5aacc05e328e281d56d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9104391.exe

    Filesize

    145KB

    MD5

    afa80958b93909da7cda3b3603e4f563

    SHA1

    ac1f1177699785388b8c1411c3c15e8c6c1fa1e9

    SHA256

    e2c5f170c0f4ada4e0b14300b6d116c1c086da54b43017616abc0d5e560e3906

    SHA512

    4e1540383ad9fa964970ce2f8b00d2bf4dd0847f82a0ee295a51b31ec16aca4a3d5ecb6848e3614ce42c40dc6a359f8f374c9df7392b6651b9bb88c47b25b5be

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9104391.exe

    Filesize

    145KB

    MD5

    afa80958b93909da7cda3b3603e4f563

    SHA1

    ac1f1177699785388b8c1411c3c15e8c6c1fa1e9

    SHA256

    e2c5f170c0f4ada4e0b14300b6d116c1c086da54b43017616abc0d5e560e3906

    SHA512

    4e1540383ad9fa964970ce2f8b00d2bf4dd0847f82a0ee295a51b31ec16aca4a3d5ecb6848e3614ce42c40dc6a359f8f374c9df7392b6651b9bb88c47b25b5be

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    96KB

    MD5

    7825cad99621dd288da81d8d8ae13cf5

    SHA1

    f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c

    SHA256

    529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5

    SHA512

    2e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4

  • memory/1332-208-0x00000000001A0000-0x00000000001CA000-memory.dmp

    Filesize

    168KB

  • memory/1332-224-0x0000000008B40000-0x0000000008B8B000-memory.dmp

    Filesize

    300KB

  • memory/1332-225-0x0000000008CE0000-0x0000000008CF0000-memory.dmp

    Filesize

    64KB

  • memory/3096-170-0x0000000005690000-0x00000000056F6000-memory.dmp

    Filesize

    408KB

  • memory/3096-168-0x0000000006280000-0x000000000677E000-memory.dmp

    Filesize

    5.0MB

  • memory/3096-187-0x0000000006890000-0x0000000006906000-memory.dmp

    Filesize

    472KB

  • memory/3096-188-0x0000000006B20000-0x0000000006B70000-memory.dmp

    Filesize

    320KB

  • memory/3096-189-0x0000000005270000-0x0000000005280000-memory.dmp

    Filesize

    64KB

  • memory/3096-175-0x0000000006950000-0x0000000006B12000-memory.dmp

    Filesize

    1.8MB

  • memory/3096-169-0x00000000055F0000-0x0000000005682000-memory.dmp

    Filesize

    584KB

  • memory/3096-153-0x00000000008A0000-0x00000000008CA000-memory.dmp

    Filesize

    168KB

  • memory/3096-154-0x0000000005770000-0x0000000005D76000-memory.dmp

    Filesize

    6.0MB

  • memory/3096-186-0x0000000007050000-0x000000000757C000-memory.dmp

    Filesize

    5.2MB

  • memory/3096-155-0x0000000005300000-0x000000000540A000-memory.dmp

    Filesize

    1.0MB

  • memory/3096-159-0x0000000005270000-0x0000000005280000-memory.dmp

    Filesize

    64KB

  • memory/3096-158-0x0000000005410000-0x000000000545B000-memory.dmp

    Filesize

    300KB

  • memory/3096-157-0x00000000052C0000-0x00000000052FE000-memory.dmp

    Filesize

    248KB

  • memory/3096-156-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/4104-203-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4104-202-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4104-195-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4748-142-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB