Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/05/2023, 10:50

General

  • Target

    92cf42eb3d96ce9e80f72c2703f7a8a065443173a703d92a4fe41b5ec639aa1b.exe

  • Size

    1.0MB

  • MD5

    ac3ad1b410917447be84bb09eac05fad

  • SHA1

    6b45aa4e8b68e5776c3bfc8ccf715df3ec2cb0b5

  • SHA256

    92cf42eb3d96ce9e80f72c2703f7a8a065443173a703d92a4fe41b5ec639aa1b

  • SHA512

    c796392b7b3ecba8d2ae9431617fc02f0d20758d8599c0ce1f19255befec79b06f5f85f9c44ad6b6bf0a1b334e4ea456fc2ed83abc6aae48aa37b7ea9285d554

  • SSDEEP

    24576:Uyv+tCA3jbnZzl7l9egi4YGmdvG7QPWChUwxsz19at0T:jv+tCATbnZZ7XeguGmdvG781vx+40

Malware Config

Extracted

Family

redline

Botnet

lisa

C2

83.97.73.122:19062

Attributes
  • auth_value

    c2dc311db9820012377b054447d37949

Extracted

Family

redline

Botnet

goga

C2

83.97.73.122:19062

Attributes
  • auth_value

    6d57dff6d3c42dddb8a76dc276b8467f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92cf42eb3d96ce9e80f72c2703f7a8a065443173a703d92a4fe41b5ec639aa1b.exe
    "C:\Users\Admin\AppData\Local\Temp\92cf42eb3d96ce9e80f72c2703f7a8a065443173a703d92a4fe41b5ec639aa1b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1733525.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1733525.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7630364.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7630364.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5152441.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5152441.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4772
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4936
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5388978.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5388978.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5282322.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5282322.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4436
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe
        3⤵
        • Executes dropped EXE
        PID:3388
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe
        3⤵
        • Executes dropped EXE
        PID:4876
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe
        3⤵
        • Executes dropped EXE
        PID:4904
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2288
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            PID:516
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 24
              6⤵
              • Program crash
              PID:196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

    Filesize

    962KB

    MD5

    b5c9d9416f162ef492456b9eb593479e

    SHA1

    716662b7ee1d24bcf252e101c0e16b98d8cfad57

    SHA256

    b4e63621d69e1fc3713b3192b28e12a4ad7dacccc983f6c40dfcaba7d0318b99

    SHA512

    4ea2276fd6500c5513305a207e49feb5b32b3571929db0fd40aa39043b16c1278cb9d5c5db71f3faaf220f6671afd0694532e1a81551ac944a818ecea8e05751

  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

    Filesize

    962KB

    MD5

    b5c9d9416f162ef492456b9eb593479e

    SHA1

    716662b7ee1d24bcf252e101c0e16b98d8cfad57

    SHA256

    b4e63621d69e1fc3713b3192b28e12a4ad7dacccc983f6c40dfcaba7d0318b99

    SHA512

    4ea2276fd6500c5513305a207e49feb5b32b3571929db0fd40aa39043b16c1278cb9d5c5db71f3faaf220f6671afd0694532e1a81551ac944a818ecea8e05751

  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

    Filesize

    962KB

    MD5

    b5c9d9416f162ef492456b9eb593479e

    SHA1

    716662b7ee1d24bcf252e101c0e16b98d8cfad57

    SHA256

    b4e63621d69e1fc3713b3192b28e12a4ad7dacccc983f6c40dfcaba7d0318b99

    SHA512

    4ea2276fd6500c5513305a207e49feb5b32b3571929db0fd40aa39043b16c1278cb9d5c5db71f3faaf220f6671afd0694532e1a81551ac944a818ecea8e05751

  • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

    Filesize

    962KB

    MD5

    b5c9d9416f162ef492456b9eb593479e

    SHA1

    716662b7ee1d24bcf252e101c0e16b98d8cfad57

    SHA256

    b4e63621d69e1fc3713b3192b28e12a4ad7dacccc983f6c40dfcaba7d0318b99

    SHA512

    4ea2276fd6500c5513305a207e49feb5b32b3571929db0fd40aa39043b16c1278cb9d5c5db71f3faaf220f6671afd0694532e1a81551ac944a818ecea8e05751

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe

    Filesize

    962KB

    MD5

    b5c9d9416f162ef492456b9eb593479e

    SHA1

    716662b7ee1d24bcf252e101c0e16b98d8cfad57

    SHA256

    b4e63621d69e1fc3713b3192b28e12a4ad7dacccc983f6c40dfcaba7d0318b99

    SHA512

    4ea2276fd6500c5513305a207e49feb5b32b3571929db0fd40aa39043b16c1278cb9d5c5db71f3faaf220f6671afd0694532e1a81551ac944a818ecea8e05751

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe

    Filesize

    962KB

    MD5

    b5c9d9416f162ef492456b9eb593479e

    SHA1

    716662b7ee1d24bcf252e101c0e16b98d8cfad57

    SHA256

    b4e63621d69e1fc3713b3192b28e12a4ad7dacccc983f6c40dfcaba7d0318b99

    SHA512

    4ea2276fd6500c5513305a207e49feb5b32b3571929db0fd40aa39043b16c1278cb9d5c5db71f3faaf220f6671afd0694532e1a81551ac944a818ecea8e05751

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe

    Filesize

    962KB

    MD5

    b5c9d9416f162ef492456b9eb593479e

    SHA1

    716662b7ee1d24bcf252e101c0e16b98d8cfad57

    SHA256

    b4e63621d69e1fc3713b3192b28e12a4ad7dacccc983f6c40dfcaba7d0318b99

    SHA512

    4ea2276fd6500c5513305a207e49feb5b32b3571929db0fd40aa39043b16c1278cb9d5c5db71f3faaf220f6671afd0694532e1a81551ac944a818ecea8e05751

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe

    Filesize

    962KB

    MD5

    b5c9d9416f162ef492456b9eb593479e

    SHA1

    716662b7ee1d24bcf252e101c0e16b98d8cfad57

    SHA256

    b4e63621d69e1fc3713b3192b28e12a4ad7dacccc983f6c40dfcaba7d0318b99

    SHA512

    4ea2276fd6500c5513305a207e49feb5b32b3571929db0fd40aa39043b16c1278cb9d5c5db71f3faaf220f6671afd0694532e1a81551ac944a818ecea8e05751

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe

    Filesize

    962KB

    MD5

    b5c9d9416f162ef492456b9eb593479e

    SHA1

    716662b7ee1d24bcf252e101c0e16b98d8cfad57

    SHA256

    b4e63621d69e1fc3713b3192b28e12a4ad7dacccc983f6c40dfcaba7d0318b99

    SHA512

    4ea2276fd6500c5513305a207e49feb5b32b3571929db0fd40aa39043b16c1278cb9d5c5db71f3faaf220f6671afd0694532e1a81551ac944a818ecea8e05751

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1631007.exe

    Filesize

    962KB

    MD5

    b5c9d9416f162ef492456b9eb593479e

    SHA1

    716662b7ee1d24bcf252e101c0e16b98d8cfad57

    SHA256

    b4e63621d69e1fc3713b3192b28e12a4ad7dacccc983f6c40dfcaba7d0318b99

    SHA512

    4ea2276fd6500c5513305a207e49feb5b32b3571929db0fd40aa39043b16c1278cb9d5c5db71f3faaf220f6671afd0694532e1a81551ac944a818ecea8e05751

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1733525.exe

    Filesize

    592KB

    MD5

    7bdf88d71d19a49730e233820e9335eb

    SHA1

    c566f1836e60e38e06cffef025ba02f0018795d6

    SHA256

    dd4e35f0ff117c28659a8c36af73371f74a6a0d625bf33f11750a714fcea9461

    SHA512

    3739c543e6c8d2593d9e37ac0c7df33d67b7055fc8c432c8b359822504917a289655e828a2474f892f0deafadd5aa9f05299ae89cf7cc531be62dbbb6292afa2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1733525.exe

    Filesize

    592KB

    MD5

    7bdf88d71d19a49730e233820e9335eb

    SHA1

    c566f1836e60e38e06cffef025ba02f0018795d6

    SHA256

    dd4e35f0ff117c28659a8c36af73371f74a6a0d625bf33f11750a714fcea9461

    SHA512

    3739c543e6c8d2593d9e37ac0c7df33d67b7055fc8c432c8b359822504917a289655e828a2474f892f0deafadd5aa9f05299ae89cf7cc531be62dbbb6292afa2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5282322.exe

    Filesize

    315KB

    MD5

    db1cd0f00f7bef38f5b6975dbe9284ed

    SHA1

    c2a66098972a19d1bf6f6ff1b3aa227a66a0aecc

    SHA256

    5097b798146ceb095d23b7506e4c3ba07770b3b2e18d91cdd2665456dda656ea

    SHA512

    f87ebb68c24d8590c91bc350a8b18d8c2fda94b79a79704ca3d9c0d4f5a25f4866b48ceaa88dfbf87faa811e8793ba767f2fa6b916b64899f13b2ff5810e9a1f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5282322.exe

    Filesize

    315KB

    MD5

    db1cd0f00f7bef38f5b6975dbe9284ed

    SHA1

    c2a66098972a19d1bf6f6ff1b3aa227a66a0aecc

    SHA256

    5097b798146ceb095d23b7506e4c3ba07770b3b2e18d91cdd2665456dda656ea

    SHA512

    f87ebb68c24d8590c91bc350a8b18d8c2fda94b79a79704ca3d9c0d4f5a25f4866b48ceaa88dfbf87faa811e8793ba767f2fa6b916b64899f13b2ff5810e9a1f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7630364.exe

    Filesize

    275KB

    MD5

    4e6d92ab14b7ad1c31b19ba72173a5dc

    SHA1

    f61075e648a4869a7ce05dddeb825559a6f3c828

    SHA256

    0a585c197d443c5a11ffd8d77dadf7cd909a483ce7ad5022317fd86bfd4c492b

    SHA512

    439f9fb89cc40794d3741eb6740aa3df0574c29fad50328545c71372b1fc17654cc4f5f9a7772c5bff74f8752c32b1b6c2515b247adcc9f350aaa585cf173da0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7630364.exe

    Filesize

    275KB

    MD5

    4e6d92ab14b7ad1c31b19ba72173a5dc

    SHA1

    f61075e648a4869a7ce05dddeb825559a6f3c828

    SHA256

    0a585c197d443c5a11ffd8d77dadf7cd909a483ce7ad5022317fd86bfd4c492b

    SHA512

    439f9fb89cc40794d3741eb6740aa3df0574c29fad50328545c71372b1fc17654cc4f5f9a7772c5bff74f8752c32b1b6c2515b247adcc9f350aaa585cf173da0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5152441.exe

    Filesize

    181KB

    MD5

    5add341ffd54303b2d7006f2b3089f61

    SHA1

    e29363524846ac30feb7fc472d8e08aeec7c131b

    SHA256

    0ff798e0cc63151ec483cfe0516c43010aaccae998e93878ff20e048069056cc

    SHA512

    e7e54f3b235fe336c2aa860518703e44aa61bb51341e003d863bc04650b444d549885378e99b533d7dac5d66569fb0fd430003f56a446c58cef95c9b722ecb04

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5152441.exe

    Filesize

    181KB

    MD5

    5add341ffd54303b2d7006f2b3089f61

    SHA1

    e29363524846ac30feb7fc472d8e08aeec7c131b

    SHA256

    0ff798e0cc63151ec483cfe0516c43010aaccae998e93878ff20e048069056cc

    SHA512

    e7e54f3b235fe336c2aa860518703e44aa61bb51341e003d863bc04650b444d549885378e99b533d7dac5d66569fb0fd430003f56a446c58cef95c9b722ecb04

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5388978.exe

    Filesize

    145KB

    MD5

    02ee22c3b1cd610672018c5926265991

    SHA1

    1f8d12b68f13937c1e9e455a7e38f2f21e969e5d

    SHA256

    8ab8e5513f01002dc064381cb884d09ee3ac65f1763fec7c4d6e7e6e9ab52d9e

    SHA512

    38ba9aeb44c6bd0916c75822e955147d8196ed56f72b206fc2c122b5566978448a816040b86a54c3f43ebf9a55a606231a31ed85c6b4880d7392f828a81bd52b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5388978.exe

    Filesize

    145KB

    MD5

    02ee22c3b1cd610672018c5926265991

    SHA1

    1f8d12b68f13937c1e9e455a7e38f2f21e969e5d

    SHA256

    8ab8e5513f01002dc064381cb884d09ee3ac65f1763fec7c4d6e7e6e9ab52d9e

    SHA512

    38ba9aeb44c6bd0916c75822e955147d8196ed56f72b206fc2c122b5566978448a816040b86a54c3f43ebf9a55a606231a31ed85c6b4880d7392f828a81bd52b

  • memory/2176-356-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2176-355-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2176-352-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2176-358-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2176-366-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2288-367-0x00000000072D0000-0x00000000072E0000-memory.dmp

    Filesize

    64KB

  • memory/2656-213-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/2656-351-0x0000000007210000-0x0000000007220000-memory.dmp

    Filesize

    64KB

  • memory/2656-207-0x00000000003E0000-0x00000000004D8000-memory.dmp

    Filesize

    992KB

  • memory/3100-188-0x0000000006BB0000-0x0000000006C26000-memory.dmp

    Filesize

    472KB

  • memory/3100-172-0x00000000073A0000-0x00000000078CC000-memory.dmp

    Filesize

    5.2MB

  • memory/3100-154-0x0000000005AC0000-0x00000000060C6000-memory.dmp

    Filesize

    6.0MB

  • memory/3100-153-0x0000000000BC0000-0x0000000000BEA000-memory.dmp

    Filesize

    168KB

  • memory/3100-159-0x0000000005730000-0x000000000577B000-memory.dmp

    Filesize

    300KB

  • memory/3100-155-0x0000000005620000-0x000000000572A000-memory.dmp

    Filesize

    1.0MB

  • memory/3100-156-0x0000000005550000-0x0000000005562000-memory.dmp

    Filesize

    72KB

  • memory/3100-168-0x0000000005930000-0x00000000059C2000-memory.dmp

    Filesize

    584KB

  • memory/3100-157-0x00000000055B0000-0x00000000055EE000-memory.dmp

    Filesize

    248KB

  • memory/3100-169-0x00000000065D0000-0x0000000006ACE000-memory.dmp

    Filesize

    5.0MB

  • memory/3100-189-0x0000000006C30000-0x0000000006C80000-memory.dmp

    Filesize

    320KB

  • memory/3100-158-0x0000000005920000-0x0000000005930000-memory.dmp

    Filesize

    64KB

  • memory/3100-187-0x0000000005920000-0x0000000005930000-memory.dmp

    Filesize

    64KB

  • memory/3100-170-0x00000000059D0000-0x0000000005A36000-memory.dmp

    Filesize

    408KB

  • memory/3100-171-0x0000000006CA0000-0x0000000006E62000-memory.dmp

    Filesize

    1.8MB

  • memory/4820-212-0x0000000008D40000-0x0000000008D50000-memory.dmp

    Filesize

    64KB

  • memory/4820-195-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4936-142-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB