Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/05/2023, 07:25

General

  • Target

    c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe

  • Size

    1.0MB

  • MD5

    3e24666b6deecd9e55015c48ce2d4e5f

  • SHA1

    389896b298791bb9730ea3404ef842d8cad60df5

  • SHA256

    c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2

  • SHA512

    9fee491c80ea954e3ff2b387c05985c41890a8f277841c0d186f948997e6ccd5e31cd2d62ae1c2848a84da853d3942825fdbcbd8cf0607b9aee1e5c3aa6bce63

  • SSDEEP

    24576:KyQgnjFgQYV1+pMMqvTxisbPs6dSAf1fPIl:RQcQbcvqbxisbr/tX

Malware Config

Extracted

Family

redline

Botnet

liza

C2

83.97.73.127:19045

Attributes
  • auth_value

    198e3e9b188d6cfab0a2b0fb100bb7c5

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe
    "C:\Users\Admin\AppData\Local\Temp\c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4217868.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4217868.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7892924.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7892924.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4224
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9231348.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9231348.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1692
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3032
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0444183.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0444183.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7897170.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7897170.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2191400.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2191400.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4948
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2191400.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2191400.exe
        3⤵
        • Executes dropped EXE
        PID:2064
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 24
          4⤵
          • Program crash
          PID:2988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    957779c42144282d8cd83192b8fbc7cf

    SHA1

    de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

    SHA256

    0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

    SHA512

    f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2191400.exe

    Filesize

    964KB

    MD5

    cc13ff4e24d4c8441c3077086ece7e83

    SHA1

    091d92be97b9a0b7498f053f18fe82f21e690f57

    SHA256

    6824d06b528bb67421e6c4c82609392c687a0ce39df1c8cf76383dad368986c5

    SHA512

    cf2bcdb447576afd585b3b4fa66fc00a5ba2f7d06af3e49e6c57c3cf70b9e574db029894a073e47024c9e4f8fde221f54251bcf0796aa2f979c45dee6be94137

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2191400.exe

    Filesize

    964KB

    MD5

    cc13ff4e24d4c8441c3077086ece7e83

    SHA1

    091d92be97b9a0b7498f053f18fe82f21e690f57

    SHA256

    6824d06b528bb67421e6c4c82609392c687a0ce39df1c8cf76383dad368986c5

    SHA512

    cf2bcdb447576afd585b3b4fa66fc00a5ba2f7d06af3e49e6c57c3cf70b9e574db029894a073e47024c9e4f8fde221f54251bcf0796aa2f979c45dee6be94137

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2191400.exe

    Filesize

    964KB

    MD5

    cc13ff4e24d4c8441c3077086ece7e83

    SHA1

    091d92be97b9a0b7498f053f18fe82f21e690f57

    SHA256

    6824d06b528bb67421e6c4c82609392c687a0ce39df1c8cf76383dad368986c5

    SHA512

    cf2bcdb447576afd585b3b4fa66fc00a5ba2f7d06af3e49e6c57c3cf70b9e574db029894a073e47024c9e4f8fde221f54251bcf0796aa2f979c45dee6be94137

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4217868.exe

    Filesize

    581KB

    MD5

    2d8ac8ab360b2470df0c79792a36cebf

    SHA1

    be472a47a692805552964a7a5d22cfac1a769f6e

    SHA256

    a1351a4cbf3c8b1d8ed3c523d6ee9b50c6f144d03e8c97a7f0564ed98827b6de

    SHA512

    f827916dde95b5202eaab318d3094bbbdae27c5e59c720a2d84e5d16d6353cbf36d1dfcf5334063d1a6e6b6c3e5cc28bca2e4ca193a9125e30daeccb8374c1ac

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4217868.exe

    Filesize

    581KB

    MD5

    2d8ac8ab360b2470df0c79792a36cebf

    SHA1

    be472a47a692805552964a7a5d22cfac1a769f6e

    SHA256

    a1351a4cbf3c8b1d8ed3c523d6ee9b50c6f144d03e8c97a7f0564ed98827b6de

    SHA512

    f827916dde95b5202eaab318d3094bbbdae27c5e59c720a2d84e5d16d6353cbf36d1dfcf5334063d1a6e6b6c3e5cc28bca2e4ca193a9125e30daeccb8374c1ac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7897170.exe

    Filesize

    327KB

    MD5

    ee85eb8fdd4911f5a57c53550734f3bd

    SHA1

    d5113fcc1e88a8455ce1ce6ef3c5bf3b8a973dcd

    SHA256

    1e7e4065e5ad94ec3d6489ad2e854fc2b62a2487d60fc2d5c4e0180353aa10fc

    SHA512

    ad8c0be5b4de101ae9866abbf11eb9ea0f3858291266b5e4f788c221e3bfc48662a4edb5be1cc99ff28739552638b65eb53725abfe3ea510b40db835a8deffb4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7897170.exe

    Filesize

    327KB

    MD5

    ee85eb8fdd4911f5a57c53550734f3bd

    SHA1

    d5113fcc1e88a8455ce1ce6ef3c5bf3b8a973dcd

    SHA256

    1e7e4065e5ad94ec3d6489ad2e854fc2b62a2487d60fc2d5c4e0180353aa10fc

    SHA512

    ad8c0be5b4de101ae9866abbf11eb9ea0f3858291266b5e4f788c221e3bfc48662a4edb5be1cc99ff28739552638b65eb53725abfe3ea510b40db835a8deffb4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7892924.exe

    Filesize

    281KB

    MD5

    da7235d17f660b05959f3dd52a58269c

    SHA1

    8961957c47f2252a510e9a2b1271f3aa0d464940

    SHA256

    a3f2061479e4beed46d35bb122a31e7142a0dc9177c78b27951ea1142b77034d

    SHA512

    68a77d8bcf1760a8fd46d0992be239498019f9d1e9760823f4fee436d4d7c33ce63ceb88e6e9592a35e32c4587d1d4f336b8caf95cbf023f9b942fdfda04f994

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7892924.exe

    Filesize

    281KB

    MD5

    da7235d17f660b05959f3dd52a58269c

    SHA1

    8961957c47f2252a510e9a2b1271f3aa0d464940

    SHA256

    a3f2061479e4beed46d35bb122a31e7142a0dc9177c78b27951ea1142b77034d

    SHA512

    68a77d8bcf1760a8fd46d0992be239498019f9d1e9760823f4fee436d4d7c33ce63ceb88e6e9592a35e32c4587d1d4f336b8caf95cbf023f9b942fdfda04f994

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9231348.exe

    Filesize

    169KB

    MD5

    dd7cecf689e6063482615de1af73df9b

    SHA1

    f69ecaaad1aea385176fe63441c97907b4651aaf

    SHA256

    c59c3b2a96ce004b543b4da5f901b5c374d77aa969ef0894d90cbf503410f6b9

    SHA512

    4853dcb444c6b1c3d30ad6bf68f83edb36001f62c3a14aa67d4b2bec47759a580f942397e70dcaf44e9d0bf0e93637dac26e370b1e3d2962e23aa847f8a68b35

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9231348.exe

    Filesize

    169KB

    MD5

    dd7cecf689e6063482615de1af73df9b

    SHA1

    f69ecaaad1aea385176fe63441c97907b4651aaf

    SHA256

    c59c3b2a96ce004b543b4da5f901b5c374d77aa969ef0894d90cbf503410f6b9

    SHA512

    4853dcb444c6b1c3d30ad6bf68f83edb36001f62c3a14aa67d4b2bec47759a580f942397e70dcaf44e9d0bf0e93637dac26e370b1e3d2962e23aa847f8a68b35

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0444183.exe

    Filesize

    168KB

    MD5

    9e14afbfcd0d2ba454ea1d9f9b950c3b

    SHA1

    cb4f243ba0961b0333e54f56ff52570ebd2d2c2f

    SHA256

    1c826c3d47742e60f09b9817f3762efb55461a77d8fb9f9756b6aa3ea3051941

    SHA512

    abf33cb56a0d56a856d7f3082e5eb801a710d9a4f41fb8e006484d411ae29f764b49351cd75c4e76d6696bd63d165689dc77dda3f9f2524667764c2b0da0726e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0444183.exe

    Filesize

    168KB

    MD5

    9e14afbfcd0d2ba454ea1d9f9b950c3b

    SHA1

    cb4f243ba0961b0333e54f56ff52570ebd2d2c2f

    SHA256

    1c826c3d47742e60f09b9817f3762efb55461a77d8fb9f9756b6aa3ea3051941

    SHA512

    abf33cb56a0d56a856d7f3082e5eb801a710d9a4f41fb8e006484d411ae29f764b49351cd75c4e76d6696bd63d165689dc77dda3f9f2524667764c2b0da0726e

  • memory/2064-214-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3032-140-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3672-168-0x00000000054B0000-0x0000000005542000-memory.dmp

    Filesize

    584KB

  • memory/3672-160-0x0000000005090000-0x00000000050CE000-memory.dmp

    Filesize

    248KB

  • memory/3672-169-0x00000000066C0000-0x0000000006BBE000-memory.dmp

    Filesize

    5.0MB

  • memory/3672-170-0x0000000005550000-0x00000000055B6000-memory.dmp

    Filesize

    408KB

  • memory/3672-185-0x0000000005DB0000-0x0000000005E00000-memory.dmp

    Filesize

    320KB

  • memory/3672-186-0x0000000006490000-0x0000000006652000-memory.dmp

    Filesize

    1.8MB

  • memory/3672-187-0x0000000008410000-0x000000000893C000-memory.dmp

    Filesize

    5.2MB

  • memory/3672-188-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/3672-162-0x00000000050D0000-0x000000000511B000-memory.dmp

    Filesize

    300KB

  • memory/3672-161-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB

  • memory/3672-151-0x0000000000700000-0x000000000072E000-memory.dmp

    Filesize

    184KB

  • memory/3672-167-0x0000000005390000-0x0000000005406000-memory.dmp

    Filesize

    472KB

  • memory/3672-155-0x0000000005010000-0x0000000005022000-memory.dmp

    Filesize

    72KB

  • memory/3672-152-0x0000000002A60000-0x0000000002A66000-memory.dmp

    Filesize

    24KB

  • memory/3672-154-0x00000000051A0000-0x00000000052AA000-memory.dmp

    Filesize

    1.0MB

  • memory/3672-153-0x00000000056A0000-0x0000000005CA6000-memory.dmp

    Filesize

    6.0MB

  • memory/4072-209-0x0000000008CD0000-0x0000000008CE0000-memory.dmp

    Filesize

    64KB

  • memory/4072-207-0x0000000006480000-0x0000000006486000-memory.dmp

    Filesize

    24KB

  • memory/4072-194-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4948-208-0x00000000079F0000-0x0000000007A00000-memory.dmp

    Filesize

    64KB

  • memory/4948-206-0x0000000000C80000-0x0000000000D78000-memory.dmp

    Filesize

    992KB