Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2023, 04:01

General

  • Target

    7b79e4e0f7b1a8047cde4d10b4f85afc167b35300fc2728fc3a829a10a956c2a.exe

  • Size

    731KB

  • MD5

    0b487ddb0a76d681670882caa7c02c7a

  • SHA1

    2cd1dbb28957ebfac544314474d31965aeffb6bf

  • SHA256

    7b79e4e0f7b1a8047cde4d10b4f85afc167b35300fc2728fc3a829a10a956c2a

  • SHA512

    f2ad23b670a5e18366af9164d3d8066902ff548291f7b7db8362bca0e044cb38f91c91574c37241ea376dae1a557597bbc0cc2491f750893e5397fe500ef24dd

  • SSDEEP

    12288:RMryy906AaIpBS71ALlwe0C/sVQbExWlbKNLHEnOR5RN28XMB5DtP6rbwiR2WXP3:XyLoa63svxubQHl/2BB5DHWt6W

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.127:19045

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

tinda

C2

83.97.73.127:19045

Attributes
  • auth_value

    88da3924455f4ba3a1b76cd03af918bb

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b79e4e0f7b1a8047cde4d10b4f85afc167b35300fc2728fc3a829a10a956c2a.exe
    "C:\Users\Admin\AppData\Local\Temp\7b79e4e0f7b1a8047cde4d10b4f85afc167b35300fc2728fc3a829a10a956c2a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5610513.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5610513.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1618046.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1618046.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4332
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9373937.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9373937.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4192
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2692545.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2692545.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3088
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7230102.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7230102.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3808
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2320
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4884
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4868
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:3872
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:2104
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:4416
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:1320
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2004
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:3456
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0440019.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0440019.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4916
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3376
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4644
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4700

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0440019.exe

                Filesize

                318KB

                MD5

                8bf4853d8a2f2994c3dae9ce5310888c

                SHA1

                61157094d6bfdffe0f3fe83bcab1c6f3912d9d5f

                SHA256

                3da2042e55db3907edb06a59f75555b85eab33abbb65c0bfbba88908547c0bcf

                SHA512

                f404142e285c31fe0fcf52ef0cb7d800a717f6cb61413f812e3857f39d7cd62f191715519fff14bd42dde77ac9ecc2ab9c2a77a18c5bd441a65864d5710df869

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0440019.exe

                Filesize

                318KB

                MD5

                8bf4853d8a2f2994c3dae9ce5310888c

                SHA1

                61157094d6bfdffe0f3fe83bcab1c6f3912d9d5f

                SHA256

                3da2042e55db3907edb06a59f75555b85eab33abbb65c0bfbba88908547c0bcf

                SHA512

                f404142e285c31fe0fcf52ef0cb7d800a717f6cb61413f812e3857f39d7cd62f191715519fff14bd42dde77ac9ecc2ab9c2a77a18c5bd441a65864d5710df869

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5610513.exe

                Filesize

                449KB

                MD5

                30a179dd939a5a699eaea39e3695bbaf

                SHA1

                a534460053209338300d4c096ac8ffb92dcbc6d5

                SHA256

                34577393aa533de072c96ec00d804f5e05e3992d060d45a5c363123112d96a4e

                SHA512

                dfcf98e700cf07c9d8fe201699dc78a545549ed5e19950803a5e45ccadb555fb4711e98a6642d5f7a57d7fbe479cba9751d853113f3fd121339adb66b9fb769b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5610513.exe

                Filesize

                449KB

                MD5

                30a179dd939a5a699eaea39e3695bbaf

                SHA1

                a534460053209338300d4c096ac8ffb92dcbc6d5

                SHA256

                34577393aa533de072c96ec00d804f5e05e3992d060d45a5c363123112d96a4e

                SHA512

                dfcf98e700cf07c9d8fe201699dc78a545549ed5e19950803a5e45ccadb555fb4711e98a6642d5f7a57d7fbe479cba9751d853113f3fd121339adb66b9fb769b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7230102.exe

                Filesize

                211KB

                MD5

                b3d300fb595ce99e6c5251afac1d7c1a

                SHA1

                3b4b793230a5d94b6265a11a2157b1f4989edf02

                SHA256

                e3fd34b61c1f6db5017ff4c7f51cf52a7154cc340a2f7c6de352198b658d4744

                SHA512

                444310ee685731cd424c81df5fc279cee3467907b4956386a0127e0b433b7b4da2455e6b1459ac06c1a463acb32a88473d7ba391c9a1cac2e38e235a2be0a564

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7230102.exe

                Filesize

                211KB

                MD5

                b3d300fb595ce99e6c5251afac1d7c1a

                SHA1

                3b4b793230a5d94b6265a11a2157b1f4989edf02

                SHA256

                e3fd34b61c1f6db5017ff4c7f51cf52a7154cc340a2f7c6de352198b658d4744

                SHA512

                444310ee685731cd424c81df5fc279cee3467907b4956386a0127e0b433b7b4da2455e6b1459ac06c1a463acb32a88473d7ba391c9a1cac2e38e235a2be0a564

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1618046.exe

                Filesize

                277KB

                MD5

                ed59f370264af357a19ef69795d5a90b

                SHA1

                39ccffdff3fd7cf5e6471bc392fe429dc4eebe93

                SHA256

                926cf9b009a92490ef489e2ad4d9d4e333fe3f799a724cc00c63bab4c11ba981

                SHA512

                376ba56b82f7cd6eea783d6d42db6a88f00a7b765f7808323e4edfa3acfe6d8c68485dfc3d630e960ffeec30533514243dd7dc5be1ee00c7af188f48e25e51bc

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1618046.exe

                Filesize

                277KB

                MD5

                ed59f370264af357a19ef69795d5a90b

                SHA1

                39ccffdff3fd7cf5e6471bc392fe429dc4eebe93

                SHA256

                926cf9b009a92490ef489e2ad4d9d4e333fe3f799a724cc00c63bab4c11ba981

                SHA512

                376ba56b82f7cd6eea783d6d42db6a88f00a7b765f7808323e4edfa3acfe6d8c68485dfc3d630e960ffeec30533514243dd7dc5be1ee00c7af188f48e25e51bc

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9373937.exe

                Filesize

                168KB

                MD5

                dcd8520c6eb4c5c6a0975623ab908ece

                SHA1

                b13446bd9dd0b04a40767532764a6e3c9a0e020f

                SHA256

                cb50e00db91404bbf6850662c96f5af3729639d4795dba06fc4eb89ff3636842

                SHA512

                f73be25e8fc3ce6da344e475d290790e7de65684f902da081af99045687293d7c7fa9e33296b97b78a4b8874e0243bb13ff4bba0c7ff56cafb26b68f97b53f1f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9373937.exe

                Filesize

                168KB

                MD5

                dcd8520c6eb4c5c6a0975623ab908ece

                SHA1

                b13446bd9dd0b04a40767532764a6e3c9a0e020f

                SHA256

                cb50e00db91404bbf6850662c96f5af3729639d4795dba06fc4eb89ff3636842

                SHA512

                f73be25e8fc3ce6da344e475d290790e7de65684f902da081af99045687293d7c7fa9e33296b97b78a4b8874e0243bb13ff4bba0c7ff56cafb26b68f97b53f1f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2692545.exe

                Filesize

                161KB

                MD5

                8d1d9b1b2a8f5d4a5a2bcad76641f84b

                SHA1

                5e0d20682f613bae884ba71dc3c74431d6a9ee56

                SHA256

                aa06cafd904d611a2a90ed96b9e967489bea7dbfef48c682b1871df234e5c1a8

                SHA512

                19e2468b9d4d8c27c5ac2fcb3505650b477aa20c1b8a02f10dcb70f4700966e2e7882eccc8ca23eb3320322b60d7e6744a8508a14da7a694e5f037afb75027f1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2692545.exe

                Filesize

                161KB

                MD5

                8d1d9b1b2a8f5d4a5a2bcad76641f84b

                SHA1

                5e0d20682f613bae884ba71dc3c74431d6a9ee56

                SHA256

                aa06cafd904d611a2a90ed96b9e967489bea7dbfef48c682b1871df234e5c1a8

                SHA512

                19e2468b9d4d8c27c5ac2fcb3505650b477aa20c1b8a02f10dcb70f4700966e2e7882eccc8ca23eb3320322b60d7e6744a8508a14da7a694e5f037afb75027f1

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                211KB

                MD5

                b3d300fb595ce99e6c5251afac1d7c1a

                SHA1

                3b4b793230a5d94b6265a11a2157b1f4989edf02

                SHA256

                e3fd34b61c1f6db5017ff4c7f51cf52a7154cc340a2f7c6de352198b658d4744

                SHA512

                444310ee685731cd424c81df5fc279cee3467907b4956386a0127e0b433b7b4da2455e6b1459ac06c1a463acb32a88473d7ba391c9a1cac2e38e235a2be0a564

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                211KB

                MD5

                b3d300fb595ce99e6c5251afac1d7c1a

                SHA1

                3b4b793230a5d94b6265a11a2157b1f4989edf02

                SHA256

                e3fd34b61c1f6db5017ff4c7f51cf52a7154cc340a2f7c6de352198b658d4744

                SHA512

                444310ee685731cd424c81df5fc279cee3467907b4956386a0127e0b433b7b4da2455e6b1459ac06c1a463acb32a88473d7ba391c9a1cac2e38e235a2be0a564

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                211KB

                MD5

                b3d300fb595ce99e6c5251afac1d7c1a

                SHA1

                3b4b793230a5d94b6265a11a2157b1f4989edf02

                SHA256

                e3fd34b61c1f6db5017ff4c7f51cf52a7154cc340a2f7c6de352198b658d4744

                SHA512

                444310ee685731cd424c81df5fc279cee3467907b4956386a0127e0b433b7b4da2455e6b1459ac06c1a463acb32a88473d7ba391c9a1cac2e38e235a2be0a564

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                211KB

                MD5

                b3d300fb595ce99e6c5251afac1d7c1a

                SHA1

                3b4b793230a5d94b6265a11a2157b1f4989edf02

                SHA256

                e3fd34b61c1f6db5017ff4c7f51cf52a7154cc340a2f7c6de352198b658d4744

                SHA512

                444310ee685731cd424c81df5fc279cee3467907b4956386a0127e0b433b7b4da2455e6b1459ac06c1a463acb32a88473d7ba391c9a1cac2e38e235a2be0a564

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                211KB

                MD5

                b3d300fb595ce99e6c5251afac1d7c1a

                SHA1

                3b4b793230a5d94b6265a11a2157b1f4989edf02

                SHA256

                e3fd34b61c1f6db5017ff4c7f51cf52a7154cc340a2f7c6de352198b658d4744

                SHA512

                444310ee685731cd424c81df5fc279cee3467907b4956386a0127e0b433b7b4da2455e6b1459ac06c1a463acb32a88473d7ba391c9a1cac2e38e235a2be0a564

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1200-173-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/3376-195-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3376-200-0x0000000002EF0000-0x0000000002F00000-memory.dmp

                Filesize

                64KB

              • memory/4192-157-0x000000000A3F0000-0x000000000A402000-memory.dmp

                Filesize

                72KB

              • memory/4192-167-0x000000000C4E0000-0x000000000CA0C000-memory.dmp

                Filesize

                5.2MB

              • memory/4192-166-0x000000000BDE0000-0x000000000BFA2000-memory.dmp

                Filesize

                1.8MB

              • memory/4192-165-0x0000000004E70000-0x0000000004E80000-memory.dmp

                Filesize

                64KB

              • memory/4192-164-0x000000000BBC0000-0x000000000BC10000-memory.dmp

                Filesize

                320KB

              • memory/4192-163-0x000000000B060000-0x000000000B0C6000-memory.dmp

                Filesize

                408KB

              • memory/4192-162-0x000000000B510000-0x000000000BAB4000-memory.dmp

                Filesize

                5.6MB

              • memory/4192-161-0x000000000A880000-0x000000000A912000-memory.dmp

                Filesize

                584KB

              • memory/4192-160-0x000000000A760000-0x000000000A7D6000-memory.dmp

                Filesize

                472KB

              • memory/4192-159-0x000000000A450000-0x000000000A48C000-memory.dmp

                Filesize

                240KB

              • memory/4192-158-0x0000000004E70000-0x0000000004E80000-memory.dmp

                Filesize

                64KB

              • memory/4192-156-0x000000000A4C0000-0x000000000A5CA000-memory.dmp

                Filesize

                1.0MB

              • memory/4192-155-0x000000000A940000-0x000000000AF58000-memory.dmp

                Filesize

                6.1MB

              • memory/4192-154-0x0000000000680000-0x00000000006AE000-memory.dmp

                Filesize

                184KB