Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2023, 09:45

General

  • Target

    14b4fbdfbf633a682d0264b32d9df331bc6bc137df76439c91457543a5494d4b.exe

  • Size

    785KB

  • MD5

    b678096a7bb5f5228cae15bfc6adb461

  • SHA1

    4458f662f9d8488deb57eb08d410113e7b3ce793

  • SHA256

    14b4fbdfbf633a682d0264b32d9df331bc6bc137df76439c91457543a5494d4b

  • SHA512

    773c5a27d8901be98e96986ac7282a263e9626c0182da431ce619f4bb480146cd64824ec4ee7c83d17f607f0103d0d66d959f1f87be8d8d694fea646870f55ad

  • SSDEEP

    12288:gMrfy90m5Ipz/1dw2HFzEZdlwi4kaqa3F65gwfVuw8wqsFxHg3+J:vyPGpzQ/Ei4ke4gaVVgo

Malware Config

Extracted

Family

redline

Botnet

dars

C2

83.97.73.127:19045

Attributes
  • auth_value

    7cd208e6b6c927262304d5d4d88647fd

Extracted

Family

redline

Botnet

grom

C2

83.97.73.127:19045

Attributes
  • auth_value

    2193aac8692a5e1ec66d9db9fa25ee00

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14b4fbdfbf633a682d0264b32d9df331bc6bc137df76439c91457543a5494d4b.exe
    "C:\Users\Admin\AppData\Local\Temp\14b4fbdfbf633a682d0264b32d9df331bc6bc137df76439c91457543a5494d4b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6862625.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6862625.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5191095.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5191095.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1428
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1463875.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1463875.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5048
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8532656.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8532656.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3948
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6575831.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6575831.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:5068
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2296
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2476
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:2464
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:4304
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:3184
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2828
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:3268
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:400
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:3008
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3189459.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3189459.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4300
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3196
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:636
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:5080

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3189459.exe

                Filesize

                314KB

                MD5

                0620db1af78f03f1f77c29abfd68dc2d

                SHA1

                46850e37d6b449868ecf819bc13f81d8e6fb8f7f

                SHA256

                0016cc008e2b4e42ddd962fbb468ccb4c342bc0fc8df3dbb3624a398124960ea

                SHA512

                84e2a5e36c50be91c9927b0996f2d2fe0321b057847868a16da7b57fbe2b0e5bac17521d2dd600a7b6aa66c5624deef74081e257446754234d448387ddb75497

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3189459.exe

                Filesize

                314KB

                MD5

                0620db1af78f03f1f77c29abfd68dc2d

                SHA1

                46850e37d6b449868ecf819bc13f81d8e6fb8f7f

                SHA256

                0016cc008e2b4e42ddd962fbb468ccb4c342bc0fc8df3dbb3624a398124960ea

                SHA512

                84e2a5e36c50be91c9927b0996f2d2fe0321b057847868a16da7b57fbe2b0e5bac17521d2dd600a7b6aa66c5624deef74081e257446754234d448387ddb75497

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6862625.exe

                Filesize

                451KB

                MD5

                5035d19c53bf02631e6a9a6d08ebfa56

                SHA1

                e5f27ad9a673821446d16b9f37113a2626c70829

                SHA256

                59bec4ae3cea0f2ee0482401241b8a887350c827de3f46fd2d127a343d0fca14

                SHA512

                3f36e54686e562943de691d7c09cbd80b503bd52e9ace5d2247c4b7db23ca77c3ec10b7080fe39cd6440ff41073783608aaf250c78832c19c3a9107a474ddf3b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6862625.exe

                Filesize

                451KB

                MD5

                5035d19c53bf02631e6a9a6d08ebfa56

                SHA1

                e5f27ad9a673821446d16b9f37113a2626c70829

                SHA256

                59bec4ae3cea0f2ee0482401241b8a887350c827de3f46fd2d127a343d0fca14

                SHA512

                3f36e54686e562943de691d7c09cbd80b503bd52e9ace5d2247c4b7db23ca77c3ec10b7080fe39cd6440ff41073783608aaf250c78832c19c3a9107a474ddf3b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6575831.exe

                Filesize

                214KB

                MD5

                c5720904b9d6cf3eaa7656968b4a6107

                SHA1

                88494ce98f9d0ebbb697c46bb093363dc6629a63

                SHA256

                b3b8eaf9bade2296cad25c9dcd161e9f4ecc9f334a831839aa7be209cecbc9a5

                SHA512

                53711411c9312ce3aa1f5fdac1e6db62e8d1f8fd61985e008f02792c099a8e431931bc9465f0834b5651a3fefd33aaa563907b262848e9fc3267771e5b559c69

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6575831.exe

                Filesize

                214KB

                MD5

                c5720904b9d6cf3eaa7656968b4a6107

                SHA1

                88494ce98f9d0ebbb697c46bb093363dc6629a63

                SHA256

                b3b8eaf9bade2296cad25c9dcd161e9f4ecc9f334a831839aa7be209cecbc9a5

                SHA512

                53711411c9312ce3aa1f5fdac1e6db62e8d1f8fd61985e008f02792c099a8e431931bc9465f0834b5651a3fefd33aaa563907b262848e9fc3267771e5b559c69

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5191095.exe

                Filesize

                280KB

                MD5

                be5c1d9a4f4f0f4a903fa3816379c03a

                SHA1

                1b3f6f8cf621e0cad10380b769996ed48f5ec756

                SHA256

                a905aebe748094e99f212d9f882949b4677dc51a920056c71fbd8aed89578905

                SHA512

                ab79710e7536a6888724f732bad54d518375e3aa1b3d877956cd61dd8305f72c1a2c0cfb48f8de9e4a64e6bd87d6e817ec1d13c45d30ea5b58401332d12200ab

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5191095.exe

                Filesize

                280KB

                MD5

                be5c1d9a4f4f0f4a903fa3816379c03a

                SHA1

                1b3f6f8cf621e0cad10380b769996ed48f5ec756

                SHA256

                a905aebe748094e99f212d9f882949b4677dc51a920056c71fbd8aed89578905

                SHA512

                ab79710e7536a6888724f732bad54d518375e3aa1b3d877956cd61dd8305f72c1a2c0cfb48f8de9e4a64e6bd87d6e817ec1d13c45d30ea5b58401332d12200ab

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1463875.exe

                Filesize

                168KB

                MD5

                2018fc9973ecb1a29ae0f62561716870

                SHA1

                bf562e2a3fa1437a3896c9a46324707e46489d42

                SHA256

                4d91d650cabf1e6d917520091acb552cd9bf617b536d268f3d2c88fde0d8c6f6

                SHA512

                12caee4b53815b622b688f30c13f44a2f9f21ab0385b7f5049c9d6e2be798c22c27fa5ad005e44bf88004503e38a0b2b4520a90bf9d3afca4d1c2d09420fe660

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1463875.exe

                Filesize

                168KB

                MD5

                2018fc9973ecb1a29ae0f62561716870

                SHA1

                bf562e2a3fa1437a3896c9a46324707e46489d42

                SHA256

                4d91d650cabf1e6d917520091acb552cd9bf617b536d268f3d2c88fde0d8c6f6

                SHA512

                12caee4b53815b622b688f30c13f44a2f9f21ab0385b7f5049c9d6e2be798c22c27fa5ad005e44bf88004503e38a0b2b4520a90bf9d3afca4d1c2d09420fe660

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8532656.exe

                Filesize

                157KB

                MD5

                aa4eaeff79cb38c399034536508af408

                SHA1

                317efd6e61046e44504ae1a1b06afd6752cb21af

                SHA256

                af09775e43164d92b661868c04daa7c07da6165bfa6b95fc8a9c8aad80b568a7

                SHA512

                9319475cfc0dc6069f3bec6ab19ef22b7146658dfa138136b9a2e4d66f1d1def91300a1c5d88157a09cfe1a8393ef87fab8252ae93bc772b0306c1e935017cff

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8532656.exe

                Filesize

                157KB

                MD5

                aa4eaeff79cb38c399034536508af408

                SHA1

                317efd6e61046e44504ae1a1b06afd6752cb21af

                SHA256

                af09775e43164d92b661868c04daa7c07da6165bfa6b95fc8a9c8aad80b568a7

                SHA512

                9319475cfc0dc6069f3bec6ab19ef22b7146658dfa138136b9a2e4d66f1d1def91300a1c5d88157a09cfe1a8393ef87fab8252ae93bc772b0306c1e935017cff

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                214KB

                MD5

                c5720904b9d6cf3eaa7656968b4a6107

                SHA1

                88494ce98f9d0ebbb697c46bb093363dc6629a63

                SHA256

                b3b8eaf9bade2296cad25c9dcd161e9f4ecc9f334a831839aa7be209cecbc9a5

                SHA512

                53711411c9312ce3aa1f5fdac1e6db62e8d1f8fd61985e008f02792c099a8e431931bc9465f0834b5651a3fefd33aaa563907b262848e9fc3267771e5b559c69

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                214KB

                MD5

                c5720904b9d6cf3eaa7656968b4a6107

                SHA1

                88494ce98f9d0ebbb697c46bb093363dc6629a63

                SHA256

                b3b8eaf9bade2296cad25c9dcd161e9f4ecc9f334a831839aa7be209cecbc9a5

                SHA512

                53711411c9312ce3aa1f5fdac1e6db62e8d1f8fd61985e008f02792c099a8e431931bc9465f0834b5651a3fefd33aaa563907b262848e9fc3267771e5b559c69

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                214KB

                MD5

                c5720904b9d6cf3eaa7656968b4a6107

                SHA1

                88494ce98f9d0ebbb697c46bb093363dc6629a63

                SHA256

                b3b8eaf9bade2296cad25c9dcd161e9f4ecc9f334a831839aa7be209cecbc9a5

                SHA512

                53711411c9312ce3aa1f5fdac1e6db62e8d1f8fd61985e008f02792c099a8e431931bc9465f0834b5651a3fefd33aaa563907b262848e9fc3267771e5b559c69

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                214KB

                MD5

                c5720904b9d6cf3eaa7656968b4a6107

                SHA1

                88494ce98f9d0ebbb697c46bb093363dc6629a63

                SHA256

                b3b8eaf9bade2296cad25c9dcd161e9f4ecc9f334a831839aa7be209cecbc9a5

                SHA512

                53711411c9312ce3aa1f5fdac1e6db62e8d1f8fd61985e008f02792c099a8e431931bc9465f0834b5651a3fefd33aaa563907b262848e9fc3267771e5b559c69

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                214KB

                MD5

                c5720904b9d6cf3eaa7656968b4a6107

                SHA1

                88494ce98f9d0ebbb697c46bb093363dc6629a63

                SHA256

                b3b8eaf9bade2296cad25c9dcd161e9f4ecc9f334a831839aa7be209cecbc9a5

                SHA512

                53711411c9312ce3aa1f5fdac1e6db62e8d1f8fd61985e008f02792c099a8e431931bc9465f0834b5651a3fefd33aaa563907b262848e9fc3267771e5b559c69

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/616-172-0x0000000000570000-0x000000000057A000-memory.dmp

                Filesize

                40KB

              • memory/3196-193-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3196-198-0x0000000002BB0000-0x0000000002BC0000-memory.dmp

                Filesize

                64KB

              • memory/3196-200-0x0000000002BB0000-0x0000000002BC0000-memory.dmp

                Filesize

                64KB

              • memory/5048-163-0x000000000B820000-0x000000000B886000-memory.dmp

                Filesize

                408KB

              • memory/5048-160-0x000000000AF40000-0x000000000AFB6000-memory.dmp

                Filesize

                472KB

              • memory/5048-167-0x000000000C470000-0x000000000C4C0000-memory.dmp

                Filesize

                320KB

              • memory/5048-162-0x000000000BDD0000-0x000000000C374000-memory.dmp

                Filesize

                5.6MB

              • memory/5048-161-0x000000000B780000-0x000000000B812000-memory.dmp

                Filesize

                584KB

              • memory/5048-165-0x000000000CC50000-0x000000000D17C000-memory.dmp

                Filesize

                5.2MB

              • memory/5048-166-0x00000000055B0000-0x00000000055C0000-memory.dmp

                Filesize

                64KB

              • memory/5048-164-0x000000000C550000-0x000000000C712000-memory.dmp

                Filesize

                1.8MB

              • memory/5048-159-0x00000000055B0000-0x00000000055C0000-memory.dmp

                Filesize

                64KB

              • memory/5048-158-0x000000000AC30000-0x000000000AC6C000-memory.dmp

                Filesize

                240KB

              • memory/5048-157-0x000000000ABD0000-0x000000000ABE2000-memory.dmp

                Filesize

                72KB

              • memory/5048-156-0x000000000ACA0000-0x000000000ADAA000-memory.dmp

                Filesize

                1.0MB

              • memory/5048-155-0x000000000B160000-0x000000000B778000-memory.dmp

                Filesize

                6.1MB

              • memory/5048-154-0x0000000000D20000-0x0000000000D4E000-memory.dmp

                Filesize

                184KB