Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2023, 00:01

General

  • Target

    cac2e20fd99e79c8582e405e5915685039af3b1e4754f11b56484ea5505f3f62.exe

  • Size

    793KB

  • MD5

    68ee98fefee356ae35517d4c97965b9a

  • SHA1

    92399476e42fae9e22e7c3440b1295b01bc21941

  • SHA256

    cac2e20fd99e79c8582e405e5915685039af3b1e4754f11b56484ea5505f3f62

  • SHA512

    298cbfac2987fdd1f86c28cba63d2005ba5445e8d7c0d8472d643b72f85e82152f3d434f7a6985bf77587e64efb6863e5d3f17bb751d1b230c75b82573621355

  • SSDEEP

    12288:PMr+y90o+utm0lYc1+ld7c9ntTS4e3PJDM2fCIiRFDM4YtfBgbBSDrorDWzDkdLU:dyT+6eNsnve3PHfCHHmbgbiKW8dY

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cac2e20fd99e79c8582e405e5915685039af3b1e4754f11b56484ea5505f3f62.exe
    "C:\Users\Admin\AppData\Local\Temp\cac2e20fd99e79c8582e405e5915685039af3b1e4754f11b56484ea5505f3f62.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0581193.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0581193.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1147589.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1147589.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3566860.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3566860.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1380
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2787033.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2787033.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3220
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4001898.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4001898.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3356
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:5104
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:952
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:2488
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:2496
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:396
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1960
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:3992
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:3292
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:1988
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3968119.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3968119.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4244
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4520
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2416
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:3900

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3968119.exe

                Filesize

                323KB

                MD5

                500e4a13294a010960bce823e6a50ff8

                SHA1

                e75ab0f32ecf50a4e986fb3b69271abb497dc08a

                SHA256

                9c269bf7002f8a9c897f2676c5b49317e4555f22aabc26ac701c875a10f7c202

                SHA512

                79b14cf7fa8a0d3b828b3af80499a7b3000a9d3fc6a96611f60f5f1b9482134b110a5e6b502c02ca2b004101cdf630b7638500e8b5a2b440744902cea04dad82

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3968119.exe

                Filesize

                323KB

                MD5

                500e4a13294a010960bce823e6a50ff8

                SHA1

                e75ab0f32ecf50a4e986fb3b69271abb497dc08a

                SHA256

                9c269bf7002f8a9c897f2676c5b49317e4555f22aabc26ac701c875a10f7c202

                SHA512

                79b14cf7fa8a0d3b828b3af80499a7b3000a9d3fc6a96611f60f5f1b9482134b110a5e6b502c02ca2b004101cdf630b7638500e8b5a2b440744902cea04dad82

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0581193.exe

                Filesize

                455KB

                MD5

                50d8c888e7c0376f17ec95dc89caa39d

                SHA1

                c66ef19806dcc85dc4d2cf682d04dc5d93ac32aa

                SHA256

                3ce9a625c6555781e56b842a4fdb2eaedd7e2732825485ffaf1b450791b83939

                SHA512

                7e94c4f4084030738334d0c4f67aac3f646b7c49d394a56c53822f2c0fb9884a7c83cf609afc3e72c5aa6ea70f0e153cf0745f3e744917f45f73530de1995426

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0581193.exe

                Filesize

                455KB

                MD5

                50d8c888e7c0376f17ec95dc89caa39d

                SHA1

                c66ef19806dcc85dc4d2cf682d04dc5d93ac32aa

                SHA256

                3ce9a625c6555781e56b842a4fdb2eaedd7e2732825485ffaf1b450791b83939

                SHA512

                7e94c4f4084030738334d0c4f67aac3f646b7c49d394a56c53822f2c0fb9884a7c83cf609afc3e72c5aa6ea70f0e153cf0745f3e744917f45f73530de1995426

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4001898.exe

                Filesize

                215KB

                MD5

                36c99f721f6fb648f9ef5650ab586a2b

                SHA1

                527c2589bcdb75d39a0aa16030b1ce2ee120ed06

                SHA256

                3333a2887d3bac6fd3b72e3c2655b1e89bcfc911cd312ebef08ac1a47105c728

                SHA512

                65db714354e2d58a9623b93f86df8a6a5bb0e629f354680b3666c69fc11c82545997ebbe6337d2d3f20a11071363e70ff97270fc2477f0104f37dbce916a73ae

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4001898.exe

                Filesize

                215KB

                MD5

                36c99f721f6fb648f9ef5650ab586a2b

                SHA1

                527c2589bcdb75d39a0aa16030b1ce2ee120ed06

                SHA256

                3333a2887d3bac6fd3b72e3c2655b1e89bcfc911cd312ebef08ac1a47105c728

                SHA512

                65db714354e2d58a9623b93f86df8a6a5bb0e629f354680b3666c69fc11c82545997ebbe6337d2d3f20a11071363e70ff97270fc2477f0104f37dbce916a73ae

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1147589.exe

                Filesize

                283KB

                MD5

                f7a95a2d19de645a85cd7b01659c8291

                SHA1

                bf7ccbdc13d449b58bda2e9e332ef06856b6d406

                SHA256

                ef0e2971c2bc988bbab92f4947df53e43ac33cd0832e1dd88581efd3b65ba28c

                SHA512

                34fa6253f0c825871338250432d7193f678831b4b04d9f301c1cad0899391b12f67810f9ba01444a93da81b2e08899638b53c89be514e68e512d4892b2ce2994

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1147589.exe

                Filesize

                283KB

                MD5

                f7a95a2d19de645a85cd7b01659c8291

                SHA1

                bf7ccbdc13d449b58bda2e9e332ef06856b6d406

                SHA256

                ef0e2971c2bc988bbab92f4947df53e43ac33cd0832e1dd88581efd3b65ba28c

                SHA512

                34fa6253f0c825871338250432d7193f678831b4b04d9f301c1cad0899391b12f67810f9ba01444a93da81b2e08899638b53c89be514e68e512d4892b2ce2994

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3566860.exe

                Filesize

                168KB

                MD5

                7be648a5db8df926c29ad65a2128d4d3

                SHA1

                05d2aad86606c295a70e9dd02e9adda061d092a6

                SHA256

                1198bc07f220af5fe948a5772546cee3a4d6b87530299322ff68327dd7e85747

                SHA512

                dd1eda032bfb150c5c3dae0ec55128cf521946d474dec54b89171a76fa94a1aea76f7aab6fd276476f79f28e3de6d42f236e1782c6a419d11f7885988d8e5f9c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3566860.exe

                Filesize

                168KB

                MD5

                7be648a5db8df926c29ad65a2128d4d3

                SHA1

                05d2aad86606c295a70e9dd02e9adda061d092a6

                SHA256

                1198bc07f220af5fe948a5772546cee3a4d6b87530299322ff68327dd7e85747

                SHA512

                dd1eda032bfb150c5c3dae0ec55128cf521946d474dec54b89171a76fa94a1aea76f7aab6fd276476f79f28e3de6d42f236e1782c6a419d11f7885988d8e5f9c

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2787033.exe

                Filesize

                165KB

                MD5

                cc684d48395b29ccb8689c2e16a531f8

                SHA1

                daaad6d37157e6c74c6def973d22ae5f43ea295f

                SHA256

                f8d2137afbedc094c388c7d9c9638b4de7753ef3f4bfdfcf45902fa958933e4a

                SHA512

                a32a79e26d36f3f4638dfd4e631da69a95fd384ef0a97bca3e9be9f4769d0669b420f36241a3593ffab99e6888ce54df29106806aa9edf3f3db9e54821231af0

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g2787033.exe

                Filesize

                165KB

                MD5

                cc684d48395b29ccb8689c2e16a531f8

                SHA1

                daaad6d37157e6c74c6def973d22ae5f43ea295f

                SHA256

                f8d2137afbedc094c388c7d9c9638b4de7753ef3f4bfdfcf45902fa958933e4a

                SHA512

                a32a79e26d36f3f4638dfd4e631da69a95fd384ef0a97bca3e9be9f4769d0669b420f36241a3593ffab99e6888ce54df29106806aa9edf3f3db9e54821231af0

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                215KB

                MD5

                36c99f721f6fb648f9ef5650ab586a2b

                SHA1

                527c2589bcdb75d39a0aa16030b1ce2ee120ed06

                SHA256

                3333a2887d3bac6fd3b72e3c2655b1e89bcfc911cd312ebef08ac1a47105c728

                SHA512

                65db714354e2d58a9623b93f86df8a6a5bb0e629f354680b3666c69fc11c82545997ebbe6337d2d3f20a11071363e70ff97270fc2477f0104f37dbce916a73ae

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                215KB

                MD5

                36c99f721f6fb648f9ef5650ab586a2b

                SHA1

                527c2589bcdb75d39a0aa16030b1ce2ee120ed06

                SHA256

                3333a2887d3bac6fd3b72e3c2655b1e89bcfc911cd312ebef08ac1a47105c728

                SHA512

                65db714354e2d58a9623b93f86df8a6a5bb0e629f354680b3666c69fc11c82545997ebbe6337d2d3f20a11071363e70ff97270fc2477f0104f37dbce916a73ae

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                215KB

                MD5

                36c99f721f6fb648f9ef5650ab586a2b

                SHA1

                527c2589bcdb75d39a0aa16030b1ce2ee120ed06

                SHA256

                3333a2887d3bac6fd3b72e3c2655b1e89bcfc911cd312ebef08ac1a47105c728

                SHA512

                65db714354e2d58a9623b93f86df8a6a5bb0e629f354680b3666c69fc11c82545997ebbe6337d2d3f20a11071363e70ff97270fc2477f0104f37dbce916a73ae

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                215KB

                MD5

                36c99f721f6fb648f9ef5650ab586a2b

                SHA1

                527c2589bcdb75d39a0aa16030b1ce2ee120ed06

                SHA256

                3333a2887d3bac6fd3b72e3c2655b1e89bcfc911cd312ebef08ac1a47105c728

                SHA512

                65db714354e2d58a9623b93f86df8a6a5bb0e629f354680b3666c69fc11c82545997ebbe6337d2d3f20a11071363e70ff97270fc2477f0104f37dbce916a73ae

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                215KB

                MD5

                36c99f721f6fb648f9ef5650ab586a2b

                SHA1

                527c2589bcdb75d39a0aa16030b1ce2ee120ed06

                SHA256

                3333a2887d3bac6fd3b72e3c2655b1e89bcfc911cd312ebef08ac1a47105c728

                SHA512

                65db714354e2d58a9623b93f86df8a6a5bb0e629f354680b3666c69fc11c82545997ebbe6337d2d3f20a11071363e70ff97270fc2477f0104f37dbce916a73ae

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/556-172-0x00000000003F0000-0x00000000003FA000-memory.dmp

                Filesize

                40KB

              • memory/1380-157-0x000000000A690000-0x000000000A6A2000-memory.dmp

                Filesize

                72KB

              • memory/1380-160-0x000000000AA00000-0x000000000AA76000-memory.dmp

                Filesize

                472KB

              • memory/1380-166-0x000000000C760000-0x000000000CC8C000-memory.dmp

                Filesize

                5.2MB

              • memory/1380-165-0x000000000C060000-0x000000000C222000-memory.dmp

                Filesize

                1.8MB

              • memory/1380-164-0x000000000B780000-0x000000000B7D0000-memory.dmp

                Filesize

                320KB

              • memory/1380-163-0x000000000B330000-0x000000000B396000-memory.dmp

                Filesize

                408KB

              • memory/1380-162-0x000000000B7E0000-0x000000000BD84000-memory.dmp

                Filesize

                5.6MB

              • memory/1380-154-0x00000000007E0000-0x000000000080E000-memory.dmp

                Filesize

                184KB

              • memory/1380-155-0x000000000AC10000-0x000000000B228000-memory.dmp

                Filesize

                6.1MB

              • memory/1380-161-0x000000000AB20000-0x000000000ABB2000-memory.dmp

                Filesize

                584KB

              • memory/1380-167-0x0000000005060000-0x0000000005070000-memory.dmp

                Filesize

                64KB

              • memory/1380-159-0x0000000005060000-0x0000000005070000-memory.dmp

                Filesize

                64KB

              • memory/1380-158-0x000000000A6F0000-0x000000000A72C000-memory.dmp

                Filesize

                240KB

              • memory/1380-156-0x000000000A760000-0x000000000A86A000-memory.dmp

                Filesize

                1.0MB

              • memory/4520-198-0x00000000055D0000-0x00000000055E0000-memory.dmp

                Filesize

                64KB

              • memory/4520-193-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB