Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2023, 04:06

General

  • Target

    26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe

  • Size

    1.0MB

  • MD5

    01668bc1e0c7fdb0b3c628f4e4e07599

  • SHA1

    ff708006fa9b4f251dea09baf9561baf0dabaa39

  • SHA256

    26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654

  • SHA512

    40ae1af87df2377812d7ef4f8bdfe082b84176e2c49fe4090a122911e942ca1d50a831da7159d5ccae792af7a99a1bc49db2f3218024a7cc9d74d4c4e727a8bb

  • SSDEEP

    24576:Pyk35iYqJy8D+jKxx51wRgSN8izSv0aPLDuD:ak3IFJyZKx/1wRgSyicz

Malware Config

Extracted

Family

redline

Botnet

lusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    c9df946711e01c378b42221de692acbd

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe
    "C:\Users\Admin\AppData\Local\Temp\26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4275127.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4275127.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4332265.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4332265.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4168
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0728817.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0728817.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:636
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1012
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3448741.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3448741.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4167516.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4167516.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:216
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0640150.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0640150.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5028
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0640150.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0640150.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:4084
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 12
          4⤵
          • Program crash
          PID:3100
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4084 -ip 4084
    1⤵
      PID:1228

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

      Filesize

      226B

      MD5

      916851e072fbabc4796d8916c5131092

      SHA1

      d48a602229a690c512d5fdaf4c8d77547a88e7a2

      SHA256

      7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

      SHA512

      07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0640150.exe

      Filesize

      966KB

      MD5

      9881849e1f23a7f03b260e1c2531c261

      SHA1

      40df971cde93b92d637a3ca725e0ac0ff3256bd8

      SHA256

      c2ccae8ea50277481e6d28a2fa10f7500e963adf442e90af5041887fae086c86

      SHA512

      a17eec654a820f4d803d621439311395d85950de18d031d236ce9c11923a7cf9949d2c8a0275b3f4696683c2aa4ee47bcacd177daa94cf61fd28c65075a0645b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0640150.exe

      Filesize

      966KB

      MD5

      9881849e1f23a7f03b260e1c2531c261

      SHA1

      40df971cde93b92d637a3ca725e0ac0ff3256bd8

      SHA256

      c2ccae8ea50277481e6d28a2fa10f7500e963adf442e90af5041887fae086c86

      SHA512

      a17eec654a820f4d803d621439311395d85950de18d031d236ce9c11923a7cf9949d2c8a0275b3f4696683c2aa4ee47bcacd177daa94cf61fd28c65075a0645b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0640150.exe

      Filesize

      966KB

      MD5

      9881849e1f23a7f03b260e1c2531c261

      SHA1

      40df971cde93b92d637a3ca725e0ac0ff3256bd8

      SHA256

      c2ccae8ea50277481e6d28a2fa10f7500e963adf442e90af5041887fae086c86

      SHA512

      a17eec654a820f4d803d621439311395d85950de18d031d236ce9c11923a7cf9949d2c8a0275b3f4696683c2aa4ee47bcacd177daa94cf61fd28c65075a0645b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4275127.exe

      Filesize

      606KB

      MD5

      bf5f7291f6a98f0b45ae7bd34c13e674

      SHA1

      ab9c11a84dd2777948d2dabc71d5709532e8e2e6

      SHA256

      68e2e0596cc77450abe1ae6f96b0f1080515a7d2bccfc51443e56a9afba3904c

      SHA512

      acc73e788843c24804425d4f8eb8f07bda75da989403f7b36a056985a3cdf25db4ca13e875188f4b65ea015fa98c2785807ce50c404369bdc9da5627edbb97c5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4275127.exe

      Filesize

      606KB

      MD5

      bf5f7291f6a98f0b45ae7bd34c13e674

      SHA1

      ab9c11a84dd2777948d2dabc71d5709532e8e2e6

      SHA256

      68e2e0596cc77450abe1ae6f96b0f1080515a7d2bccfc51443e56a9afba3904c

      SHA512

      acc73e788843c24804425d4f8eb8f07bda75da989403f7b36a056985a3cdf25db4ca13e875188f4b65ea015fa98c2785807ce50c404369bdc9da5627edbb97c5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4167516.exe

      Filesize

      304KB

      MD5

      a72d98ef6e83996282ce0b422ef5f3a8

      SHA1

      0e931b3ae7af46fb2d5604cf8ce2932cba949dc7

      SHA256

      13b7c3850cb51b0df2c459760f86094b741c2626b692c7ba45356fbbe96dbef3

      SHA512

      27e264421ebbbdee4f96261deb13e447eff0ace19c30ed990da08c84f25636f9a0624c62262511b80b014a1bc1307592fe4fce55f91285a336014e2cfd002970

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4167516.exe

      Filesize

      304KB

      MD5

      a72d98ef6e83996282ce0b422ef5f3a8

      SHA1

      0e931b3ae7af46fb2d5604cf8ce2932cba949dc7

      SHA256

      13b7c3850cb51b0df2c459760f86094b741c2626b692c7ba45356fbbe96dbef3

      SHA512

      27e264421ebbbdee4f96261deb13e447eff0ace19c30ed990da08c84f25636f9a0624c62262511b80b014a1bc1307592fe4fce55f91285a336014e2cfd002970

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4332265.exe

      Filesize

      276KB

      MD5

      65018be8a239c51d86ca0e1315589b63

      SHA1

      8fc4e08268f020259199525fbb58c12c82056398

      SHA256

      f507447be4a0630385bf788241b434e41332ea45f23013e3014a4654cb80ad5b

      SHA512

      7d8d47a3d52d3148fc9938fb73f508b60bdcb7fc7b06fd40719a5b41f5e72aa9488db8eaba9571fd15040c14fb0ca83baca048ece6eb2c89da35bccc4c6e2741

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4332265.exe

      Filesize

      276KB

      MD5

      65018be8a239c51d86ca0e1315589b63

      SHA1

      8fc4e08268f020259199525fbb58c12c82056398

      SHA256

      f507447be4a0630385bf788241b434e41332ea45f23013e3014a4654cb80ad5b

      SHA512

      7d8d47a3d52d3148fc9938fb73f508b60bdcb7fc7b06fd40719a5b41f5e72aa9488db8eaba9571fd15040c14fb0ca83baca048ece6eb2c89da35bccc4c6e2741

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0728817.exe

      Filesize

      147KB

      MD5

      dcb853968c39a1d0357655c4a97a9e25

      SHA1

      095427392b44d25ba0ae5a0012e9d6ab8cc8138b

      SHA256

      1035683a1ba26c3edb54b2d1d54b0b5f38fd072aa344b1079279913f3519f2e6

      SHA512

      c3e95a24078cf9f9c26b1afabdbcba411ecd49d0331802da4b3f0b4f95eed71eba8e6aa76dbe9c0be9b1468664fcb0e42d74adfa4f8e0df02cd6f7a210ba29a2

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0728817.exe

      Filesize

      147KB

      MD5

      dcb853968c39a1d0357655c4a97a9e25

      SHA1

      095427392b44d25ba0ae5a0012e9d6ab8cc8138b

      SHA256

      1035683a1ba26c3edb54b2d1d54b0b5f38fd072aa344b1079279913f3519f2e6

      SHA512

      c3e95a24078cf9f9c26b1afabdbcba411ecd49d0331802da4b3f0b4f95eed71eba8e6aa76dbe9c0be9b1468664fcb0e42d74adfa4f8e0df02cd6f7a210ba29a2

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3448741.exe

      Filesize

      168KB

      MD5

      89adf517d111c95ea39f8dc24f8b711c

      SHA1

      e7f964e564632813ddd214d126393f3e679d86d2

      SHA256

      573d0d4151cb5910d8e81681bc232370504326c0189183c6cdd44dfac86a292e

      SHA512

      c29281d8e2144cbe8ce80dec0ceaeaaa8d20efc7a56399fe7d57975ca7c4b940c94456aecb46b396930f8e506438f257c6f503ebff1cc0943d0be0a6eb1f3a67

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3448741.exe

      Filesize

      168KB

      MD5

      89adf517d111c95ea39f8dc24f8b711c

      SHA1

      e7f964e564632813ddd214d126393f3e679d86d2

      SHA256

      573d0d4151cb5910d8e81681bc232370504326c0189183c6cdd44dfac86a292e

      SHA512

      c29281d8e2144cbe8ce80dec0ceaeaaa8d20efc7a56399fe7d57975ca7c4b940c94456aecb46b396930f8e506438f257c6f503ebff1cc0943d0be0a6eb1f3a67

    • memory/216-197-0x0000000005540000-0x0000000005550000-memory.dmp

      Filesize

      64KB

    • memory/216-191-0x0000000005540000-0x0000000005550000-memory.dmp

      Filesize

      64KB

    • memory/216-181-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1012-154-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/4084-193-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/5012-162-0x0000000000B80000-0x0000000000BAE000-memory.dmp

      Filesize

      184KB

    • memory/5012-169-0x000000000B650000-0x000000000B6E2000-memory.dmp

      Filesize

      584KB

    • memory/5012-176-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/5012-174-0x000000000CB20000-0x000000000D04C000-memory.dmp

      Filesize

      5.2MB

    • memory/5012-173-0x000000000C420000-0x000000000C5E2000-memory.dmp

      Filesize

      1.8MB

    • memory/5012-171-0x000000000AF90000-0x000000000AFF6000-memory.dmp

      Filesize

      408KB

    • memory/5012-170-0x000000000BCA0000-0x000000000C244000-memory.dmp

      Filesize

      5.6MB

    • memory/5012-175-0x000000000C290000-0x000000000C2E0000-memory.dmp

      Filesize

      320KB

    • memory/5012-168-0x000000000ADA0000-0x000000000AE16000-memory.dmp

      Filesize

      472KB

    • memory/5012-163-0x000000000B030000-0x000000000B648000-memory.dmp

      Filesize

      6.1MB

    • memory/5012-167-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/5012-164-0x000000000AB20000-0x000000000AC2A000-memory.dmp

      Filesize

      1.0MB

    • memory/5012-166-0x000000000AA90000-0x000000000AACC000-memory.dmp

      Filesize

      240KB

    • memory/5012-165-0x000000000AA30000-0x000000000AA42000-memory.dmp

      Filesize

      72KB

    • memory/5028-192-0x0000000007490000-0x00000000074A0000-memory.dmp

      Filesize

      64KB

    • memory/5028-190-0x00000000006A0000-0x0000000000798000-memory.dmp

      Filesize

      992KB