Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2023, 15:51

General

  • Target

    99364f88da7a5e99d74b536dade91f5feb795a2db2969e708003ddfd96b0f82e.exe

  • Size

    624KB

  • MD5

    4e9e3ad0c85a4e6a197afdc8725cf43e

  • SHA1

    d77ad1b6ed764dd36e1edba32a4e4f60cc9944bb

  • SHA256

    99364f88da7a5e99d74b536dade91f5feb795a2db2969e708003ddfd96b0f82e

  • SHA512

    576dc3d9a084a8e09f3a440352efb5a2bc2d1fcd49b0ced7448b6b4c3eeadb367843ac637f6a15d68fcf22702e0218d314ba0a38b76fb7dfc7446530907f57ab

  • SSDEEP

    12288:NMr5y900nxWyOAFTiEoROlYxZN9pUwSbVUdsOcqKi:YyJkmxzlYx/3UWX

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99364f88da7a5e99d74b536dade91f5feb795a2db2969e708003ddfd96b0f82e.exe
    "C:\Users\Admin\AppData\Local\Temp\99364f88da7a5e99d74b536dade91f5feb795a2db2969e708003ddfd96b0f82e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2105581.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2105581.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7787745.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7787745.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2024
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7068028.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7068028.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2964
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2556
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2500277.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2500277.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4780013.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4780013.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4612
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2844
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2260
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4524
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:4980
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:1860
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2304
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:1336
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2020
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:3128
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0840124.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0840124.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:2452
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4204
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:456
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4808

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0840124.exe

                Filesize

                265KB

                MD5

                06f12f0f40b80101b4153d8404b5427c

                SHA1

                827ec306596ab45b98e4985b89eed24e7a98eda6

                SHA256

                eb5dc9c0787cb115e436db16f66d2520f95e97500de637eec82860fca65b28bc

                SHA512

                4a5f7a4ee3a0a4430689e22da7afdf5ef7bfa05e982bf72f2be27a1bb8d325d70d2cb2304444b8414a71a55db412f9867be39a46d2eb78a4aea718620123ec5e

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0840124.exe

                Filesize

                265KB

                MD5

                06f12f0f40b80101b4153d8404b5427c

                SHA1

                827ec306596ab45b98e4985b89eed24e7a98eda6

                SHA256

                eb5dc9c0787cb115e436db16f66d2520f95e97500de637eec82860fca65b28bc

                SHA512

                4a5f7a4ee3a0a4430689e22da7afdf5ef7bfa05e982bf72f2be27a1bb8d325d70d2cb2304444b8414a71a55db412f9867be39a46d2eb78a4aea718620123ec5e

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2105581.exe

                Filesize

                423KB

                MD5

                41a8816dde6a9c2c00cccf232ac6002a

                SHA1

                9573e968d1d41f4ada78c2c404dfdd79e6beba27

                SHA256

                3d8ae1b24134f389a47accbffe2979d3bcdce912ac47d971e991ce97bc5d7fe1

                SHA512

                4c3098976386f991785d548a492850a456ce47241e6bb5de8d0c76a9adb982edc111818045df0056a5fd207517fc5548b3155100c849d0f4a8cce1bc25405335

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2105581.exe

                Filesize

                423KB

                MD5

                41a8816dde6a9c2c00cccf232ac6002a

                SHA1

                9573e968d1d41f4ada78c2c404dfdd79e6beba27

                SHA256

                3d8ae1b24134f389a47accbffe2979d3bcdce912ac47d971e991ce97bc5d7fe1

                SHA512

                4c3098976386f991785d548a492850a456ce47241e6bb5de8d0c76a9adb982edc111818045df0056a5fd207517fc5548b3155100c849d0f4a8cce1bc25405335

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4780013.exe

                Filesize

                217KB

                MD5

                91e09603304c95a2b7eddf714fa518b2

                SHA1

                8772a30236484bb497a24d189eaa2fc2e77de31f

                SHA256

                aa28c8c84ac3526c253a4c1bf1b0a25953546cc257f3705d649472d963753855

                SHA512

                355c51e22bfb4ee0754ec1786ecc08337ff84786d7b29e8828203de8e93fe18c3b8a16fc73af001380899f198dee609bc0254f0b8335e4d94fee4055eae19531

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4780013.exe

                Filesize

                217KB

                MD5

                91e09603304c95a2b7eddf714fa518b2

                SHA1

                8772a30236484bb497a24d189eaa2fc2e77de31f

                SHA256

                aa28c8c84ac3526c253a4c1bf1b0a25953546cc257f3705d649472d963753855

                SHA512

                355c51e22bfb4ee0754ec1786ecc08337ff84786d7b29e8828203de8e93fe18c3b8a16fc73af001380899f198dee609bc0254f0b8335e4d94fee4055eae19531

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7787745.exe

                Filesize

                252KB

                MD5

                753d56ba58ea936fe277333ef2b76c7d

                SHA1

                31383abc0c1bae132a70e7e7a1efe29e21413b84

                SHA256

                dcfd466f5471e03dc72ccb12a1aa44408d67c88ea73bf8e42ec1fb014af085d3

                SHA512

                cd5520688da5f6b077d4c609aff1f93d9f6a41c7c8b0d8fbb1215361e3e5aab40e1628195aec9ac3264607cd3f80ea49fe6dc4f7e890af4246cb8849bed54c85

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7787745.exe

                Filesize

                252KB

                MD5

                753d56ba58ea936fe277333ef2b76c7d

                SHA1

                31383abc0c1bae132a70e7e7a1efe29e21413b84

                SHA256

                dcfd466f5471e03dc72ccb12a1aa44408d67c88ea73bf8e42ec1fb014af085d3

                SHA512

                cd5520688da5f6b077d4c609aff1f93d9f6a41c7c8b0d8fbb1215361e3e5aab40e1628195aec9ac3264607cd3f80ea49fe6dc4f7e890af4246cb8849bed54c85

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7068028.exe

                Filesize

                108KB

                MD5

                6d5db5de42b16f1cd19c9fea70bb0af6

                SHA1

                aa27980446a994009f018915bfce19b097efde3f

                SHA256

                65d208a9d2d92e26c5ee03878b6529359768a0ae5ddd1d64a0c927764967a8b5

                SHA512

                720af3e83fb85fa3bf106b49c94a059ad84b93646c5f14ce02ab8d2710d9bd9b18fd227a5f1c3326e23ca0e9b886d65ec6b83048feffd07c07b739df59fbeeac

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7068028.exe

                Filesize

                108KB

                MD5

                6d5db5de42b16f1cd19c9fea70bb0af6

                SHA1

                aa27980446a994009f018915bfce19b097efde3f

                SHA256

                65d208a9d2d92e26c5ee03878b6529359768a0ae5ddd1d64a0c927764967a8b5

                SHA512

                720af3e83fb85fa3bf106b49c94a059ad84b93646c5f14ce02ab8d2710d9bd9b18fd227a5f1c3326e23ca0e9b886d65ec6b83048feffd07c07b739df59fbeeac

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2500277.exe

                Filesize

                169KB

                MD5

                7872212cf90c666df5e5274b1fe10d1d

                SHA1

                ac234ed3dcc1fb04ee341b2f4736f53ac4631f11

                SHA256

                dfe21b47e9b73fce3bccb4c76a090be914ff47b56dca2d28d9d016d3cb21fbdf

                SHA512

                63ce4e3e9219ba2dacfedb72bc03bfa33263dd82881e4a2baa2a3a23d64aa64d165d6584ad77ac2141967087ffb6ed327b3103ba3d8f338c69277f2248ab1a95

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2500277.exe

                Filesize

                169KB

                MD5

                7872212cf90c666df5e5274b1fe10d1d

                SHA1

                ac234ed3dcc1fb04ee341b2f4736f53ac4631f11

                SHA256

                dfe21b47e9b73fce3bccb4c76a090be914ff47b56dca2d28d9d016d3cb21fbdf

                SHA512

                63ce4e3e9219ba2dacfedb72bc03bfa33263dd82881e4a2baa2a3a23d64aa64d165d6584ad77ac2141967087ffb6ed327b3103ba3d8f338c69277f2248ab1a95

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                91e09603304c95a2b7eddf714fa518b2

                SHA1

                8772a30236484bb497a24d189eaa2fc2e77de31f

                SHA256

                aa28c8c84ac3526c253a4c1bf1b0a25953546cc257f3705d649472d963753855

                SHA512

                355c51e22bfb4ee0754ec1786ecc08337ff84786d7b29e8828203de8e93fe18c3b8a16fc73af001380899f198dee609bc0254f0b8335e4d94fee4055eae19531

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                91e09603304c95a2b7eddf714fa518b2

                SHA1

                8772a30236484bb497a24d189eaa2fc2e77de31f

                SHA256

                aa28c8c84ac3526c253a4c1bf1b0a25953546cc257f3705d649472d963753855

                SHA512

                355c51e22bfb4ee0754ec1786ecc08337ff84786d7b29e8828203de8e93fe18c3b8a16fc73af001380899f198dee609bc0254f0b8335e4d94fee4055eae19531

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                91e09603304c95a2b7eddf714fa518b2

                SHA1

                8772a30236484bb497a24d189eaa2fc2e77de31f

                SHA256

                aa28c8c84ac3526c253a4c1bf1b0a25953546cc257f3705d649472d963753855

                SHA512

                355c51e22bfb4ee0754ec1786ecc08337ff84786d7b29e8828203de8e93fe18c3b8a16fc73af001380899f198dee609bc0254f0b8335e4d94fee4055eae19531

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                91e09603304c95a2b7eddf714fa518b2

                SHA1

                8772a30236484bb497a24d189eaa2fc2e77de31f

                SHA256

                aa28c8c84ac3526c253a4c1bf1b0a25953546cc257f3705d649472d963753855

                SHA512

                355c51e22bfb4ee0754ec1786ecc08337ff84786d7b29e8828203de8e93fe18c3b8a16fc73af001380899f198dee609bc0254f0b8335e4d94fee4055eae19531

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                91e09603304c95a2b7eddf714fa518b2

                SHA1

                8772a30236484bb497a24d189eaa2fc2e77de31f

                SHA256

                aa28c8c84ac3526c253a4c1bf1b0a25953546cc257f3705d649472d963753855

                SHA512

                355c51e22bfb4ee0754ec1786ecc08337ff84786d7b29e8828203de8e93fe18c3b8a16fc73af001380899f198dee609bc0254f0b8335e4d94fee4055eae19531

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/2556-154-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/4204-194-0x0000000000600000-0x000000000062E000-memory.dmp

                Filesize

                184KB

              • memory/4204-200-0x0000000004C30000-0x0000000004C40000-memory.dmp

                Filesize

                64KB

              • memory/4384-162-0x0000000000E50000-0x0000000000E7E000-memory.dmp

                Filesize

                184KB

              • memory/4384-176-0x0000000006F20000-0x0000000006F70000-memory.dmp

                Filesize

                320KB

              • memory/4384-175-0x0000000005840000-0x0000000005850000-memory.dmp

                Filesize

                64KB

              • memory/4384-173-0x0000000009200000-0x000000000972C000-memory.dmp

                Filesize

                5.2MB

              • memory/4384-172-0x0000000006D50000-0x0000000006F12000-memory.dmp

                Filesize

                1.8MB

              • memory/4384-171-0x0000000005E10000-0x0000000005E76000-memory.dmp

                Filesize

                408KB

              • memory/4384-170-0x0000000007030000-0x00000000075D4000-memory.dmp

                Filesize

                5.6MB

              • memory/4384-169-0x0000000005D70000-0x0000000005E02000-memory.dmp

                Filesize

                584KB

              • memory/4384-168-0x0000000005C50000-0x0000000005CC6000-memory.dmp

                Filesize

                472KB

              • memory/4384-167-0x0000000005840000-0x0000000005850000-memory.dmp

                Filesize

                64KB

              • memory/4384-166-0x0000000005950000-0x000000000598C000-memory.dmp

                Filesize

                240KB

              • memory/4384-165-0x00000000057D0000-0x00000000057E2000-memory.dmp

                Filesize

                72KB

              • memory/4384-164-0x0000000005A60000-0x0000000005B6A000-memory.dmp

                Filesize

                1.0MB

              • memory/4384-163-0x0000000005F70000-0x0000000006588000-memory.dmp

                Filesize

                6.1MB