Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2023, 14:46

General

  • Target

    10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe

  • Size

    586KB

  • MD5

    c05ca9d5f37d8ba919b3eb9bc77178fc

  • SHA1

    f183f68e9a6face1e6a901f13ac5be04e51f7b00

  • SHA256

    10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a

  • SHA512

    bd14c2dc1d809d2340e5340bda719efbad2bcc2a3b3cc1ab7eae1f410e0ececa87264040eb9ba304e23bbe9e3a0e6b23c8c67bb9f8178f8fce2ff47d6ed9363b

  • SSDEEP

    12288:GMr8y901ekO9PYktrHtsrlPLijZxG4Ej4r42Z1nO/x2Pv4:GybkurNWwYV2Z1yx2H4

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe
    "C:\Users\Admin\AppData\Local\Temp\10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2280627.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2280627.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7106867.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7106867.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2356
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0969513.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0969513.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4512

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2280627.exe

    Filesize

    378KB

    MD5

    0f6e2c891404e4e5f49d9b40c82692b5

    SHA1

    23fa9dc0a45ff1a7b57210e3539d28ec127ef7e1

    SHA256

    9c409cc422fe4adfc1a43716d6936100929cbdf99714f481e9aba3cc3d9b04a5

    SHA512

    3b81f44b0333c542bd67300813adb1dd44ddf5d42cec5feb1724761970728fb43f94fbf261fa709cb0c33b8067bafefaca1cc91066649e9860aa8ff37fdf8879

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2280627.exe

    Filesize

    378KB

    MD5

    0f6e2c891404e4e5f49d9b40c82692b5

    SHA1

    23fa9dc0a45ff1a7b57210e3539d28ec127ef7e1

    SHA256

    9c409cc422fe4adfc1a43716d6936100929cbdf99714f481e9aba3cc3d9b04a5

    SHA512

    3b81f44b0333c542bd67300813adb1dd44ddf5d42cec5feb1724761970728fb43f94fbf261fa709cb0c33b8067bafefaca1cc91066649e9860aa8ff37fdf8879

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7106867.exe

    Filesize

    206KB

    MD5

    c59e00146c4b04f5c4677c79f90bfc40

    SHA1

    fea121d04ec40f6e9d2437796ee785b89ef7fb52

    SHA256

    c91e17f13a43634405235d4b317e8804b13fad263112b7d6f798e35404bf7c74

    SHA512

    c666f2fbb0f8d61d529ee6f6b99f2c4e23102d1a4afc25b85a25eefb2af9f008732177e6a0f2857153b3bcb68817bc136e1422a6768f4888603013539c8c2a03

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7106867.exe

    Filesize

    206KB

    MD5

    c59e00146c4b04f5c4677c79f90bfc40

    SHA1

    fea121d04ec40f6e9d2437796ee785b89ef7fb52

    SHA256

    c91e17f13a43634405235d4b317e8804b13fad263112b7d6f798e35404bf7c74

    SHA512

    c666f2fbb0f8d61d529ee6f6b99f2c4e23102d1a4afc25b85a25eefb2af9f008732177e6a0f2857153b3bcb68817bc136e1422a6768f4888603013539c8c2a03

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0969513.exe

    Filesize

    172KB

    MD5

    9f15030df6d5bb00f9f01841e70daafa

    SHA1

    dd81f227302edc2e4d99acbdd1ad2ed7b9edd1a3

    SHA256

    f4386e422e57ad6368e78178f4e6383c8ec4a14d55cf40ed4568f04b86fc4342

    SHA512

    ea75486dc058e6c1acd0f036bcf536988baaf64b4b967607e6efa7286927911c72912c76770f3aeebfc65f41e68722dde72ec8e21b4d018f278df38c0b673a4f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0969513.exe

    Filesize

    172KB

    MD5

    9f15030df6d5bb00f9f01841e70daafa

    SHA1

    dd81f227302edc2e4d99acbdd1ad2ed7b9edd1a3

    SHA256

    f4386e422e57ad6368e78178f4e6383c8ec4a14d55cf40ed4568f04b86fc4342

    SHA512

    ea75486dc058e6c1acd0f036bcf536988baaf64b4b967607e6efa7286927911c72912c76770f3aeebfc65f41e68722dde72ec8e21b4d018f278df38c0b673a4f

  • memory/4512-154-0x00000000006A0000-0x00000000006D0000-memory.dmp

    Filesize

    192KB

  • memory/4512-155-0x000000000AAA0000-0x000000000B0B8000-memory.dmp

    Filesize

    6.1MB

  • memory/4512-156-0x000000000A620000-0x000000000A72A000-memory.dmp

    Filesize

    1.0MB

  • memory/4512-157-0x000000000A560000-0x000000000A572000-memory.dmp

    Filesize

    72KB

  • memory/4512-158-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/4512-159-0x000000000A5C0000-0x000000000A5FC000-memory.dmp

    Filesize

    240KB

  • memory/4512-160-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/4512-161-0x000000000A8D0000-0x000000000A946000-memory.dmp

    Filesize

    472KB

  • memory/4512-162-0x000000000A9F0000-0x000000000AA82000-memory.dmp

    Filesize

    584KB

  • memory/4512-163-0x000000000A950000-0x000000000A9B6000-memory.dmp

    Filesize

    408KB

  • memory/4512-164-0x000000000BAB0000-0x000000000C054000-memory.dmp

    Filesize

    5.6MB

  • memory/4512-165-0x000000000B7B0000-0x000000000B972000-memory.dmp

    Filesize

    1.8MB

  • memory/4512-166-0x000000000C590000-0x000000000CABC000-memory.dmp

    Filesize

    5.2MB

  • memory/4512-167-0x000000000B6D0000-0x000000000B720000-memory.dmp

    Filesize

    320KB