Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/06/2023, 07:00

230613-hs3zbafg3w 10

13/06/2023, 06:39

230613-heq3lafg2t 10

13/06/2023, 03:28

230613-d1sq4aee98 10

13/06/2023, 03:07

230613-dmpghsfb3z 10

Analysis

  • max time kernel
    263s
  • max time network
    278s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2023, 07:00

General

  • Target

    InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe

  • Size

    693.0MB

  • MD5

    fb757b3c077ec1976a8079ca0925e330

  • SHA1

    a8a3c03094572e007b867b5bb9c26acfb182c509

  • SHA256

    f2c3ec6f9869bb611d264d0a4a0dd0ba68b84d17672f07db44e90254b429a667

  • SHA512

    6fe3c5aebf1e576215ebd283f967aa35d73339df82c8d06e54fcee6fd33dc4d98408d3916c1a683a71b41a4d2dfe54d18883538bd3f7933d857b72e7dd911502

  • SSDEEP

    1572864:NphKtrquc1CVrmamaH0Zxz6RILY6/noAuKFiAC2J2:Npg+Z0VTmVxz1d/noAB72

Malware Config

Extracted

Family

redline

Botnet

@hendrolas

C2

94.142.138.4:80

Attributes
  • auth_value

    71d16d25eddbb4fd3b98070432f1a757

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe
    "C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe
      "C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe"
        3⤵
        • Blocklisted process makes network request
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4152
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
          C:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3844
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4416

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe

      Filesize

      761.8MB

      MD5

      469b4eb3d9e71ace8bc01d46fe8ec6f3

      SHA1

      489aa9ab8aa9a3f20eacdd418c9c91c1326edac4

      SHA256

      0cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562

      SHA512

      207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c

    • C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe

      Filesize

      761.8MB

      MD5

      469b4eb3d9e71ace8bc01d46fe8ec6f3

      SHA1

      489aa9ab8aa9a3f20eacdd418c9c91c1326edac4

      SHA256

      0cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562

      SHA512

      207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jbgdki5z.qnl.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/2940-140-0x00000000345F0000-0x0000000034682000-memory.dmp

      Filesize

      584KB

    • memory/2940-139-0x0000000034BA0000-0x0000000035144000-memory.dmp

      Filesize

      5.6MB

    • memory/2940-141-0x00000000347A0000-0x00000000347AA000-memory.dmp

      Filesize

      40KB

    • memory/2940-142-0x00000000347E0000-0x00000000347F0000-memory.dmp

      Filesize

      64KB

    • memory/2940-160-0x00000000347E0000-0x00000000347F0000-memory.dmp

      Filesize

      64KB

    • memory/2940-138-0x0000000000220000-0x0000000001220000-memory.dmp

      Filesize

      16.0MB

    • memory/3844-180-0x000000001AAF0000-0x000000001B01C000-memory.dmp

      Filesize

      5.2MB

    • memory/3844-170-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3844-179-0x000000001A3F0000-0x000000001A5B2000-memory.dmp

      Filesize

      1.8MB

    • memory/3844-181-0x000000001A0D0000-0x000000001A120000-memory.dmp

      Filesize

      320KB

    • memory/3844-174-0x0000000018AC0000-0x0000000018AFC000-memory.dmp

      Filesize

      240KB

    • memory/3844-175-0x0000000018060000-0x0000000018070000-memory.dmp

      Filesize

      64KB

    • memory/3844-173-0x00000000188F0000-0x0000000018902000-memory.dmp

      Filesize

      72KB

    • memory/3844-182-0x0000000018060000-0x0000000018070000-memory.dmp

      Filesize

      64KB

    • memory/3844-172-0x00000000189B0000-0x0000000018ABA000-memory.dmp

      Filesize

      1.0MB

    • memory/3844-171-0x00000000191A0000-0x00000000197B8000-memory.dmp

      Filesize

      6.1MB

    • memory/4152-146-0x0000000005340000-0x0000000005350000-memory.dmp

      Filesize

      64KB

    • memory/4152-164-0x00000000079E0000-0x0000000007A56000-memory.dmp

      Filesize

      472KB

    • memory/4152-165-0x0000000005340000-0x0000000005350000-memory.dmp

      Filesize

      64KB

    • memory/4152-166-0x00000000080E0000-0x000000000875A000-memory.dmp

      Filesize

      6.5MB

    • memory/4152-167-0x0000000007A80000-0x0000000007A9A000-memory.dmp

      Filesize

      104KB

    • memory/4152-168-0x0000000005340000-0x0000000005350000-memory.dmp

      Filesize

      64KB

    • memory/4152-169-0x00000000087D0000-0x00000000087F2000-memory.dmp

      Filesize

      136KB

    • memory/4152-163-0x00000000078E0000-0x0000000007924000-memory.dmp

      Filesize

      272KB

    • memory/4152-162-0x0000000005340000-0x0000000005350000-memory.dmp

      Filesize

      64KB

    • memory/4152-161-0x0000000005340000-0x0000000005350000-memory.dmp

      Filesize

      64KB

    • memory/4152-159-0x00000000066F0000-0x000000000670E000-memory.dmp

      Filesize

      120KB

    • memory/4152-157-0x0000000006100000-0x0000000006166000-memory.dmp

      Filesize

      408KB

    • memory/4152-153-0x0000000006020000-0x0000000006086000-memory.dmp

      Filesize

      408KB

    • memory/4152-176-0x0000000005340000-0x0000000005350000-memory.dmp

      Filesize

      64KB

    • memory/4152-177-0x0000000005340000-0x0000000005350000-memory.dmp

      Filesize

      64KB

    • memory/4152-147-0x0000000005910000-0x0000000005932000-memory.dmp

      Filesize

      136KB

    • memory/4152-145-0x0000000005980000-0x0000000005FA8000-memory.dmp

      Filesize

      6.2MB

    • memory/4152-144-0x0000000005340000-0x0000000005350000-memory.dmp

      Filesize

      64KB

    • memory/4152-143-0x0000000002DB0000-0x0000000002DE6000-memory.dmp

      Filesize

      216KB