Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2023, 17:10

General

  • Target

    5bec555084177862a21eba17b75d068f.exe

  • Size

    1.6MB

  • MD5

    5bec555084177862a21eba17b75d068f

  • SHA1

    5492298dc817a9d9cf2af44b7c228770541da2ce

  • SHA256

    c9030652b5ad2388542a4f54208bb717b82fb19d1ff34289a77ebb65e9ee7b66

  • SHA512

    cd5809d3f40e944177e0e8d64a2df71d60872cbe41cab8b530eacecfa2615646dbd53ad035659e384ac1bdad9841e7495c5cb44bd17698863bc3efab0514abb9

  • SSDEEP

    12288:hzFb61WSg1Hf4J/gjbrVkH0HprhYkfDFQJ2i1Z/cqOWehbDFuDjR8j97OM+fwQ:tr1HfY/gjbrVrB8/cqOWaDHkbfw

Malware Config

Extracted

Family

redline

Botnet

1red1

C2

77.246.110.195:8599

Attributes
  • auth_value

    743c159c0234992dee4975bf5855347b

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bec555084177862a21eba17b75d068f.exe
    "C:\Users\Admin\AppData\Local\Temp\5bec555084177862a21eba17b75d068f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4188
      • C:\Users\Admin\AppData\Local\Temp\winx32apideftype.exe
        "C:\Users\Admin\AppData\Local\Temp\winx32apideftype.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3336
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          4⤵
            PID:4560
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 300
            4⤵
            • Program crash
            PID:3844
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 152
        2⤵
        • Program crash
        PID:3544
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3296 -ip 3296
      1⤵
        PID:1812
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3336 -ip 3336
        1⤵
          PID:1528

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\winx32apideftype.exe

          Filesize

          4.4MB

          MD5

          5e940e205fc8cd397c28682a5092cf40

          SHA1

          245cc5d940b7cdb15e705b58ba89d0b2326fb257

          SHA256

          042931c5b993c3d97a74c618e8e4bfe98915747014dc91c6d4ebd019588e5d00

          SHA512

          aad86c4e26a4b9c2d9eaa0cc5c70a699ec793691095dd659b9b0b16fac2a5f449df92a362df29aca5c6431614321fad6123ceb511119a7a069aa0b11a0dc4478

        • C:\Users\Admin\AppData\Local\Temp\winx32apideftype.exe

          Filesize

          4.4MB

          MD5

          5e940e205fc8cd397c28682a5092cf40

          SHA1

          245cc5d940b7cdb15e705b58ba89d0b2326fb257

          SHA256

          042931c5b993c3d97a74c618e8e4bfe98915747014dc91c6d4ebd019588e5d00

          SHA512

          aad86c4e26a4b9c2d9eaa0cc5c70a699ec793691095dd659b9b0b16fac2a5f449df92a362df29aca5c6431614321fad6123ceb511119a7a069aa0b11a0dc4478

        • C:\Users\Admin\AppData\Local\Temp\winx32apideftype.exe

          Filesize

          4.4MB

          MD5

          5e940e205fc8cd397c28682a5092cf40

          SHA1

          245cc5d940b7cdb15e705b58ba89d0b2326fb257

          SHA256

          042931c5b993c3d97a74c618e8e4bfe98915747014dc91c6d4ebd019588e5d00

          SHA512

          aad86c4e26a4b9c2d9eaa0cc5c70a699ec793691095dd659b9b0b16fac2a5f449df92a362df29aca5c6431614321fad6123ceb511119a7a069aa0b11a0dc4478

        • memory/3296-133-0x00000000002D0000-0x00000000004BD000-memory.dmp

          Filesize

          1.9MB

        • memory/3296-134-0x00000000002D0000-0x00000000004BD000-memory.dmp

          Filesize

          1.9MB

        • memory/3336-168-0x0000000000280000-0x0000000000734000-memory.dmp

          Filesize

          4.7MB

        • memory/3336-162-0x0000000000280000-0x0000000000734000-memory.dmp

          Filesize

          4.7MB

        • memory/4188-144-0x0000000005240000-0x0000000005252000-memory.dmp

          Filesize

          72KB

        • memory/4188-143-0x0000000005210000-0x0000000005220000-memory.dmp

          Filesize

          64KB

        • memory/4188-146-0x00000000055A0000-0x0000000005616000-memory.dmp

          Filesize

          472KB

        • memory/4188-147-0x00000000056C0000-0x0000000005752000-memory.dmp

          Filesize

          584KB

        • memory/4188-148-0x0000000006900000-0x0000000006EA4000-memory.dmp

          Filesize

          5.6MB

        • memory/4188-149-0x0000000005760000-0x00000000057C6000-memory.dmp

          Filesize

          408KB

        • memory/4188-150-0x0000000075140000-0x00000000758F0000-memory.dmp

          Filesize

          7.7MB

        • memory/4188-151-0x00000000067C0000-0x0000000006810000-memory.dmp

          Filesize

          320KB

        • memory/4188-152-0x0000000008E90000-0x0000000009052000-memory.dmp

          Filesize

          1.8MB

        • memory/4188-153-0x0000000009590000-0x0000000009ABC000-memory.dmp

          Filesize

          5.2MB

        • memory/4188-154-0x0000000005210000-0x0000000005220000-memory.dmp

          Filesize

          64KB

        • memory/4188-145-0x00000000052A0000-0x00000000052DC000-memory.dmp

          Filesize

          240KB

        • memory/4188-142-0x0000000005330000-0x000000000543A000-memory.dmp

          Filesize

          1.0MB

        • memory/4188-141-0x0000000005840000-0x0000000005E58000-memory.dmp

          Filesize

          6.1MB

        • memory/4188-140-0x0000000075140000-0x00000000758F0000-memory.dmp

          Filesize

          7.7MB

        • memory/4188-165-0x0000000075140000-0x00000000758F0000-memory.dmp

          Filesize

          7.7MB

        • memory/4188-135-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/4560-166-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4560-186-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4560-187-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4560-188-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB

        • memory/4560-191-0x0000000000400000-0x000000000056C000-memory.dmp

          Filesize

          1.4MB