Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/09/2023, 00:17

General

  • Target

    5f4c467b2f14cc89124d58b673422a72d884dbfb0ea9d1655aa681decd086290.exe

  • Size

    784KB

  • MD5

    06215800c9342256434920421784559d

  • SHA1

    9e9f1b09d3812a3addf2266f80eac55fc98ee40e

  • SHA256

    5f4c467b2f14cc89124d58b673422a72d884dbfb0ea9d1655aa681decd086290

  • SHA512

    4b5cf722a710fc4ff814c3dfb399500d5e462076d185af4e2eee3e1ec8075d03ec0985e10f1182466c35186cac2d2a03a599a893b7a1d7f731c632306b3699ed

  • SSDEEP

    12288:kMrWy90eBRgDdhwaqEtVOF2SaGoHj0tfXvhWGWoKCmPiq96:iyqhwahC2LQtn4Smz6

Malware Config

Extracted

Family

redline

Botnet

buben

C2

77.91.124.82:19071

Attributes
  • auth_value

    c62fa04aa45f5b78f62d2c21fcbefdec

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f4c467b2f14cc89124d58b673422a72d884dbfb0ea9d1655aa681decd086290.exe
    "C:\Users\Admin\AppData\Local\Temp\5f4c467b2f14cc89124d58b673422a72d884dbfb0ea9d1655aa681decd086290.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2548479.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2548479.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3734935.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3734935.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4056
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1625254.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1625254.exe
          4⤵
          • Executes dropped EXE
          PID:1272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2548479.exe

    Filesize

    682KB

    MD5

    8facdf3f4b937137f5721147c6d2daf1

    SHA1

    dfc450cb5889d557538347f50567a59333e229ef

    SHA256

    b15b84db867a92d2744363f81677afa4ff4c0dd6e80a69e27e3241614823cd06

    SHA512

    9814cbd3a2a3e3b32867f590242759150d307775acfbb152e8d4e4851cce03977ff6095ed68a0445e62694f7d5dc979e1705f9a424c5cf839d61b77cacd62c30

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2548479.exe

    Filesize

    682KB

    MD5

    8facdf3f4b937137f5721147c6d2daf1

    SHA1

    dfc450cb5889d557538347f50567a59333e229ef

    SHA256

    b15b84db867a92d2744363f81677afa4ff4c0dd6e80a69e27e3241614823cd06

    SHA512

    9814cbd3a2a3e3b32867f590242759150d307775acfbb152e8d4e4851cce03977ff6095ed68a0445e62694f7d5dc979e1705f9a424c5cf839d61b77cacd62c30

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3734935.exe

    Filesize

    292KB

    MD5

    3adc15a45f80d2ef3f5e5924992d45d0

    SHA1

    e3dea810897af2c135d4c3f3fb76f2b2a2f40150

    SHA256

    2c04d19c9a7218d566fa90f3da6c78fe2128c281ca025d3c446341a6162c2767

    SHA512

    69e7076425c00dde8fae15a9ac2462098f444fed53f0875ac1768e4de4b0f0b45d60e0932935e21a35bbc26b8720401dd2fb059ab6675e0b21dc7293712f5222

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3734935.exe

    Filesize

    292KB

    MD5

    3adc15a45f80d2ef3f5e5924992d45d0

    SHA1

    e3dea810897af2c135d4c3f3fb76f2b2a2f40150

    SHA256

    2c04d19c9a7218d566fa90f3da6c78fe2128c281ca025d3c446341a6162c2767

    SHA512

    69e7076425c00dde8fae15a9ac2462098f444fed53f0875ac1768e4de4b0f0b45d60e0932935e21a35bbc26b8720401dd2fb059ab6675e0b21dc7293712f5222

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1625254.exe

    Filesize

    174KB

    MD5

    9f7546ca55aed6ed70c59c8ddae26c9e

    SHA1

    dd63f84c88dadeaebb20b19132c7c20aad36fcc5

    SHA256

    045e33ee1e9bd4fb0f885c7ed3ef1c91bb91d6fec69e2375c613e80cfe2358c8

    SHA512

    350f4175b739418c07d1e67cab6c5a1f2e095ff024bb76d1df709599f78424a40cab817116528267e1096a12e17bb86a1b12fc9c7d429695e1b755de1b90db30

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1625254.exe

    Filesize

    174KB

    MD5

    9f7546ca55aed6ed70c59c8ddae26c9e

    SHA1

    dd63f84c88dadeaebb20b19132c7c20aad36fcc5

    SHA256

    045e33ee1e9bd4fb0f885c7ed3ef1c91bb91d6fec69e2375c613e80cfe2358c8

    SHA512

    350f4175b739418c07d1e67cab6c5a1f2e095ff024bb76d1df709599f78424a40cab817116528267e1096a12e17bb86a1b12fc9c7d429695e1b755de1b90db30

  • memory/1272-21-0x00000000008E0000-0x0000000000910000-memory.dmp

    Filesize

    192KB

  • memory/1272-22-0x00000000730D0000-0x00000000737BE000-memory.dmp

    Filesize

    6.9MB

  • memory/1272-23-0x00000000051A0000-0x00000000051A6000-memory.dmp

    Filesize

    24KB

  • memory/1272-24-0x000000000ACA0000-0x000000000B2A6000-memory.dmp

    Filesize

    6.0MB

  • memory/1272-25-0x000000000A830000-0x000000000A93A000-memory.dmp

    Filesize

    1.0MB

  • memory/1272-26-0x000000000A760000-0x000000000A772000-memory.dmp

    Filesize

    72KB

  • memory/1272-27-0x000000000A7C0000-0x000000000A7FE000-memory.dmp

    Filesize

    248KB

  • memory/1272-28-0x000000000A940000-0x000000000A98B000-memory.dmp

    Filesize

    300KB

  • memory/1272-29-0x00000000730D0000-0x00000000737BE000-memory.dmp

    Filesize

    6.9MB