Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows10-1703_x64
  • resource
    win10-20230915-en
  • resource tags

    arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/10/2023, 17:17

General

  • Target

    cef823e614c07e8813c9e32db81d8dc6a20d00a3e55aca97a6a5c340aa6e5d1c.exe

  • Size

    1012KB

  • MD5

    d1906fd8d9e6b18ee8a134e81982e23a

  • SHA1

    3420d976f980b963fec140739f0eaef07c7333e3

  • SHA256

    cef823e614c07e8813c9e32db81d8dc6a20d00a3e55aca97a6a5c340aa6e5d1c

  • SHA512

    c291d08ce4275882bcd8029288073a48837d62471bd093621f16624d75e425891f8ece38d3469a2b05dbc195123e6e643f103e035f2ea5ab6302c07a13717045

  • SSDEEP

    24576:4s9rN9YwPzIFbDslb50xVwJF5Jq9HnyKLW2U08U/7zgesADyI:t9rNWwbeP9wsnC0Z70esADyI

Malware Config

Extracted

Family

redline

Botnet

edward

C2

193.58.147.147:39834

Attributes
  • auth_value

    446f634e82d0b4e53079f0a26b8c33a8

Extracted

Family

smokeloader

Botnet

rlol

Extracted

Family

smokeloader

Version

2020

C2

http://akmedia.in/js/k/index.php

http://bethesdaserukam.org/setting/k/index.php

http://stemschools.in/js/k/index.php

http://dejarestaurant.com/wp-admin/js/k/index.php

http://moabscript.ir/wp-admin/js/k/index.php

http://nicehybridseeds.com/image/catalog/k/index.php

http://imaker.io/picktail/js/k/index.php

http://nanavatisworld.com/assets/js/k/index.php

http://smartbubox.com/img/k/index.php

http://krigenpharmaceuticals.com/js/k/index.php

rc4.i32
rc4.i32

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cef823e614c07e8813c9e32db81d8dc6a20d00a3e55aca97a6a5c340aa6e5d1c.exe
    "C:\Users\Admin\AppData\Local\Temp\cef823e614c07e8813c9e32db81d8dc6a20d00a3e55aca97a6a5c340aa6e5d1c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
      2⤵
        PID:4620
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
        2⤵
          PID:1620
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
          2⤵
            PID:3252
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
            2⤵
              PID:548
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
              2⤵
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2952
              • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4584
                • C:\Users\Admin\AppData\Local\Temp\svhost.exe
                  "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:324
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
            • Accesses Microsoft Outlook profiles
            • outlook_office_path
            • outlook_win_path
            PID:1048
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:3812
            • C:\Users\Admin\AppData\Roaming\fdithah
              C:\Users\Admin\AppData\Roaming\fdithah
              1⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:5112
              • C:\Users\Admin\AppData\Roaming\fdithah
                "C:\Users\Admin\AppData\Roaming\fdithah"
                2⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Checks SCSI registry key(s)
                • Suspicious behavior: MapViewOfSection
                PID:2388

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\svhost.exe

              Filesize

              744KB

              MD5

              f874356ddee152fcdb366283fbb70d86

              SHA1

              bb4e45490cb24ddbf14362144a96fd4eeb3810cd

              SHA256

              ae346575b504f4c6440a8c7f3f3b6d3ca3507679cb851aa1572edac210ff1eef

              SHA512

              8e7d8214ce7fc727ab14c14003d93f841afea2ea026693ae8524629eaf6f11aafe13fec09313f6426cc2583fc5693b2e0c29b53817397caa3cf2b428b25b54a0

            • C:\Users\Admin\AppData\Local\Temp\svhost.exe

              Filesize

              744KB

              MD5

              f874356ddee152fcdb366283fbb70d86

              SHA1

              bb4e45490cb24ddbf14362144a96fd4eeb3810cd

              SHA256

              ae346575b504f4c6440a8c7f3f3b6d3ca3507679cb851aa1572edac210ff1eef

              SHA512

              8e7d8214ce7fc727ab14c14003d93f841afea2ea026693ae8524629eaf6f11aafe13fec09313f6426cc2583fc5693b2e0c29b53817397caa3cf2b428b25b54a0

            • C:\Users\Admin\AppData\Local\Temp\svhost.exe

              Filesize

              744KB

              MD5

              f874356ddee152fcdb366283fbb70d86

              SHA1

              bb4e45490cb24ddbf14362144a96fd4eeb3810cd

              SHA256

              ae346575b504f4c6440a8c7f3f3b6d3ca3507679cb851aa1572edac210ff1eef

              SHA512

              8e7d8214ce7fc727ab14c14003d93f841afea2ea026693ae8524629eaf6f11aafe13fec09313f6426cc2583fc5693b2e0c29b53817397caa3cf2b428b25b54a0

            • C:\Users\Admin\AppData\Roaming\fdithah

              Filesize

              744KB

              MD5

              f874356ddee152fcdb366283fbb70d86

              SHA1

              bb4e45490cb24ddbf14362144a96fd4eeb3810cd

              SHA256

              ae346575b504f4c6440a8c7f3f3b6d3ca3507679cb851aa1572edac210ff1eef

              SHA512

              8e7d8214ce7fc727ab14c14003d93f841afea2ea026693ae8524629eaf6f11aafe13fec09313f6426cc2583fc5693b2e0c29b53817397caa3cf2b428b25b54a0

            • C:\Users\Admin\AppData\Roaming\fdithah

              Filesize

              744KB

              MD5

              f874356ddee152fcdb366283fbb70d86

              SHA1

              bb4e45490cb24ddbf14362144a96fd4eeb3810cd

              SHA256

              ae346575b504f4c6440a8c7f3f3b6d3ca3507679cb851aa1572edac210ff1eef

              SHA512

              8e7d8214ce7fc727ab14c14003d93f841afea2ea026693ae8524629eaf6f11aafe13fec09313f6426cc2583fc5693b2e0c29b53817397caa3cf2b428b25b54a0

            • C:\Users\Admin\AppData\Roaming\fdithah

              Filesize

              744KB

              MD5

              f874356ddee152fcdb366283fbb70d86

              SHA1

              bb4e45490cb24ddbf14362144a96fd4eeb3810cd

              SHA256

              ae346575b504f4c6440a8c7f3f3b6d3ca3507679cb851aa1572edac210ff1eef

              SHA512

              8e7d8214ce7fc727ab14c14003d93f841afea2ea026693ae8524629eaf6f11aafe13fec09313f6426cc2583fc5693b2e0c29b53817397caa3cf2b428b25b54a0

            • C:\Users\Admin\AppData\Roaming\fdithah

              Filesize

              744KB

              MD5

              f874356ddee152fcdb366283fbb70d86

              SHA1

              bb4e45490cb24ddbf14362144a96fd4eeb3810cd

              SHA256

              ae346575b504f4c6440a8c7f3f3b6d3ca3507679cb851aa1572edac210ff1eef

              SHA512

              8e7d8214ce7fc727ab14c14003d93f841afea2ea026693ae8524629eaf6f11aafe13fec09313f6426cc2583fc5693b2e0c29b53817397caa3cf2b428b25b54a0

            • memory/324-48-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/324-40-0x0000000000030000-0x0000000000031000-memory.dmp

              Filesize

              4KB

            • memory/324-41-0x0000000000400000-0x000000000040E000-memory.dmp

              Filesize

              56KB

            • memory/324-34-0x0000000000400000-0x000000000040E000-memory.dmp

              Filesize

              56KB

            • memory/324-36-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/324-47-0x0000000000400000-0x000000000040E000-memory.dmp

              Filesize

              56KB

            • memory/324-45-0x0000000000460000-0x0000000000525000-memory.dmp

              Filesize

              788KB

            • memory/1048-59-0x0000000000580000-0x00000000005EB000-memory.dmp

              Filesize

              428KB

            • memory/1048-75-0x0000000000580000-0x00000000005EB000-memory.dmp

              Filesize

              428KB

            • memory/1048-57-0x0000000000800000-0x0000000000874000-memory.dmp

              Filesize

              464KB

            • memory/2388-90-0x0000000000400000-0x000000000040E000-memory.dmp

              Filesize

              56KB

            • memory/2388-91-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/2732-3-0x00000000009A0000-0x00000000009A8000-memory.dmp

              Filesize

              32KB

            • memory/2732-2-0x0000000000990000-0x0000000000991000-memory.dmp

              Filesize

              4KB

            • memory/2732-5-0x0000000000400000-0x0000000000500000-memory.dmp

              Filesize

              1024KB

            • memory/2732-7-0x00000000009A0000-0x00000000009A8000-memory.dmp

              Filesize

              32KB

            • memory/2952-12-0x0000000005D70000-0x0000000006376000-memory.dmp

              Filesize

              6.0MB

            • memory/2952-9-0x0000000000400000-0x0000000000430000-memory.dmp

              Filesize

              192KB

            • memory/2952-17-0x0000000005AC0000-0x0000000005B36000-memory.dmp

              Filesize

              472KB

            • memory/2952-15-0x00000000057A0000-0x00000000057DE000-memory.dmp

              Filesize

              248KB

            • memory/2952-14-0x0000000005630000-0x0000000005642000-memory.dmp

              Filesize

              72KB

            • memory/2952-13-0x0000000005870000-0x000000000597A000-memory.dmp

              Filesize

              1.0MB

            • memory/2952-24-0x00000000080E0000-0x000000000860C000-memory.dmp

              Filesize

              5.2MB

            • memory/2952-42-0x0000000073B00000-0x00000000741EE000-memory.dmp

              Filesize

              6.9MB

            • memory/2952-19-0x0000000005B40000-0x0000000005BA6000-memory.dmp

              Filesize

              408KB

            • memory/2952-11-0x00000000055E0000-0x00000000055E6000-memory.dmp

              Filesize

              24KB

            • memory/2952-10-0x0000000073B00000-0x00000000741EE000-memory.dmp

              Filesize

              6.9MB

            • memory/2952-16-0x00000000057F0000-0x000000000583B000-memory.dmp

              Filesize

              300KB

            • memory/2952-8-0x00000000010C0000-0x00000000010C1000-memory.dmp

              Filesize

              4KB

            • memory/2952-18-0x0000000005BE0000-0x0000000005C72000-memory.dmp

              Filesize

              584KB

            • memory/2952-23-0x00000000079E0000-0x0000000007BA2000-memory.dmp

              Filesize

              1.8MB

            • memory/2952-22-0x0000000006BA0000-0x0000000006BF0000-memory.dmp

              Filesize

              320KB

            • memory/2952-21-0x0000000073B00000-0x00000000741EE000-memory.dmp

              Filesize

              6.9MB

            • memory/2952-20-0x0000000006E90000-0x000000000738E000-memory.dmp

              Filesize

              5.0MB

            • memory/2952-4-0x0000000000400000-0x0000000000435000-memory.dmp

              Filesize

              212KB

            • memory/3264-44-0x00000000012F0000-0x0000000001306000-memory.dmp

              Filesize

              88KB

            • memory/3264-86-0x0000000001310000-0x0000000001326000-memory.dmp

              Filesize

              88KB

            • memory/3812-74-0x0000000000490000-0x000000000049C000-memory.dmp

              Filesize

              48KB

            • memory/3812-72-0x0000000000490000-0x000000000049C000-memory.dmp

              Filesize

              48KB

            • memory/3812-73-0x00000000004A0000-0x00000000004A7000-memory.dmp

              Filesize

              28KB

            • memory/4584-43-0x0000000000400000-0x00000000004BD000-memory.dmp

              Filesize

              756KB

            • memory/4584-33-0x0000000000640000-0x0000000000648000-memory.dmp

              Filesize

              32KB

            • memory/4584-32-0x0000000000630000-0x0000000000631000-memory.dmp

              Filesize

              4KB

            • memory/5112-80-0x0000000000590000-0x0000000000591000-memory.dmp

              Filesize

              4KB

            • memory/5112-81-0x00000000005A0000-0x00000000005A8000-memory.dmp

              Filesize

              32KB

            • memory/5112-84-0x0000000000400000-0x00000000004BD000-memory.dmp

              Filesize

              756KB