Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 14:33

General

  • Target

    file.exe

  • Size

    1.0MB

  • MD5

    abb713cf90e8345c0b6b79345cbdc9d6

  • SHA1

    67e705d4070b58994f0b718005d5f07fef824192

  • SHA256

    bfe19615479cff03ad963d8206c2e3e89ddafd30bb4978e27976295214d3f295

  • SHA512

    809b8c6aae46674c4c5fe24a98ae1fa065ab24d44c42e56b85946d7cc039f4139eb34e62daaf2ea1058180884a72c411d639c79eacc491e7fdb555a11b4dd524

  • SSDEEP

    24576:T3ThU20saWF461GGhJryB+dItlXPoxt1tXNq7pk04o9wynZTAgEXt:7OcXDGG/uua1Y3XwpkkagGt

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

147.45.47.251:2149

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /k move Heritage Heritage.bat & Heritage.bat & exit
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4320
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "wrsa opssvc"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2288
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1548
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5012
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 651690
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3036
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "HampshireRangesScholarsPodcasts" Exhibit
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2896
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Llp + ..\Powerful + ..\Dude + ..\Slightly + ..\Sources + ..\Vagina p
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4256
      • C:\Users\Admin\AppData\Local\Temp\651690\Sister.pif
        Sister.pif p
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4360
        • C:\Users\Admin\AppData\Local\Temp\651690\RegAsm.exe
          C:\Users\Admin\AppData\Local\Temp\651690\RegAsm.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4076
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2300
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4080,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=3776 /prefetch:8
    1⤵
      PID:2748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\651690\RegAsm.exe

      Filesize

      63KB

      MD5

      0d5df43af2916f47d00c1573797c1a13

      SHA1

      230ab5559e806574d26b4c20847c368ed55483b0

      SHA256

      c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc

      SHA512

      f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2

    • C:\Users\Admin\AppData\Local\Temp\651690\Sister.pif

      Filesize

      872KB

      MD5

      18ce19b57f43ce0a5af149c96aecc685

      SHA1

      1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

      SHA256

      d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

      SHA512

      a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

    • C:\Users\Admin\AppData\Local\Temp\651690\p

      Filesize

      524KB

      MD5

      9a24d4882c1d58ce2448fdae562666d4

      SHA1

      9d0565a9b786ab57844edd419459115aac35bde0

      SHA256

      7f33004e6d85eb4e355e98c93c6765cdf62572bcda24126a2758d8b8d9021c2f

      SHA512

      cd724a70b30103968830c89f935345eede1bf42ff454f65608c1799c72f35fb6e34cfa102d3a793d79370ab82e2a8f17ee6056c1248c406d5c620c35888828ab

    • C:\Users\Admin\AppData\Local\Temp\Dude

      Filesize

      81KB

      MD5

      fb6f9a5933fa68a15184363dd5f74446

      SHA1

      fa310d04bdcb2578a5853bcd6cd24c5516ec93c6

      SHA256

      c10e2d896a120a8639b63836cb6f8d1229b9b3a063048d523aec908dbe89d928

      SHA512

      867fef1eac107b757e11df16c8c56347ae53f6d646a32f82ef7bae6f2479f168404affb4fcc3e462d234c6344e5b13e0d04482c59f5ffe810396e1b67634e3b4

    • C:\Users\Admin\AppData\Local\Temp\Exhibit

      Filesize

      521B

      MD5

      5afc7229caf4095825dbf15befd37493

      SHA1

      ba1096e7690b22c55b6afdea14b9eafd14af7097

      SHA256

      e7cbd4083aacfe6fa4d5c45c6d6e621417aa11860abc41478d56ae6248d8a0b1

      SHA512

      73202a3faf248a73b62c88746c5785effcdf30564b4afd2c4e9a3c6a24cf08b55e4a6fd35339c2a258981013dd0343cd62f64d247fd3180bd0b79ffc646e97fb

    • C:\Users\Admin\AppData\Local\Temp\Heritage

      Filesize

      23KB

      MD5

      ee3a7efb4d01bb1b04e4c9ccb333c044

      SHA1

      93d69dc0b27d0334176e60babe362d7cacb3369f

      SHA256

      71f4148c94bb24a35ac080121a3bcd09ad45007b19d0235296385694703de26b

      SHA512

      b31a29cab9d03baec7387d1aba0176ddada3ad35be9497fc2df178f45c566c67fbeaff74e3648214362f8fabf6c1edc48536f5005e7ca6e2ef999574b09b0f52

    • C:\Users\Admin\AppData\Local\Temp\Llp

      Filesize

      98KB

      MD5

      b1be05ed7b57f24b0004276747520e23

      SHA1

      8f41ad51eef21727562136de08afecbdf51e1635

      SHA256

      dc71aa99d951b08ea1c0f886d0146d5ab1a4c031aeb692cb6b7ea92da80b2c38

      SHA512

      8747326a12820c04d4f268b063e11a84e71be47b9750ad0a8cb0325f24c0ad386d385d5d0a7ce4e81f984523dfaa6e9f26bc2e8bd226310974084e4d581dcfce

    • C:\Users\Admin\AppData\Local\Temp\Papua

      Filesize

      872KB

      MD5

      8db77745f37a0a067728d621603c7cae

      SHA1

      e3a1bf4c37d10434642c31c0435da28f7ee30de3

      SHA256

      1335802132d3a38d17319ac6a5d3662820c30a50ed75a5d094cff5e1ccde687f

      SHA512

      bedfec2197d9d22eb692f34413af1f37b3cb057a1d2929d2835d0d4e24103d101178370b2717dbdb38fa6c5d125698ac4f74fd934bf6dbe35a3ae1a9eb75f607

    • C:\Users\Admin\AppData\Local\Temp\Powerful

      Filesize

      95KB

      MD5

      fc73c25541cfa8ac7a46fccb525f0cfd

      SHA1

      f83352a81f0f14546365f4c18d155233f4584d14

      SHA256

      0a887aa261cbdab920c9fb983f20906a046115c1c40e2bb986823ae4ef4aa408

      SHA512

      29bd51b706fcb7d075d85550926a33ba70269570b052c3d34297bd06ac652b1dc95c174e1e860df97df47171aef9ac3e8f552129e74690d4450e662e881b6cbd

    • C:\Users\Admin\AppData\Local\Temp\Slightly

      Filesize

      97KB

      MD5

      3a90362515761941660fbb96219f9fe0

      SHA1

      8c4386f0bb80eff84a96cc25eaa85f2dfd121679

      SHA256

      c942fb8755a8f61585f06af8ce2b1e9fcf8d88d45d6c80dff7f523c24bfb543e

      SHA512

      f4d165ce35a349332d6f5b68976a0735b90648f89c27f14bbabe3562c82ae233849886dff663e22d5a10440bcde8672cfb095ea7dac235bec9fca6aca22744d5

    • C:\Users\Admin\AppData\Local\Temp\Sources

      Filesize

      75KB

      MD5

      470f19f312808e9d98a35a5343cb25a8

      SHA1

      50c4f2d1bfc53cbd2b4fa02bb156a5199aa85b3a

      SHA256

      8e0099e0b1d1a05f78099ebad128c0440bf0f469e21510e6996e8b497af36e3f

      SHA512

      1489d7bdb0ad32334bed050415062b340f79ecb8fb775f697d875300c7fc501e56162d547295d2f82fe4c6cf3a0a92c97e5f49bbeeaba58000636db970bd9cf0

    • C:\Users\Admin\AppData\Local\Temp\TmpCA21.tmp

      Filesize

      2KB

      MD5

      1420d30f964eac2c85b2ccfe968eebce

      SHA1

      bdf9a6876578a3e38079c4f8cf5d6c79687ad750

      SHA256

      f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

      SHA512

      6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

    • C:\Users\Admin\AppData\Local\Temp\Vagina

      Filesize

      78KB

      MD5

      621679ec67ab5447a864ab80778de8ec

      SHA1

      288314f4e5ad902006af71971b75106c8e0bd6a8

      SHA256

      4f332881e0e1ab18279f0dbaddab9650c473ce42b0ffdceff9ae3e27923d1e87

      SHA512

      cf5394137a4fdb1de5a7fc014a743220c93ff850c5cddb99c432b6b0a9393cb33bb9d178c2d6e13c58211f456240b4b3ae6a123a2bb68ce62ec96aa99109215b

    • memory/4076-31-0x0000000005140000-0x00000000051D2000-memory.dmp

      Filesize

      584KB

    • memory/4076-54-0x00000000066A0000-0x00000000067AA000-memory.dmp

      Filesize

      1.0MB

    • memory/4076-32-0x0000000005110000-0x000000000511A000-memory.dmp

      Filesize

      40KB

    • memory/4076-27-0x0000000000760000-0x00000000007B2000-memory.dmp

      Filesize

      328KB

    • memory/4076-49-0x0000000005DA0000-0x0000000005E16000-memory.dmp

      Filesize

      472KB

    • memory/4076-50-0x0000000006410000-0x000000000642E000-memory.dmp

      Filesize

      120KB

    • memory/4076-53-0x0000000006B50000-0x0000000007168000-memory.dmp

      Filesize

      6.1MB

    • memory/4076-30-0x00000000056F0000-0x0000000005C94000-memory.dmp

      Filesize

      5.6MB

    • memory/4076-55-0x00000000065E0000-0x00000000065F2000-memory.dmp

      Filesize

      72KB

    • memory/4076-56-0x0000000006640000-0x000000000667C000-memory.dmp

      Filesize

      240KB

    • memory/4076-57-0x00000000067B0000-0x00000000067FC000-memory.dmp

      Filesize

      304KB

    • memory/4076-58-0x00000000068F0000-0x0000000006956000-memory.dmp

      Filesize

      408KB

    • memory/4076-61-0x0000000007740000-0x0000000007902000-memory.dmp

      Filesize

      1.8MB

    • memory/4076-62-0x0000000007E40000-0x000000000836C000-memory.dmp

      Filesize

      5.2MB

    • memory/4076-63-0x0000000007DA0000-0x0000000007DF0000-memory.dmp

      Filesize

      320KB