Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
16/10/2022, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
07553357078582e6099074b4e0b62445bfa07b210dd1842c19be7c542f70722f.exe
Resource
win10-20220901-en
General
-
Target
07553357078582e6099074b4e0b62445bfa07b210dd1842c19be7c542f70722f.exe
-
Size
522KB
-
MD5
13b957c7a583fed6165cb58dbdaa0e2a
-
SHA1
467e29def94af3a091cfccfeb6e5cdb57ef87aae
-
SHA256
07553357078582e6099074b4e0b62445bfa07b210dd1842c19be7c542f70722f
-
SHA512
d3ab6ebfd195cdcdea88b66e4d99259be306bcb6eccc7b2f4e05039ec3e135290ab89061242e5beb3f34aaaf581eff528b77deecd29d04a1efc427b9e2d663f1
-
SSDEEP
3072:hvGyYiSDnt1M85/KGHrSrfDBZdsRSoyo1YuTYx+exU43nz2Jif:j4LKGYfLdsMoyoSxF3b
Malware Config
Extracted
redline
Morn
80.66.87.20:80
-
auth_value
98b8a59d3016c72d785854c61b951f1a
Signatures
-
Detects Smokeloader packer 3 IoCs
resource yara_rule behavioral1/memory/4560-591-0x0000000000402E87-mapping.dmp family_smokeloader behavioral1/memory/4560-623-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral1/memory/4560-624-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4888-311-0x0000000000422116-mapping.dmp family_redline behavioral1/memory/4888-380-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 4 IoCs
pid Process 3776 SETUP_~1.EXE 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 4888 SETUP_~1.EXE 4560 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07553357078582e6099074b4e0b62445bfa07b210dd1842c19be7c542f70722f.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 07553357078582e6099074b4e0b62445bfa07b210dd1842c19be7c542f70722f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3776 set thread context of 4888 3776 SETUP_~1.EXE 70 PID 3260 set thread context of 4560 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 74 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4232 powershell.exe 4232 powershell.exe 4232 powershell.exe 660 powershell.exe 660 powershell.exe 660 powershell.exe 4888 SETUP_~1.EXE 4888 SETUP_~1.EXE 4560 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 4560 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found 3036 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4560 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3776 SETUP_~1.EXE Token: SeDebugPrivilege 4232 powershell.exe Token: SeDebugPrivilege 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe Token: SeDebugPrivilege 660 powershell.exe Token: SeDebugPrivilege 4888 SETUP_~1.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3048 wrote to memory of 3776 3048 07553357078582e6099074b4e0b62445bfa07b210dd1842c19be7c542f70722f.exe 66 PID 3048 wrote to memory of 3776 3048 07553357078582e6099074b4e0b62445bfa07b210dd1842c19be7c542f70722f.exe 66 PID 3048 wrote to memory of 3776 3048 07553357078582e6099074b4e0b62445bfa07b210dd1842c19be7c542f70722f.exe 66 PID 3776 wrote to memory of 4232 3776 SETUP_~1.EXE 67 PID 3776 wrote to memory of 4232 3776 SETUP_~1.EXE 67 PID 3776 wrote to memory of 4232 3776 SETUP_~1.EXE 67 PID 3776 wrote to memory of 3260 3776 SETUP_~1.EXE 69 PID 3776 wrote to memory of 3260 3776 SETUP_~1.EXE 69 PID 3776 wrote to memory of 3260 3776 SETUP_~1.EXE 69 PID 3776 wrote to memory of 4888 3776 SETUP_~1.EXE 70 PID 3776 wrote to memory of 4888 3776 SETUP_~1.EXE 70 PID 3776 wrote to memory of 4888 3776 SETUP_~1.EXE 70 PID 3776 wrote to memory of 4888 3776 SETUP_~1.EXE 70 PID 3776 wrote to memory of 4888 3776 SETUP_~1.EXE 70 PID 3776 wrote to memory of 4888 3776 SETUP_~1.EXE 70 PID 3776 wrote to memory of 4888 3776 SETUP_~1.EXE 70 PID 3776 wrote to memory of 4888 3776 SETUP_~1.EXE 70 PID 3260 wrote to memory of 660 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 71 PID 3260 wrote to memory of 660 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 71 PID 3260 wrote to memory of 660 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 71 PID 3260 wrote to memory of 4560 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 74 PID 3260 wrote to memory of 4560 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 74 PID 3260 wrote to memory of 4560 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 74 PID 3260 wrote to memory of 4560 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 74 PID 3260 wrote to memory of 4560 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 74 PID 3260 wrote to memory of 4560 3260 Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\07553357078582e6099074b4e0b62445bfa07b210dd1842c19be7c542f70722f.exe"C:\Users\Admin\AppData\Local\Temp\07553357078582e6099074b4e0b62445bfa07b210dd1842c19be7c542f70722f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe"C:\Users\Admin\AppData\Local\Temp\Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA1AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exeC:\Users\Admin\AppData\Local\Temp\Dkjajmliwaqhuvuhhbmxlepolicyuser_s.exe4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD576d9f8d999cb147ce7545532939a8f94
SHA1f1f511c07f0a58b23c147259362b965d5bbb50f4
SHA25679111aacc6f3b0f1bce63b3b9716bd9aaf100c578cc62d4fb1009cda7d6183f0
SHA512783aed0e61bf01e1e4aac172f2cfc36c0aadd24a6de70b5e15f8dee58703bc695a19d4c872588e2d17358731a5d3a76d0db3db8f2a63b6ca7ef596c2b4cdb283
-
Filesize
1KB
MD566382a4ca6c4dcf75ce41417d44be93e
SHA18132cbef1c12f8a89a68a6153ade4286bf130812
SHA256a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56
SHA5122bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc
-
Filesize
45KB
MD55f640bd48e2547b4c1a7421f080f815f
SHA1a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a
SHA256916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c
SHA512a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e
-
Filesize
16KB
MD5285fc6e55a3dd3c749acc0db173bd53a
SHA1c0832541ded4b58b9941d6ec1ef81c8fdced4237
SHA256f33288d582345f5f52812d9276435d2e6d3da75143690600f51d40228c6c0214
SHA512ec3787c58575c3330189b6377e6a646f9c8ab5d2b87a69a8e1212d2b7f94461539c1449c5d2cacee68119a248decdfa953a9ed8f7ffc216f9f3edbd70e6c109c
-
Filesize
29KB
MD5c9e241cce38af60f98325fb51978c0e8
SHA16fb36864cd7a3242b6e8b0fd849f9dfd2fb1edcd
SHA25603321ef833a9e7e139e191643b0d6d3d0bda304e2255a264792de6944a66ffd9
SHA512bc89ed457808092d00625ded1c8f59c153d3493dba72a88661c625fd11ef91d6afc85862a1db88412d9b19aa4f4af610c429df8f1303560825e2e986e0491c76
-
Filesize
29KB
MD5c9e241cce38af60f98325fb51978c0e8
SHA16fb36864cd7a3242b6e8b0fd849f9dfd2fb1edcd
SHA25603321ef833a9e7e139e191643b0d6d3d0bda304e2255a264792de6944a66ffd9
SHA512bc89ed457808092d00625ded1c8f59c153d3493dba72a88661c625fd11ef91d6afc85862a1db88412d9b19aa4f4af610c429df8f1303560825e2e986e0491c76
-
Filesize
29KB
MD5c9e241cce38af60f98325fb51978c0e8
SHA16fb36864cd7a3242b6e8b0fd849f9dfd2fb1edcd
SHA25603321ef833a9e7e139e191643b0d6d3d0bda304e2255a264792de6944a66ffd9
SHA512bc89ed457808092d00625ded1c8f59c153d3493dba72a88661c625fd11ef91d6afc85862a1db88412d9b19aa4f4af610c429df8f1303560825e2e986e0491c76
-
Filesize
214.6MB
MD56b80d0cfaca5d622be9eb961413436a6
SHA180a6de6ee8d10e624bd5d68198551e35480efad3
SHA2562a7cf002dc6ff29714cb6940c17e2a11eaf0b340ea43c97a1a97bbc5d712514a
SHA51248acc46487059b0053900a47ec9b568ea866852ee9c94ab2e24348a9ff187597d7cd4bc2415fa9d426ed16a240ed19328a8b66a21def31fa042c09ca54c8a5ef
-
Filesize
214.6MB
MD56b80d0cfaca5d622be9eb961413436a6
SHA180a6de6ee8d10e624bd5d68198551e35480efad3
SHA2562a7cf002dc6ff29714cb6940c17e2a11eaf0b340ea43c97a1a97bbc5d712514a
SHA51248acc46487059b0053900a47ec9b568ea866852ee9c94ab2e24348a9ff187597d7cd4bc2415fa9d426ed16a240ed19328a8b66a21def31fa042c09ca54c8a5ef
-
Filesize
214.6MB
MD56b80d0cfaca5d622be9eb961413436a6
SHA180a6de6ee8d10e624bd5d68198551e35480efad3
SHA2562a7cf002dc6ff29714cb6940c17e2a11eaf0b340ea43c97a1a97bbc5d712514a
SHA51248acc46487059b0053900a47ec9b568ea866852ee9c94ab2e24348a9ff187597d7cd4bc2415fa9d426ed16a240ed19328a8b66a21def31fa042c09ca54c8a5ef