Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
10/02/2023, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe
Resource
win10-20220812-en
General
-
Target
ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe
-
Size
539KB
-
MD5
63a1c1f534dae84f4a295272e957bed5
-
SHA1
9115b4a96bd4a0fb8b5e1a23a079c03ba3919710
-
SHA256
ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593
-
SHA512
e1059ff1bc2e31248f4fac635d01a8e3981cae6cd5d77fc149502cc9352fa873a5a0250fcc637fcffd920eec61bd733c8c9b37ba3256c729f22a23ecb06abb4e
-
SSDEEP
12288:1Mrry90YswLycz2YFEiUxsSxCALt4zyj+d8H0rGJip:Gy7plzTFysAuzyCyH0qip
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cqO40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cqO40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cqO40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cqO40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cqO40.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4692 dbJ88.exe 2524 air42.exe 3968 bWG34OU.exe 788 cqO40.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cqO40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cqO40.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dbJ88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dbJ88.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2524 air42.exe 2524 air42.exe 3968 bWG34OU.exe 3968 bWG34OU.exe 788 cqO40.exe 788 cqO40.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2524 air42.exe Token: SeDebugPrivilege 3968 bWG34OU.exe Token: SeDebugPrivilege 788 cqO40.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2724 wrote to memory of 4692 2724 ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe 67 PID 2724 wrote to memory of 4692 2724 ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe 67 PID 2724 wrote to memory of 4692 2724 ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe 67 PID 4692 wrote to memory of 2524 4692 dbJ88.exe 68 PID 4692 wrote to memory of 2524 4692 dbJ88.exe 68 PID 4692 wrote to memory of 2524 4692 dbJ88.exe 68 PID 4692 wrote to memory of 3968 4692 dbJ88.exe 70 PID 4692 wrote to memory of 3968 4692 dbJ88.exe 70 PID 4692 wrote to memory of 3968 4692 dbJ88.exe 70 PID 2724 wrote to memory of 788 2724 ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe 71 PID 2724 wrote to memory of 788 2724 ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe 71 PID 2724 wrote to memory of 788 2724 ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe"C:\Users\Admin\AppData\Local\Temp\ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbJ88.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbJ88.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\air42.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\air42.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bWG34OU.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bWG34OU.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cqO40.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cqO40.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:788
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD59f37be7c6bad1787fe998d5dfc5c609f
SHA17bbd257e510399868d8231f1df67952dd5377bc7
SHA256b60fc84a17bbf6df9b29a2084b110e13fd9f9358abadd8503e71992be0b7ac05
SHA512d9616bb9dae95b5d47d4ed40140cf0c0c3c472680f68c35dde876c0406f1158b53711ee06dd8d72d22b84302cf56c15ccd040902f5effb9e5d5722da3ce69548
-
Filesize
400KB
MD59f37be7c6bad1787fe998d5dfc5c609f
SHA17bbd257e510399868d8231f1df67952dd5377bc7
SHA256b60fc84a17bbf6df9b29a2084b110e13fd9f9358abadd8503e71992be0b7ac05
SHA512d9616bb9dae95b5d47d4ed40140cf0c0c3c472680f68c35dde876c0406f1158b53711ee06dd8d72d22b84302cf56c15ccd040902f5effb9e5d5722da3ce69548
-
Filesize
202KB
MD5a433ee11d44b36b468611530ae919950
SHA1910aa9ec210e4edd292f37335d22a579d7b752e8
SHA2567f294c321057ca1b03102dfc9f166e786d67f24699fcc8a7a419edc0e1723994
SHA5123adf5ebeb45a6f3cd59f82cfdd2ce0095e836b4ae0b7e41f077f09a8bdf63640dc019cdbe4bd9a9e264146810e33c863393b5362e96cab20bf26d02a0dc63783
-
Filesize
202KB
MD5a433ee11d44b36b468611530ae919950
SHA1910aa9ec210e4edd292f37335d22a579d7b752e8
SHA2567f294c321057ca1b03102dfc9f166e786d67f24699fcc8a7a419edc0e1723994
SHA5123adf5ebeb45a6f3cd59f82cfdd2ce0095e836b4ae0b7e41f077f09a8bdf63640dc019cdbe4bd9a9e264146810e33c863393b5362e96cab20bf26d02a0dc63783
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e