Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/02/2023, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe
Resource
win10v2004-20220812-en
General
-
Target
931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe
-
Size
539KB
-
MD5
1d2f18e3c7412d43f683b9568952cd53
-
SHA1
12a59b9133cb59126f7d71d9ae38d7996110a3f8
-
SHA256
931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7
-
SHA512
fa233e99fec594281638e66c2665cba144867c4ee2f7dfd1b6497c434f151c94ef8d525a9e2807ba16e64c3ead2dfb8ad599e1adf376f5251329386d062c6449
-
SSDEEP
12288:lMrAy904d+HTg5U31JoMJbcWS8OXMF7uERa3hJy:dyvUic1JoMvSVXEVAA
Malware Config
Extracted
redline
fuka
193.233.20.11:4131
-
auth_value
90eef520554ef188793d77ecc34217bf
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cCq14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cCq14.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cCq14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cCq14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cCq14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cCq14.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3988 dVT16.exe 692 arC17.exe 1252 blW24hJ.exe 2704 cCq14.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cCq14.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cCq14.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dVT16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dVT16.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 692 arC17.exe 692 arC17.exe 1252 blW24hJ.exe 1252 blW24hJ.exe 2704 cCq14.exe 2704 cCq14.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 692 arC17.exe Token: SeDebugPrivilege 1252 blW24hJ.exe Token: SeDebugPrivilege 2704 cCq14.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3524 wrote to memory of 3988 3524 931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe 79 PID 3524 wrote to memory of 3988 3524 931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe 79 PID 3524 wrote to memory of 3988 3524 931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe 79 PID 3988 wrote to memory of 692 3988 dVT16.exe 80 PID 3988 wrote to memory of 692 3988 dVT16.exe 80 PID 3988 wrote to memory of 692 3988 dVT16.exe 80 PID 3988 wrote to memory of 1252 3988 dVT16.exe 88 PID 3988 wrote to memory of 1252 3988 dVT16.exe 88 PID 3988 wrote to memory of 1252 3988 dVT16.exe 88 PID 3524 wrote to memory of 2704 3524 931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe 89 PID 3524 wrote to memory of 2704 3524 931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe 89 PID 3524 wrote to memory of 2704 3524 931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe"C:\Users\Admin\AppData\Local\Temp\931a5aa34ba97db986011738eed333690c9230a5d1387792fd2ed2adbe42eea7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dVT16.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dVT16.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\arC17.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\arC17.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\blW24hJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\blW24hJ.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cCq14.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cCq14.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD5b6bf95c9a1084cef6e934fa465bd463c
SHA1fb1ba5753df9e9cc4b9d12dba7245574f8f5fa6d
SHA256d96b95a1810cf36f28fcadc984d35038670e53bc294dcf445c622e6119c65c4f
SHA5128e4c49153aab53d935ea0a431d2bec8e3a603bada566debbac9364ded5f1afc84dc2718b2f7937c9f8e3b5d269b5cdb49e921e1f9b03d54de5b40ff7dfd6087d
-
Filesize
400KB
MD5b6bf95c9a1084cef6e934fa465bd463c
SHA1fb1ba5753df9e9cc4b9d12dba7245574f8f5fa6d
SHA256d96b95a1810cf36f28fcadc984d35038670e53bc294dcf445c622e6119c65c4f
SHA5128e4c49153aab53d935ea0a431d2bec8e3a603bada566debbac9364ded5f1afc84dc2718b2f7937c9f8e3b5d269b5cdb49e921e1f9b03d54de5b40ff7dfd6087d
-
Filesize
202KB
MD55f6961674f1d30e77e83f8aac3c9a53d
SHA1835a8fb5fdfe748a74ef3b7ba2084371cebef99e
SHA256e33250ea55649230dfd3bcae718bbc42fc14193213b0e5018c18fa4f640a2754
SHA5122647d3c2cb3f3c8b47a189ab92abbe0daaa7b1547ea182e70346cb1f980703283033ec8b5860e2a8324dc8070611279ab161eb4896f971c6d2f1788d7e099dd8
-
Filesize
202KB
MD55f6961674f1d30e77e83f8aac3c9a53d
SHA1835a8fb5fdfe748a74ef3b7ba2084371cebef99e
SHA256e33250ea55649230dfd3bcae718bbc42fc14193213b0e5018c18fa4f640a2754
SHA5122647d3c2cb3f3c8b47a189ab92abbe0daaa7b1547ea182e70346cb1f980703283033ec8b5860e2a8324dc8070611279ab161eb4896f971c6d2f1788d7e099dd8
-
Filesize
175KB
MD54c35cfbd12826cedb7982ab4e1763a6a
SHA11496bd1d1981d8bf38cf98cdd4aa47020ffe9303
SHA2568020580744f6861a611e99ba17e92751499e4b0f013d66a103fb38c5f256bbb2
SHA5125e55022ab3b5a49ba3695062b7db3fa920aa9e3653e52e5a556caeed2d8f217457ae472eb2cf3da32f4332fba52b9b1d4e8b42e09793c1f3bf970dcbce35566c
-
Filesize
175KB
MD54c35cfbd12826cedb7982ab4e1763a6a
SHA11496bd1d1981d8bf38cf98cdd4aa47020ffe9303
SHA2568020580744f6861a611e99ba17e92751499e4b0f013d66a103fb38c5f256bbb2
SHA5125e55022ab3b5a49ba3695062b7db3fa920aa9e3653e52e5a556caeed2d8f217457ae472eb2cf3da32f4332fba52b9b1d4e8b42e09793c1f3bf970dcbce35566c
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e