Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2023, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe
Resource
win10v2004-20221111-en
General
-
Target
6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe
-
Size
478KB
-
MD5
7e278af5d1e46277e4dcc002de5bbe8e
-
SHA1
d7d70f8baf60dfb08fff95dedb3e9312b98ae1d5
-
SHA256
6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c
-
SHA512
792223c63794d14f2f6c715dc6fe0251b7a8538b1449f222d3a02dce0a13202a7dace14cea3af0a5a61115e571f71086414adeec0c6ad15a1391b4cc5ddfd110
-
SSDEEP
12288:gMrzy90Brj8q+VeYJs42ExkDWyKmxexDirMhzT5nhsHP:DyWrIRVm3fKkeOMzhsv
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
nocrypt
176.113.115.17:4132
-
auth_value
4fc7cda1ab5883a6197f20f517ce2a8c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dEs27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dEs27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dEs27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dEs27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dEs27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dEs27.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 640 nyO67.exe 4364 bxo66.exe 2084 cyU70gJ.exe 4792 dEs27.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dEs27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dEs27.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nyO67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nyO67.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3388 4792 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4364 bxo66.exe 4364 bxo66.exe 2084 cyU70gJ.exe 2084 cyU70gJ.exe 4792 dEs27.exe 4792 dEs27.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4364 bxo66.exe Token: SeDebugPrivilege 2084 cyU70gJ.exe Token: SeDebugPrivilege 4792 dEs27.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2256 wrote to memory of 640 2256 6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe 79 PID 2256 wrote to memory of 640 2256 6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe 79 PID 2256 wrote to memory of 640 2256 6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe 79 PID 640 wrote to memory of 4364 640 nyO67.exe 80 PID 640 wrote to memory of 4364 640 nyO67.exe 80 PID 640 wrote to memory of 4364 640 nyO67.exe 80 PID 640 wrote to memory of 2084 640 nyO67.exe 83 PID 640 wrote to memory of 2084 640 nyO67.exe 83 PID 640 wrote to memory of 2084 640 nyO67.exe 83 PID 2256 wrote to memory of 4792 2256 6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe 84 PID 2256 wrote to memory of 4792 2256 6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe 84 PID 2256 wrote to memory of 4792 2256 6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe"C:\Users\Admin\AppData\Local\Temp\6c12e93fc043fc7c6abc1f1ccb95715b7b9f9710450559c4340bf7a4c94d689c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyO67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nyO67.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bxo66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bxo66.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cyU70gJ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cyU70gJ.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dEs27.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dEs27.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10843⤵
- Program crash
PID:3388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4792 -ip 47921⤵PID:4564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD56a9d16da046b68663fc402d83e2162ed
SHA1b808ce659e1c589990dc87be267849b07e4c1b44
SHA2560b4c1192e0570f3fad3bebf2dad051a9e83b02baefc6024c5bc6d3a7d55f8416
SHA5126ecef488dccf356c8c5bd8a5137b2bfe5c43916be55d42474e01203094d0ccdd4824ebafe93037dbe8c051bf7e500e3120cb1420224e51647bae8409be47b832
-
Filesize
239KB
MD56a9d16da046b68663fc402d83e2162ed
SHA1b808ce659e1c589990dc87be267849b07e4c1b44
SHA2560b4c1192e0570f3fad3bebf2dad051a9e83b02baefc6024c5bc6d3a7d55f8416
SHA5126ecef488dccf356c8c5bd8a5137b2bfe5c43916be55d42474e01203094d0ccdd4824ebafe93037dbe8c051bf7e500e3120cb1420224e51647bae8409be47b832
-
Filesize
202KB
MD519ec4b207cc7ba493c0b611f6a66780a
SHA15af158d4c30728b4ade0351366ff26d3e6330682
SHA2565c6b4b2eaaeaaf501ace7ff487c09e6178dd2ba9732710233a48971b26fb2a0d
SHA5129e47669016ff1c3b9e1ab6423c17b5aca9c23bbcffedc592ea153fc2c8dac4fb6b8fdb4419a4eb211db50f013cea6d7afd948c35d405c6c5234283c1ee44c7fa
-
Filesize
202KB
MD519ec4b207cc7ba493c0b611f6a66780a
SHA15af158d4c30728b4ade0351366ff26d3e6330682
SHA2565c6b4b2eaaeaaf501ace7ff487c09e6178dd2ba9732710233a48971b26fb2a0d
SHA5129e47669016ff1c3b9e1ab6423c17b5aca9c23bbcffedc592ea153fc2c8dac4fb6b8fdb4419a4eb211db50f013cea6d7afd948c35d405c6c5234283c1ee44c7fa
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e
-
Filesize
175KB
MD530132c45c2305b287d96a3ad8158e9e3
SHA1c89477868792dbfc6abeb3016e4fcc542b01bea1
SHA2560cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f
SHA5121f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e