Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12/02/2023, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe
Resource
win10-20220812-en
General
-
Target
26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe
-
Size
470KB
-
MD5
0c25b2e1b1d67f4e357333f8c10e3f5e
-
SHA1
547a6d58864417119d3ef29c3e296e6e8e7a90b3
-
SHA256
26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587
-
SHA512
71104d01c3f82daeb79c431925617b599bf0fdb849d7cd4f66a39813b34fd0b9ae64f2392b51ef86838456c02b50ec53be836a560adf36988111c48ba4ae51f4
-
SSDEEP
12288:WMrXy902yUYJU9arfvptuYsToqrQhlJ2R4sQlx:9y38JU9kv2YsBrkuR4n
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
crnn
176.113.115.17:4132
-
auth_value
6dfbf5eac3db7046d55dfd3f6608be3f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dof27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dof27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dof27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dof27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dof27.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2260 ncb99.exe 3872 bVR84.exe 5012 cYH45Hq.exe 808 dof27.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dof27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dof27.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ncb99.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ncb99.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3872 bVR84.exe 3872 bVR84.exe 5012 cYH45Hq.exe 5012 cYH45Hq.exe 808 dof27.exe 808 dof27.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3872 bVR84.exe Token: SeDebugPrivilege 5012 cYH45Hq.exe Token: SeDebugPrivilege 808 dof27.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4036 wrote to memory of 2260 4036 26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe 66 PID 4036 wrote to memory of 2260 4036 26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe 66 PID 4036 wrote to memory of 2260 4036 26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe 66 PID 2260 wrote to memory of 3872 2260 ncb99.exe 67 PID 2260 wrote to memory of 3872 2260 ncb99.exe 67 PID 2260 wrote to memory of 3872 2260 ncb99.exe 67 PID 2260 wrote to memory of 5012 2260 ncb99.exe 69 PID 2260 wrote to memory of 5012 2260 ncb99.exe 69 PID 2260 wrote to memory of 5012 2260 ncb99.exe 69 PID 4036 wrote to memory of 808 4036 26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe 70 PID 4036 wrote to memory of 808 4036 26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe 70 PID 4036 wrote to memory of 808 4036 26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe"C:\Users\Admin\AppData\Local\Temp\26ecf1052ea0fd701d0c2b9f51345e265486e84776d9fa94ac408e2bf7901587.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ncb99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ncb99.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bVR84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bVR84.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cYH45Hq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cYH45Hq.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dof27.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dof27.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5724acc58a6fdff28c7162f09cb51d726
SHA1fae1c7899675db05cf312eca90c2b5c9a324a96e
SHA2569088ebafcb91bb010e37a38df688dfc592f3452fe2226f6a3df177156bbc6ebd
SHA5129fb71994bc6b83935e0bc013a481cd1b5cd58427af2eaed025f1002963295a569333633263b96a0553c33f0dfce353c9c3b5ddde555a303468f3d9110f1c99e9
-
Filesize
227KB
MD5724acc58a6fdff28c7162f09cb51d726
SHA1fae1c7899675db05cf312eca90c2b5c9a324a96e
SHA2569088ebafcb91bb010e37a38df688dfc592f3452fe2226f6a3df177156bbc6ebd
SHA5129fb71994bc6b83935e0bc013a481cd1b5cd58427af2eaed025f1002963295a569333633263b96a0553c33f0dfce353c9c3b5ddde555a303468f3d9110f1c99e9
-
Filesize
200KB
MD5d0c897ddee44c554d9aa830c4e27f081
SHA18a5323aa3a2eb0b200d98689067808d981323a03
SHA256e7422d8c82ee91384b074bf635ac29e0fc87f15a622399b35ce7862661923a2f
SHA5127577e86385e0ab9560b19d80b198ecd6f85442859637d2dbdcf9ee0a73f58aef3b4be20bbe19b19eb738cbd92c81668d561305c0ba0a139dc6c0a1726550aa7a
-
Filesize
200KB
MD5d0c897ddee44c554d9aa830c4e27f081
SHA18a5323aa3a2eb0b200d98689067808d981323a03
SHA256e7422d8c82ee91384b074bf635ac29e0fc87f15a622399b35ce7862661923a2f
SHA5127577e86385e0ab9560b19d80b198ecd6f85442859637d2dbdcf9ee0a73f58aef3b4be20bbe19b19eb738cbd92c81668d561305c0ba0a139dc6c0a1726550aa7a
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3