Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
13/02/2023, 06:27
Static task
static1
General
-
Target
1292caa7f905553fbae68ab8c4b16c52d8addfc26be2354dfa829a1d8bb36f87.exe
-
Size
769KB
-
MD5
86bbf5998fb17be867ae280cc16cfe14
-
SHA1
e1ad942495dc45c55997fc022b5bf840e55f51fc
-
SHA256
1292caa7f905553fbae68ab8c4b16c52d8addfc26be2354dfa829a1d8bb36f87
-
SHA512
a2eea111d088782d5109ced41972e8172a457d3d246cbc75a8b0dcfea9b8809e5c245eeacb0a5bf30fb80eba994b9cf7913c4d408e4d0f4db704c18d969112f2
-
SSDEEP
12288:wMrGy90uKQvGEp6jamOtn+YUxdZ6wJ0fjTn5qbyn1Pdxb5seWL8kz+FZu:my7zvGEpt1tKqHnYunzwe8QHu
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
redline
cr2
176.113.115.17:4132
-
auth_value
4bf573d6f5ab16f3b5e36da6855dc128
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sKo27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sKo27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sKo27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sKo27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sKo27.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4880-315-0x0000000002620000-0x0000000002666000-memory.dmp family_redline behavioral1/memory/4880-324-0x0000000004B10000-0x0000000004B54000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4768 vCp07.exe 4292 vzq98.exe 4880 dTC30.exe 4440 lfR63.exe 904 nNK22.exe 2844 sKo27.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sKo27.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vCp07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vCp07.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vzq98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vzq98.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1292caa7f905553fbae68ab8c4b16c52d8addfc26be2354dfa829a1d8bb36f87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1292caa7f905553fbae68ab8c4b16c52d8addfc26be2354dfa829a1d8bb36f87.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4440 set thread context of 1532 4440 lfR63.exe 72 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4880 dTC30.exe 4880 dTC30.exe 1532 AppLaunch.exe 1532 AppLaunch.exe 904 nNK22.exe 904 nNK22.exe 2844 sKo27.exe 2844 sKo27.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4880 dTC30.exe Token: SeDebugPrivilege 1532 AppLaunch.exe Token: SeDebugPrivilege 904 nNK22.exe Token: SeDebugPrivilege 2844 sKo27.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3500 wrote to memory of 4768 3500 1292caa7f905553fbae68ab8c4b16c52d8addfc26be2354dfa829a1d8bb36f87.exe 66 PID 3500 wrote to memory of 4768 3500 1292caa7f905553fbae68ab8c4b16c52d8addfc26be2354dfa829a1d8bb36f87.exe 66 PID 3500 wrote to memory of 4768 3500 1292caa7f905553fbae68ab8c4b16c52d8addfc26be2354dfa829a1d8bb36f87.exe 66 PID 4768 wrote to memory of 4292 4768 vCp07.exe 67 PID 4768 wrote to memory of 4292 4768 vCp07.exe 67 PID 4768 wrote to memory of 4292 4768 vCp07.exe 67 PID 4292 wrote to memory of 4880 4292 vzq98.exe 68 PID 4292 wrote to memory of 4880 4292 vzq98.exe 68 PID 4292 wrote to memory of 4880 4292 vzq98.exe 68 PID 4292 wrote to memory of 4440 4292 vzq98.exe 70 PID 4292 wrote to memory of 4440 4292 vzq98.exe 70 PID 4292 wrote to memory of 4440 4292 vzq98.exe 70 PID 4440 wrote to memory of 1532 4440 lfR63.exe 72 PID 4440 wrote to memory of 1532 4440 lfR63.exe 72 PID 4440 wrote to memory of 1532 4440 lfR63.exe 72 PID 4440 wrote to memory of 1532 4440 lfR63.exe 72 PID 4440 wrote to memory of 1532 4440 lfR63.exe 72 PID 4768 wrote to memory of 904 4768 vCp07.exe 73 PID 4768 wrote to memory of 904 4768 vCp07.exe 73 PID 4768 wrote to memory of 904 4768 vCp07.exe 73 PID 3500 wrote to memory of 2844 3500 1292caa7f905553fbae68ab8c4b16c52d8addfc26be2354dfa829a1d8bb36f87.exe 74 PID 3500 wrote to memory of 2844 3500 1292caa7f905553fbae68ab8c4b16c52d8addfc26be2354dfa829a1d8bb36f87.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\1292caa7f905553fbae68ab8c4b16c52d8addfc26be2354dfa829a1d8bb36f87.exe"C:\Users\Admin\AppData\Local\Temp\1292caa7f905553fbae68ab8c4b16c52d8addfc26be2354dfa829a1d8bb36f87.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vCp07.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vCp07.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vzq98.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vzq98.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTC30.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dTC30.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lfR63.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lfR63.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nNK22.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nNK22.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sKo27.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sKo27.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
665KB
MD55496e10045076ac8927e452f0baf389e
SHA197b2b572f18e0a12d322a4023524a88a1653d9ed
SHA256634519fdfb26e218835df6c7596e49360c56f50ce2f305e56006f994bbb14a50
SHA5126d0d21125107664b6c88af04a314a5afbef94509e7e2a03f6097c13e42f1d1171a0be0e17f040ca51cf8418f1cfcfb77800af6d80b2770453dadef9be7cc74f5
-
Filesize
665KB
MD55496e10045076ac8927e452f0baf389e
SHA197b2b572f18e0a12d322a4023524a88a1653d9ed
SHA256634519fdfb26e218835df6c7596e49360c56f50ce2f305e56006f994bbb14a50
SHA5126d0d21125107664b6c88af04a314a5afbef94509e7e2a03f6097c13e42f1d1171a0be0e17f040ca51cf8418f1cfcfb77800af6d80b2770453dadef9be7cc74f5
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
520KB
MD5913b50c93ff92b6a560f504e0572a815
SHA1c41865436a0a465215d9124a74d407c8124b5e9d
SHA2569f2d28fab8cf9be17676cedb96d0569d21dc2f621050fbedade3bb1909def69a
SHA512f13a312ab5a20d27d5f38bd9128179bac918c0a9beec3a9b304efde7d40aeb5082f4a7a8a77e2792a47477e55cdc0ac66932f4a60e9a5f61cbb1e1fd0ccd3612
-
Filesize
520KB
MD5913b50c93ff92b6a560f504e0572a815
SHA1c41865436a0a465215d9124a74d407c8124b5e9d
SHA2569f2d28fab8cf9be17676cedb96d0569d21dc2f621050fbedade3bb1909def69a
SHA512f13a312ab5a20d27d5f38bd9128179bac918c0a9beec3a9b304efde7d40aeb5082f4a7a8a77e2792a47477e55cdc0ac66932f4a60e9a5f61cbb1e1fd0ccd3612
-
Filesize
305KB
MD52912e4ea81ea3271b0533d672791b1ad
SHA1b5ef6b062c57da9614baf0faa3270eb6778a940c
SHA256171384e592b4da9bac78fbcb0feb4d46de8e302c960ed3464a399bb3c023253c
SHA51265be335994bb6bb1bb636001afcefd0d3a1052ef4e863f0613a0ba352e6af62dc469d09cdfc3a559e8e6a2cbebf92cc74cc11b5f39c1cb19cec82f6c77b859a2
-
Filesize
305KB
MD52912e4ea81ea3271b0533d672791b1ad
SHA1b5ef6b062c57da9614baf0faa3270eb6778a940c
SHA256171384e592b4da9bac78fbcb0feb4d46de8e302c960ed3464a399bb3c023253c
SHA51265be335994bb6bb1bb636001afcefd0d3a1052ef4e863f0613a0ba352e6af62dc469d09cdfc3a559e8e6a2cbebf92cc74cc11b5f39c1cb19cec82f6c77b859a2
-
Filesize
281KB
MD54f7302c3f372c146e2dd87a7ea481f31
SHA1c1f39c30a4138440399ae1c566cd414b2a4dd459
SHA2566c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3
SHA512a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312
-
Filesize
281KB
MD54f7302c3f372c146e2dd87a7ea481f31
SHA1c1f39c30a4138440399ae1c566cd414b2a4dd459
SHA2566c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3
SHA512a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312