Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2023, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe
Resource
win10v2004-20221111-en
General
-
Target
aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe
-
Size
481KB
-
MD5
86a8674f900835c92003ecd78573aa90
-
SHA1
83676b7c0006fcda6df5fc18d722d3aebf3db101
-
SHA256
aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf
-
SHA512
6237e3d43f235e4a6208eada6aae89840eb6e101ff02c13bcb8c743818c07e031e480f2ca43cff115491304c6245eb2cfe0bf190268235a6296cb42707e4c2c5
-
SSDEEP
6144:KDy+bnr+Fp0yN90QEA8JLmHliX5h+ySUrH0risLhaY/5n1HPZ4JW9odXzWWIfAn:pMr1y90e2UuFjCirYctMAn
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
redline
crnn
176.113.115.17:4132
-
auth_value
6dfbf5eac3db7046d55dfd3f6608be3f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsj49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsj49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsj49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsj49.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsj49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsj49.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4348 nMh13.exe 4180 boo74.exe 2284 clQ66xh.exe 3032 dsj49.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsj49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsj49.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nMh13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nMh13.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4120 3032 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4180 boo74.exe 4180 boo74.exe 2284 clQ66xh.exe 2284 clQ66xh.exe 3032 dsj49.exe 3032 dsj49.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4180 boo74.exe Token: SeDebugPrivilege 2284 clQ66xh.exe Token: SeDebugPrivilege 3032 dsj49.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4348 2072 aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe 81 PID 2072 wrote to memory of 4348 2072 aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe 81 PID 2072 wrote to memory of 4348 2072 aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe 81 PID 4348 wrote to memory of 4180 4348 nMh13.exe 82 PID 4348 wrote to memory of 4180 4348 nMh13.exe 82 PID 4348 wrote to memory of 4180 4348 nMh13.exe 82 PID 4348 wrote to memory of 2284 4348 nMh13.exe 89 PID 4348 wrote to memory of 2284 4348 nMh13.exe 89 PID 4348 wrote to memory of 2284 4348 nMh13.exe 89 PID 2072 wrote to memory of 3032 2072 aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe 93 PID 2072 wrote to memory of 3032 2072 aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe 93 PID 2072 wrote to memory of 3032 2072 aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe"C:\Users\Admin\AppData\Local\Temp\aa7c80b0180c6f7f9fe32f88da7a247315e7898b7ee269f72ec6927bd142e6cf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nMh13.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nMh13.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\boo74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\boo74.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\clQ66xh.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\clQ66xh.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dsj49.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dsj49.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 10803⤵
- Program crash
PID:4120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3032 -ip 30321⤵PID:1316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249KB
MD5855b8025b26752aa75d047e0ee4c85bb
SHA187cae01f4593a5b9991f79c6e0c95d8733a9f7e0
SHA2563f50ae58e413bc14843b785d15afcb93c2b77ae5ad995d057856f471bf6bafb9
SHA5123740942e0dd0e540b66bb1d102fe61ba72219fc53594f2780982cafb20500622102d5a91800cdadc55b263440cb3f0b5cf7912e6690ea66df94e476eb38d1f03
-
Filesize
249KB
MD5855b8025b26752aa75d047e0ee4c85bb
SHA187cae01f4593a5b9991f79c6e0c95d8733a9f7e0
SHA2563f50ae58e413bc14843b785d15afcb93c2b77ae5ad995d057856f471bf6bafb9
SHA5123740942e0dd0e540b66bb1d102fe61ba72219fc53594f2780982cafb20500622102d5a91800cdadc55b263440cb3f0b5cf7912e6690ea66df94e476eb38d1f03
-
Filesize
200KB
MD5f6d50b7ddfa9ba5a76d89e7e1e07340f
SHA1fa8a9629352ba796564dc87f89f1c70333d6d4c3
SHA256eecdd9891d8167907cff1668ecffb4235a9fe2e6c8de58a7b8ec571431400339
SHA512e8205c45d793023807ce1c2e4abecb6a7b312acf490f07cbc1f98874aa9e2df0cffc257fc208914db77d94975f5c330c40f4529cde22f69cd639a6010c145a22
-
Filesize
200KB
MD5f6d50b7ddfa9ba5a76d89e7e1e07340f
SHA1fa8a9629352ba796564dc87f89f1c70333d6d4c3
SHA256eecdd9891d8167907cff1668ecffb4235a9fe2e6c8de58a7b8ec571431400339
SHA512e8205c45d793023807ce1c2e4abecb6a7b312acf490f07cbc1f98874aa9e2df0cffc257fc208914db77d94975f5c330c40f4529cde22f69cd639a6010c145a22
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3
-
Filesize
175KB
MD5062a3c73b1aaf076abefd71633b66de5
SHA1e4b7e004c32d673fd61b1669c797dc4b207d8445
SHA256f281aafa876847194d635feddb06b11295249cc4bcf940d5246bdb5938410881
SHA5126bee4020fa8e4955b3028a71037f78ec922132009942283e071b3acdeea375300cef092fd692e9463d625065d5ef57e5e1ebd98f72e801ffc2178c071d645ec3