Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
56s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
13/02/2023, 12:46
Static task
static1
General
-
Target
39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe
-
Size
769KB
-
MD5
b8598244bfa6336889721c85c177d78a
-
SHA1
49dcf5da133569186a2099fabcf38f8e73ec6ffe
-
SHA256
39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2
-
SHA512
daadf92f9a4634047cb5efb77088fe269a88b06d8a11d89e74b9390c08a8d74dfa22df901d2313cd72bcabc23f6708b64c730ab575aec968b42daa984a605673
-
SSDEEP
12288:hMrSy90/KiLbALJJgvltVdJ7rIVcIBQGLShrsoq8OqEeJRPfO/lv7HWiwb7s:fyCKiLWJCtrL7JISJqz7e7fADHWzb7s
Malware Config
Extracted
redline
romik
193.233.20.12:4132
-
auth_value
8fb78d2889ba0ca42678b59b884e88ff
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Extracted
redline
cr2
176.113.115.17:4132
-
auth_value
4bf573d6f5ab16f3b5e36da6855dc128
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ssJ81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ssJ81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ssJ81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ssJ81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ssJ81.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4636-323-0x0000000002220000-0x0000000002266000-memory.dmp family_redline behavioral1/memory/4636-329-0x0000000002400000-0x0000000002444000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4008 vdo57.exe 3856 vpZ74.exe 4636 dqz89.exe 5020 lfG51.exe 4340 nVu48.exe 1816 ssJ81.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ssJ81.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vdo57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vdo57.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vpZ74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vpZ74.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5020 set thread context of 844 5020 lfG51.exe 72 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4636 dqz89.exe 4636 dqz89.exe 844 AppLaunch.exe 4340 nVu48.exe 4340 nVu48.exe 844 AppLaunch.exe 1816 ssJ81.exe 1816 ssJ81.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4636 dqz89.exe Token: SeDebugPrivilege 844 AppLaunch.exe Token: SeDebugPrivilege 4340 nVu48.exe Token: SeDebugPrivilege 1816 ssJ81.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2780 wrote to memory of 4008 2780 39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe 66 PID 2780 wrote to memory of 4008 2780 39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe 66 PID 2780 wrote to memory of 4008 2780 39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe 66 PID 4008 wrote to memory of 3856 4008 vdo57.exe 67 PID 4008 wrote to memory of 3856 4008 vdo57.exe 67 PID 4008 wrote to memory of 3856 4008 vdo57.exe 67 PID 3856 wrote to memory of 4636 3856 vpZ74.exe 68 PID 3856 wrote to memory of 4636 3856 vpZ74.exe 68 PID 3856 wrote to memory of 4636 3856 vpZ74.exe 68 PID 3856 wrote to memory of 5020 3856 vpZ74.exe 70 PID 3856 wrote to memory of 5020 3856 vpZ74.exe 70 PID 3856 wrote to memory of 5020 3856 vpZ74.exe 70 PID 5020 wrote to memory of 844 5020 lfG51.exe 72 PID 5020 wrote to memory of 844 5020 lfG51.exe 72 PID 5020 wrote to memory of 844 5020 lfG51.exe 72 PID 5020 wrote to memory of 844 5020 lfG51.exe 72 PID 5020 wrote to memory of 844 5020 lfG51.exe 72 PID 4008 wrote to memory of 4340 4008 vdo57.exe 73 PID 4008 wrote to memory of 4340 4008 vdo57.exe 73 PID 4008 wrote to memory of 4340 4008 vdo57.exe 73 PID 2780 wrote to memory of 1816 2780 39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe 74 PID 2780 wrote to memory of 1816 2780 39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe"C:\Users\Admin\AppData\Local\Temp\39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vdo57.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vdo57.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vpZ74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vpZ74.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dqz89.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dqz89.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lfG51.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lfG51.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nVu48.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nVu48.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ssJ81.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ssJ81.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
665KB
MD5a454c8420b1d44a4c9de5c2d148fe426
SHA1e12b9588b3b34c330cde39926204cf47db5481cc
SHA256cc59502c653085a85cc551f105efb1761298d5725d33c86f8125f2f2797e7995
SHA51230c8fd6b21e645390215e1e078942f7c31bfb7f6d98657f76d10ff77e9972541641a3ef50234e952951285abb57c6c78b4ba6a228791a726ba1abc295eaffb92
-
Filesize
665KB
MD5a454c8420b1d44a4c9de5c2d148fe426
SHA1e12b9588b3b34c330cde39926204cf47db5481cc
SHA256cc59502c653085a85cc551f105efb1761298d5725d33c86f8125f2f2797e7995
SHA51230c8fd6b21e645390215e1e078942f7c31bfb7f6d98657f76d10ff77e9972541641a3ef50234e952951285abb57c6c78b4ba6a228791a726ba1abc295eaffb92
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
520KB
MD5062ee9c76cfab34b653b32a30822e13d
SHA1c6f7f2e14b52baa2e0bc744c18e3dadf7e09fcb8
SHA256a6acf7df84170025f68e9125104ed5f3d0cd8f59dd69a990fc9119b5787bdc12
SHA512ae9e8eeab5aca930a34bc1c8390ab0907b4f6211880a7a87007abfe87d368132a75bbbd8f05ff6a8a9e23404f7a5887c2a19bebfbc37a28112bb25fd20d84244
-
Filesize
520KB
MD5062ee9c76cfab34b653b32a30822e13d
SHA1c6f7f2e14b52baa2e0bc744c18e3dadf7e09fcb8
SHA256a6acf7df84170025f68e9125104ed5f3d0cd8f59dd69a990fc9119b5787bdc12
SHA512ae9e8eeab5aca930a34bc1c8390ab0907b4f6211880a7a87007abfe87d368132a75bbbd8f05ff6a8a9e23404f7a5887c2a19bebfbc37a28112bb25fd20d84244
-
Filesize
306KB
MD544aee1861e5f2d4f001fcc570dfb4468
SHA1a8341f8adabde95dc3465b23601052a7e1bd60e8
SHA256c0acee57b9df5bd9f0cdc471c05d5797c8df24f11b6ac21959781f3fe234a287
SHA51297a08b33f3ed6ceea8e12cd011bcda6c3316da2e0192e2d7db6464ae1843725e795f1559e05b48cbde32d008b4943c10f5c0957e5cd4dd10a4310ec10bb3fa1c
-
Filesize
306KB
MD544aee1861e5f2d4f001fcc570dfb4468
SHA1a8341f8adabde95dc3465b23601052a7e1bd60e8
SHA256c0acee57b9df5bd9f0cdc471c05d5797c8df24f11b6ac21959781f3fe234a287
SHA51297a08b33f3ed6ceea8e12cd011bcda6c3316da2e0192e2d7db6464ae1843725e795f1559e05b48cbde32d008b4943c10f5c0957e5cd4dd10a4310ec10bb3fa1c
-
Filesize
281KB
MD54f7302c3f372c146e2dd87a7ea481f31
SHA1c1f39c30a4138440399ae1c566cd414b2a4dd459
SHA2566c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3
SHA512a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312
-
Filesize
281KB
MD54f7302c3f372c146e2dd87a7ea481f31
SHA1c1f39c30a4138440399ae1c566cd414b2a4dd459
SHA2566c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3
SHA512a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312