Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
14/02/2023, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe
Resource
win10-20220901-en
General
-
Target
c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe
-
Size
478KB
-
MD5
b0652c407e994a2da8ff48f1437dcaf7
-
SHA1
8a07d2dfb0fc94e85481eb321ca83415fb852cfc
-
SHA256
c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e
-
SHA512
ff476b8e2884bb47cf8433bb58c67f152d7516eec6846f7367cbe7cb5e7e074998e024a7a52733c47b8590c63165f94a7200af1002910673cdcb4f7a7c6bb247
-
SSDEEP
12288:8MrMy90KdFeV/CNhzL66OvPCPzrKcK39Q9dao4CTBY:wy9cV/OLSvP+ztKt0a7CTBY
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bZM70AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" llc93yf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" llc93yf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" llc93yf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" llc93yf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bZM70AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bZM70AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bZM70AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bZM70AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bZM70AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" llc93yf.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2036 nQq88Vs.exe 1816 bZM70AF.exe 760 dmf06le.exe 1472 llc93yf.exe -
Loads dropped DLL 8 IoCs
pid Process 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 2036 nQq88Vs.exe 2036 nQq88Vs.exe 2036 nQq88Vs.exe 1816 bZM70AF.exe 2036 nQq88Vs.exe 760 dmf06le.exe 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features bZM70AF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bZM70AF.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features llc93yf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" llc93yf.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce nQq88Vs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nQq88Vs.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1816 bZM70AF.exe 1816 bZM70AF.exe 760 dmf06le.exe 760 dmf06le.exe 1472 llc93yf.exe 1472 llc93yf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1816 bZM70AF.exe Token: SeDebugPrivilege 760 dmf06le.exe Token: SeDebugPrivilege 1472 llc93yf.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 940 wrote to memory of 2036 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 28 PID 940 wrote to memory of 2036 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 28 PID 940 wrote to memory of 2036 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 28 PID 940 wrote to memory of 2036 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 28 PID 940 wrote to memory of 2036 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 28 PID 940 wrote to memory of 2036 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 28 PID 940 wrote to memory of 2036 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 28 PID 2036 wrote to memory of 1816 2036 nQq88Vs.exe 29 PID 2036 wrote to memory of 1816 2036 nQq88Vs.exe 29 PID 2036 wrote to memory of 1816 2036 nQq88Vs.exe 29 PID 2036 wrote to memory of 1816 2036 nQq88Vs.exe 29 PID 2036 wrote to memory of 1816 2036 nQq88Vs.exe 29 PID 2036 wrote to memory of 1816 2036 nQq88Vs.exe 29 PID 2036 wrote to memory of 1816 2036 nQq88Vs.exe 29 PID 2036 wrote to memory of 760 2036 nQq88Vs.exe 30 PID 2036 wrote to memory of 760 2036 nQq88Vs.exe 30 PID 2036 wrote to memory of 760 2036 nQq88Vs.exe 30 PID 2036 wrote to memory of 760 2036 nQq88Vs.exe 30 PID 2036 wrote to memory of 760 2036 nQq88Vs.exe 30 PID 2036 wrote to memory of 760 2036 nQq88Vs.exe 30 PID 2036 wrote to memory of 760 2036 nQq88Vs.exe 30 PID 940 wrote to memory of 1472 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 32 PID 940 wrote to memory of 1472 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 32 PID 940 wrote to memory of 1472 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 32 PID 940 wrote to memory of 1472 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 32 PID 940 wrote to memory of 1472 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 32 PID 940 wrote to memory of 1472 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 32 PID 940 wrote to memory of 1472 940 c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe"C:\Users\Admin\AppData\Local\Temp\c0a17de01f49b4a912940d52926be34e6be3296530ca1f902185d8db6668435e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nQq88Vs.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nQq88Vs.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bZM70AF.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bZM70AF.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dmf06le.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dmf06le.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\llc93yf.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\llc93yf.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
374KB
MD57624757732f264193216a1b14e3ba6c3
SHA14d54925261c1101e07b23f452135e0bced673841
SHA25662e5f77a80c9f750e4909f30f6086df308559b66ddbd01993c71a451911a3df8
SHA512ca19753e485fd31c0ff25b1bed3330d5f01c147a77eba5014caebbf83bd683d7e975d88cc701694b566557d16827c4c0ece41b93ea5bdf2e2e07020e105ba0f0
-
Filesize
374KB
MD57624757732f264193216a1b14e3ba6c3
SHA14d54925261c1101e07b23f452135e0bced673841
SHA25662e5f77a80c9f750e4909f30f6086df308559b66ddbd01993c71a451911a3df8
SHA512ca19753e485fd31c0ff25b1bed3330d5f01c147a77eba5014caebbf83bd683d7e975d88cc701694b566557d16827c4c0ece41b93ea5bdf2e2e07020e105ba0f0
-
Filesize
235KB
MD55179ecce0539ae27dc4f03489b9590c3
SHA18476515cacf77c049d203f856adac1fff4a13484
SHA256cbbafaa829b55617ec28b25560ab8c12bcdd05ae1d021fcad3102763d7dd6799
SHA512e2fe7c24367e123c38e0de7327157b78a8d43c743ce5a2bcb20e817d1ed8ba1dd9c2f37e50296805b834cd931911d5192fcc53c0672ea66a18a9686dbac5bcb4
-
Filesize
235KB
MD55179ecce0539ae27dc4f03489b9590c3
SHA18476515cacf77c049d203f856adac1fff4a13484
SHA256cbbafaa829b55617ec28b25560ab8c12bcdd05ae1d021fcad3102763d7dd6799
SHA512e2fe7c24367e123c38e0de7327157b78a8d43c743ce5a2bcb20e817d1ed8ba1dd9c2f37e50296805b834cd931911d5192fcc53c0672ea66a18a9686dbac5bcb4
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
374KB
MD57624757732f264193216a1b14e3ba6c3
SHA14d54925261c1101e07b23f452135e0bced673841
SHA25662e5f77a80c9f750e4909f30f6086df308559b66ddbd01993c71a451911a3df8
SHA512ca19753e485fd31c0ff25b1bed3330d5f01c147a77eba5014caebbf83bd683d7e975d88cc701694b566557d16827c4c0ece41b93ea5bdf2e2e07020e105ba0f0
-
Filesize
374KB
MD57624757732f264193216a1b14e3ba6c3
SHA14d54925261c1101e07b23f452135e0bced673841
SHA25662e5f77a80c9f750e4909f30f6086df308559b66ddbd01993c71a451911a3df8
SHA512ca19753e485fd31c0ff25b1bed3330d5f01c147a77eba5014caebbf83bd683d7e975d88cc701694b566557d16827c4c0ece41b93ea5bdf2e2e07020e105ba0f0
-
Filesize
235KB
MD55179ecce0539ae27dc4f03489b9590c3
SHA18476515cacf77c049d203f856adac1fff4a13484
SHA256cbbafaa829b55617ec28b25560ab8c12bcdd05ae1d021fcad3102763d7dd6799
SHA512e2fe7c24367e123c38e0de7327157b78a8d43c743ce5a2bcb20e817d1ed8ba1dd9c2f37e50296805b834cd931911d5192fcc53c0672ea66a18a9686dbac5bcb4
-
Filesize
235KB
MD55179ecce0539ae27dc4f03489b9590c3
SHA18476515cacf77c049d203f856adac1fff4a13484
SHA256cbbafaa829b55617ec28b25560ab8c12bcdd05ae1d021fcad3102763d7dd6799
SHA512e2fe7c24367e123c38e0de7327157b78a8d43c743ce5a2bcb20e817d1ed8ba1dd9c2f37e50296805b834cd931911d5192fcc53c0672ea66a18a9686dbac5bcb4
-
Filesize
235KB
MD55179ecce0539ae27dc4f03489b9590c3
SHA18476515cacf77c049d203f856adac1fff4a13484
SHA256cbbafaa829b55617ec28b25560ab8c12bcdd05ae1d021fcad3102763d7dd6799
SHA512e2fe7c24367e123c38e0de7327157b78a8d43c743ce5a2bcb20e817d1ed8ba1dd9c2f37e50296805b834cd931911d5192fcc53c0672ea66a18a9686dbac5bcb4
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2