Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
51s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
14/02/2023, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe
Resource
win10-20220901-en
General
-
Target
44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe
-
Size
482KB
-
MD5
7234e64e819275fa8fffa05ecc8e1cab
-
SHA1
da52fa5010e2f2839ea176b7de473935eb11bfef
-
SHA256
44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33
-
SHA512
a24756700ffb6f7a03cff8d9da6ee74d6cd081e3762b01c902d387eccca21705892e6ee37b6b294e917b7a74db861bd229d8107eb2d91274cde0677f2b38fab8
-
SSDEEP
12288:OMryy90rGz0mVccNuZv8SH1HXY5Djjz6egF3+Ue:wycaVXEGMHXY5DXPc3+9
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bRr66kR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bRr66kR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" lPC67Wt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" lPC67Wt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" lPC67Wt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bRr66kR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bRr66kR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bRr66kR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" lPC67Wt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" lPC67Wt.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4636 nvA61yL.exe 1360 bRr66kR.exe 4192 dcg26eR.exe 4288 lPC67Wt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features bRr66kR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bRr66kR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" lPC67Wt.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nvA61yL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nvA61yL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1360 bRr66kR.exe 1360 bRr66kR.exe 4192 dcg26eR.exe 4192 dcg26eR.exe 4288 lPC67Wt.exe 4288 lPC67Wt.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1360 bRr66kR.exe Token: SeDebugPrivilege 4192 dcg26eR.exe Token: SeDebugPrivilege 4288 lPC67Wt.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2844 wrote to memory of 4636 2844 44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe 66 PID 2844 wrote to memory of 4636 2844 44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe 66 PID 2844 wrote to memory of 4636 2844 44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe 66 PID 4636 wrote to memory of 1360 4636 nvA61yL.exe 67 PID 4636 wrote to memory of 1360 4636 nvA61yL.exe 67 PID 4636 wrote to memory of 1360 4636 nvA61yL.exe 67 PID 4636 wrote to memory of 4192 4636 nvA61yL.exe 68 PID 4636 wrote to memory of 4192 4636 nvA61yL.exe 68 PID 4636 wrote to memory of 4192 4636 nvA61yL.exe 68 PID 2844 wrote to memory of 4288 2844 44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe 70 PID 2844 wrote to memory of 4288 2844 44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe"C:\Users\Admin\AppData\Local\Temp\44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nvA61yL.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nvA61yL.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bRr66kR.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bRr66kR.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dcg26eR.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dcg26eR.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lPC67Wt.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lPC67Wt.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
378KB
MD5019cd0dd76d8903ab741ed7d025f8d30
SHA160ce8eb037de0a255a4f6a8fc043ac6681b3bd49
SHA2563606851eb5c8717882e6775598d686abee7efdc35528326a81578ea1cbf0f193
SHA5121bf0218f7e8d11a92b48ec7712f2cee45342312b6eba84a84f7db0455dc8d724b91e5fa36aa8bba238b117e07157c33326bb5446e86246553c520146821639a1
-
Filesize
378KB
MD5019cd0dd76d8903ab741ed7d025f8d30
SHA160ce8eb037de0a255a4f6a8fc043ac6681b3bd49
SHA2563606851eb5c8717882e6775598d686abee7efdc35528326a81578ea1cbf0f193
SHA5121bf0218f7e8d11a92b48ec7712f2cee45342312b6eba84a84f7db0455dc8d724b91e5fa36aa8bba238b117e07157c33326bb5446e86246553c520146821639a1
-
Filesize
247KB
MD56cf228753a605faa339ed5509a3a1b84
SHA1340fa64fb659c183a7d040514be806e51ed33abb
SHA2565456903fe3382ca3a494aa5c2d626ddbc57ce8c977893d546ff5345df484bab9
SHA51269c25fec8903c2189e189a80288a6bd9ed44c8e56bb79903f371ccdd0e7fd0a8075ff3f7816d906e9d839e64145921fe34ae8c1df77e5b85597b7508080ce61b
-
Filesize
247KB
MD56cf228753a605faa339ed5509a3a1b84
SHA1340fa64fb659c183a7d040514be806e51ed33abb
SHA2565456903fe3382ca3a494aa5c2d626ddbc57ce8c977893d546ff5345df484bab9
SHA51269c25fec8903c2189e189a80288a6bd9ed44c8e56bb79903f371ccdd0e7fd0a8075ff3f7816d906e9d839e64145921fe34ae8c1df77e5b85597b7508080ce61b
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec