Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe
Resource
win10v2004-20221111-en
General
-
Target
eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe
-
Size
468KB
-
MD5
c21c085f3df17c8871ac91b55d294122
-
SHA1
b3fe7196b8c8d0000fd41319c47a8f803e36c342
-
SHA256
eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa
-
SHA512
0b670732f40907160db2fde711e85f07273ea4583e8079de24f9cc624cd401c9fa48216455ec04aa2586e95194cad57d4c0c3fac64efb8d811a44ca50ac0cae1
-
SSDEEP
12288:BMrry90FYohvaesrM4ozQ5zBS/b19iIm0PRlC8:CyoY0ae35MFS/b1dmYRlC8
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dYx17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dYx17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dYx17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dYx17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dYx17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dYx17.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3388 nEx30.exe 2004 beX39.exe 4784 cII26ER.exe 4380 dYx17.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dYx17.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dYx17.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nEx30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nEx30.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4128 4380 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2004 beX39.exe 2004 beX39.exe 4784 cII26ER.exe 4784 cII26ER.exe 4380 dYx17.exe 4380 dYx17.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2004 beX39.exe Token: SeDebugPrivilege 4784 cII26ER.exe Token: SeDebugPrivilege 4380 dYx17.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2600 wrote to memory of 3388 2600 eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe 81 PID 2600 wrote to memory of 3388 2600 eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe 81 PID 2600 wrote to memory of 3388 2600 eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe 81 PID 3388 wrote to memory of 2004 3388 nEx30.exe 82 PID 3388 wrote to memory of 2004 3388 nEx30.exe 82 PID 3388 wrote to memory of 2004 3388 nEx30.exe 82 PID 3388 wrote to memory of 4784 3388 nEx30.exe 83 PID 3388 wrote to memory of 4784 3388 nEx30.exe 83 PID 3388 wrote to memory of 4784 3388 nEx30.exe 83 PID 2600 wrote to memory of 4380 2600 eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe 84 PID 2600 wrote to memory of 4380 2600 eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe 84 PID 2600 wrote to memory of 4380 2600 eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe"C:\Users\Admin\AppData\Local\Temp\eddd2ce50fd470b5308ac5edf9ce13d965e3ad9a6ed0d2ef4b477c6e96897bfa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEx30.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEx30.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\beX39.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\beX39.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cII26ER.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cII26ER.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dYx17.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dYx17.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 10803⤵
- Program crash
PID:4128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4380 -ip 43801⤵PID:2836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD5fd815ed5f97b5a0c8091f3f8d5125673
SHA18e062e61dc7fb58a3301741aa4c34b259e3e9b25
SHA2567f2e56fcc1d09a924faf8e9fd38f4781aa79d6d895e8d068d093b4201a3f08e7
SHA512e47b639e4692101ea444ee22b99d638c521ae5c5e8f27b16f9c2f335ab3a242bf0deb51f52a9e75ccb40edffa8bbaaa6cf8915ff74e10be79fbd697fe8ee96b7
-
Filesize
220KB
MD5fd815ed5f97b5a0c8091f3f8d5125673
SHA18e062e61dc7fb58a3301741aa4c34b259e3e9b25
SHA2567f2e56fcc1d09a924faf8e9fd38f4781aa79d6d895e8d068d093b4201a3f08e7
SHA512e47b639e4692101ea444ee22b99d638c521ae5c5e8f27b16f9c2f335ab3a242bf0deb51f52a9e75ccb40edffa8bbaaa6cf8915ff74e10be79fbd697fe8ee96b7
-
Filesize
202KB
MD58f375a9e5d652192848785717039eb46
SHA14759853d28ec3aa85d46eee15fd76e02d22eea96
SHA2569134ff311be224e401fdef045dcdce2db6767b11f1987383bc12972f982a4676
SHA5126bf6d5ee66991a01cc83c63dfcfabc5517c23a1358a330a9820f30ffca585f0fdcc21203f0388af3bf33f2d2d9eac8e820d75ce4656157bcb5ed7ebdc52e321d
-
Filesize
202KB
MD58f375a9e5d652192848785717039eb46
SHA14759853d28ec3aa85d46eee15fd76e02d22eea96
SHA2569134ff311be224e401fdef045dcdce2db6767b11f1987383bc12972f982a4676
SHA5126bf6d5ee66991a01cc83c63dfcfabc5517c23a1358a330a9820f30ffca585f0fdcc21203f0388af3bf33f2d2d9eac8e820d75ce4656157bcb5ed7ebdc52e321d
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65