Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe
Resource
win10v2004-20221111-en
General
-
Target
0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe
-
Size
482KB
-
MD5
7f4aefdf9e6e0e75e44f32db775682c4
-
SHA1
ff033a99eff70a62b688ef95d4ff1095a025a1f5
-
SHA256
0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366
-
SHA512
074502504f463b5419ce22957e468e1f671cafcd27a0d4d232d885b5c8122e12cfecfba0673dd29b1794e1740b5f4c2224686a45bf2cfbe36b4f2af4efa1fdba
-
SSDEEP
12288:/Mryy90TQQVx52N/vfBmNYSz4KU8O5Ic2:tySdVx6fB+JU8Or2
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" eUT73Bk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" eUT73Bk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dAj44nB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dAj44nB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" eUT73Bk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dAj44nB.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection eUT73Bk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" eUT73Bk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" eUT73Bk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dAj44nB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dAj44nB.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dAj44nB.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2400 nGn63ml98.exe 4148 dAj44nB.exe 1856 eUT73Bk.exe 4880 fbb08BD.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" dAj44nB.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features eUT73Bk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" eUT73Bk.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nGn63ml98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nGn63ml98.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4148 dAj44nB.exe 4148 dAj44nB.exe 1856 eUT73Bk.exe 1856 eUT73Bk.exe 4880 fbb08BD.exe 4880 fbb08BD.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4148 dAj44nB.exe Token: SeDebugPrivilege 1856 eUT73Bk.exe Token: SeDebugPrivilege 4880 fbb08BD.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 900 wrote to memory of 2400 900 0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe 81 PID 900 wrote to memory of 2400 900 0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe 81 PID 900 wrote to memory of 2400 900 0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe 81 PID 2400 wrote to memory of 4148 2400 nGn63ml98.exe 82 PID 2400 wrote to memory of 4148 2400 nGn63ml98.exe 82 PID 2400 wrote to memory of 1856 2400 nGn63ml98.exe 85 PID 2400 wrote to memory of 1856 2400 nGn63ml98.exe 85 PID 2400 wrote to memory of 1856 2400 nGn63ml98.exe 85 PID 900 wrote to memory of 4880 900 0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe 86 PID 900 wrote to memory of 4880 900 0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe 86 PID 900 wrote to memory of 4880 900 0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe"C:\Users\Admin\AppData\Local\Temp\0369e3646d61a8123f8cc762b801aeb458b4149c08c5230755e98270a09ff366.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nGn63ml98.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nGn63ml98.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dAj44nB.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dAj44nB.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eUT73Bk.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eUT73Bk.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fbb08BD.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fbb08BD.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
337KB
MD59ed452bb6e7558560fc7304cb7f632d3
SHA1312c37ee676f191f22fccc80c7ea13f217f21dc7
SHA25671222b4716efe64ed1e2361041261ae8e4a6fe2695a459f23fbe86532548d16d
SHA51293bc61122787976ad3aebb1fd02407472e8bb31327842be34eda1f2da051406a627eeabe5390558d8cb41f7ff5933bed5bc5b57ac09bdb1c01e8341340eb079c
-
Filesize
337KB
MD59ed452bb6e7558560fc7304cb7f632d3
SHA1312c37ee676f191f22fccc80c7ea13f217f21dc7
SHA25671222b4716efe64ed1e2361041261ae8e4a6fe2695a459f23fbe86532548d16d
SHA51293bc61122787976ad3aebb1fd02407472e8bb31327842be34eda1f2da051406a627eeabe5390558d8cb41f7ff5933bed5bc5b57ac09bdb1c01e8341340eb079c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
248KB
MD59821f24e5aa2c1312d1b025f18ed5e03
SHA163bf2524ee14b19cd323e77f9e2d96e10d949fb6
SHA25687be77c0612d5ffaf2f74cbc1296e40ebd131d775b3693531bcea88d9c6ee8b4
SHA5125c0ed2cbc1373916c8ebf7bbf2c7d07c409247fd8ca1a410f76596b3a0a0a75e6a59e2eb4407f4836e42416a30699608d8b752fb2538df861ac42510e969efca
-
Filesize
248KB
MD59821f24e5aa2c1312d1b025f18ed5e03
SHA163bf2524ee14b19cd323e77f9e2d96e10d949fb6
SHA25687be77c0612d5ffaf2f74cbc1296e40ebd131d775b3693531bcea88d9c6ee8b4
SHA5125c0ed2cbc1373916c8ebf7bbf2c7d07c409247fd8ca1a410f76596b3a0a0a75e6a59e2eb4407f4836e42416a30699608d8b752fb2538df861ac42510e969efca