Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe
Resource
win10v2004-20221111-en
General
-
Target
10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe
-
Size
861KB
-
MD5
c6bbd64cc1d1cdf76b328d7f05ac66c9
-
SHA1
4e40fe4e6eddb6ba45fd4060b8c8a27526cd0292
-
SHA256
10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c
-
SHA512
62603c36420524430a016f05023b12151f97152fac4d17d4b34f27b5bcfa1728a6a3f6d48b023e39e8d6c99d207de6aed4b70dd1e1165d8c40c7189cc4af4ea7
-
SSDEEP
24576:SybC7HD9R6fDwZLyc0b6mJfaVqe+HJTF:50DxNq6qfgJU
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
cr10n
176.113.115.17:4132
-
auth_value
6016c19179aa1044c369adb0ec1f363b
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection mLV41Kw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mLV41Kw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mLV41Kw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mLV41Kw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mLV41Kw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mLV41Kw.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 3592 dvs2439.exe 3924 dAH3416.exe 1596 mLV41Kw.exe 2248 nrA19Rf.exe 208 oez12eX.exe 2808 pRJ30DP.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mLV41Kw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mLV41Kw.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dAH3416.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dAH3416.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dvs2439.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dvs2439.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1728 1596 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1596 mLV41Kw.exe 1596 mLV41Kw.exe 2248 nrA19Rf.exe 2248 nrA19Rf.exe 208 oez12eX.exe 208 oez12eX.exe 2808 pRJ30DP.exe 2808 pRJ30DP.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1596 mLV41Kw.exe Token: SeDebugPrivilege 2248 nrA19Rf.exe Token: SeDebugPrivilege 208 oez12eX.exe Token: SeDebugPrivilege 2808 pRJ30DP.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4800 wrote to memory of 3592 4800 10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe 79 PID 4800 wrote to memory of 3592 4800 10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe 79 PID 4800 wrote to memory of 3592 4800 10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe 79 PID 3592 wrote to memory of 3924 3592 dvs2439.exe 80 PID 3592 wrote to memory of 3924 3592 dvs2439.exe 80 PID 3592 wrote to memory of 3924 3592 dvs2439.exe 80 PID 3924 wrote to memory of 1596 3924 dAH3416.exe 81 PID 3924 wrote to memory of 1596 3924 dAH3416.exe 81 PID 3924 wrote to memory of 1596 3924 dAH3416.exe 81 PID 3924 wrote to memory of 2248 3924 dAH3416.exe 85 PID 3924 wrote to memory of 2248 3924 dAH3416.exe 85 PID 3924 wrote to memory of 2248 3924 dAH3416.exe 85 PID 3592 wrote to memory of 208 3592 dvs2439.exe 87 PID 3592 wrote to memory of 208 3592 dvs2439.exe 87 PID 3592 wrote to memory of 208 3592 dvs2439.exe 87 PID 4800 wrote to memory of 2808 4800 10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe 88 PID 4800 wrote to memory of 2808 4800 10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe 88 PID 4800 wrote to memory of 2808 4800 10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe"C:\Users\Admin\AppData\Local\Temp\10b09889f08b7b8c55c644c15f22c792831615a38ff18f5709de1b11ed7b131c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dvs2439.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dvs2439.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dAH3416.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dAH3416.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mLV41Kw.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mLV41Kw.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 10725⤵
- Program crash
PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nrA19Rf.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nrA19Rf.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oez12eX.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oez12eX.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pRJ30DP.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pRJ30DP.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1596 -ip 15961⤵PID:1684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717KB
MD5f99bf0368c28b67d89973521d6c26739
SHA147a8a0e35f223ddd73592d45c373d09531f18421
SHA256ba76f61d3ca3d6c12f7ad1c3c62954d3130f0c0ddc21569647288f1b2d9abd07
SHA5123847770ad9b3d0de7b4953e7cbdfb8cd8bdc22d8b1e21a9a9a660d0a7b6eab12c6efd68483e925974a9b1d3097eff43eee9d93700968c55d5edfe1b2dd713d4f
-
Filesize
717KB
MD5f99bf0368c28b67d89973521d6c26739
SHA147a8a0e35f223ddd73592d45c373d09531f18421
SHA256ba76f61d3ca3d6c12f7ad1c3c62954d3130f0c0ddc21569647288f1b2d9abd07
SHA5123847770ad9b3d0de7b4953e7cbdfb8cd8bdc22d8b1e21a9a9a660d0a7b6eab12c6efd68483e925974a9b1d3097eff43eee9d93700968c55d5edfe1b2dd713d4f
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
175KB
MD5ce5ef6aac94fdb2af40da676f6cab58f
SHA1c393f24b1550955a686ee39067f20813415af95f
SHA256ce360295ca7fcc1a1c2b47a604305c67ab41358770edbd769a6a44aa635c2fd0
SHA5122cc98869cba6a962129c57fb7e3ff0b64623c94903bfbf9a2648e191b633fbe73f8e7b9d8fea348e30cc88bc44d27454fd880c81a55a6b795170fa804e6cda65
-
Filesize
379KB
MD5866052c70fd7da4931146e6ebe9d17f4
SHA18009e850fe3d4b558ee3136c78a4eae3a1418f8a
SHA2568425387fece82da4dc084a1d83fab3763258f9909d5ee0ece22d2a158d4d56e5
SHA5127abfd8ac9b69ebddc5e41404c8d29b1951fd22ded5b6a80ee166e6cb2d47566cd21e9667ef0c67bc6121fbfcb4cd3a414dd33ebeea2ffccd0f2d27c9a6a441b7
-
Filesize
379KB
MD5866052c70fd7da4931146e6ebe9d17f4
SHA18009e850fe3d4b558ee3136c78a4eae3a1418f8a
SHA2568425387fece82da4dc084a1d83fab3763258f9909d5ee0ece22d2a158d4d56e5
SHA5127abfd8ac9b69ebddc5e41404c8d29b1951fd22ded5b6a80ee166e6cb2d47566cd21e9667ef0c67bc6121fbfcb4cd3a414dd33ebeea2ffccd0f2d27c9a6a441b7
-
Filesize
306KB
MD50bdf7901be49e053cb6b88e9e1d4a805
SHA180bb92261e5405f2a100740673d365251e70f9a6
SHA256ceae18ce869f741fb9f5cf755cc5e79c0b2d509aef739236ff5bc24662a74a9a
SHA5128fed6f65db29f0c1ab4cb36e83f003c241ed601a67fd8c520f3e7a13c6192a778e461dc827df6ec91454f562f7d70e4bf00dc945cf214fb22aa5acffb8813428
-
Filesize
306KB
MD50bdf7901be49e053cb6b88e9e1d4a805
SHA180bb92261e5405f2a100740673d365251e70f9a6
SHA256ceae18ce869f741fb9f5cf755cc5e79c0b2d509aef739236ff5bc24662a74a9a
SHA5128fed6f65db29f0c1ab4cb36e83f003c241ed601a67fd8c520f3e7a13c6192a778e461dc827df6ec91454f562f7d70e4bf00dc945cf214fb22aa5acffb8813428
-
Filesize
248KB
MD59821f24e5aa2c1312d1b025f18ed5e03
SHA163bf2524ee14b19cd323e77f9e2d96e10d949fb6
SHA25687be77c0612d5ffaf2f74cbc1296e40ebd131d775b3693531bcea88d9c6ee8b4
SHA5125c0ed2cbc1373916c8ebf7bbf2c7d07c409247fd8ca1a410f76596b3a0a0a75e6a59e2eb4407f4836e42416a30699608d8b752fb2538df861ac42510e969efca
-
Filesize
248KB
MD59821f24e5aa2c1312d1b025f18ed5e03
SHA163bf2524ee14b19cd323e77f9e2d96e10d949fb6
SHA25687be77c0612d5ffaf2f74cbc1296e40ebd131d775b3693531bcea88d9c6ee8b4
SHA5125c0ed2cbc1373916c8ebf7bbf2c7d07c409247fd8ca1a410f76596b3a0a0a75e6a59e2eb4407f4836e42416a30699608d8b752fb2538df861ac42510e969efca
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236