Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15/02/2023, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe
Resource
win10-20220812-en
General
-
Target
c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe
-
Size
811KB
-
MD5
105e4638d98598af002ebd0ac499966b
-
SHA1
44ba875e5f34cb6f1835dbe56078ef6f28a807ad
-
SHA256
c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b
-
SHA512
94052b5a05fa191ea54f3846544a94b8b080dcdd9b9443fef5eea4de0f1b67e65eb51d1c285bbc8f66d3683bd03643e4bbcc3ebb405d131326f1552d18ca61c8
-
SSDEEP
24576:Wyx5lO0USK4/gYB8xU5fCsaMarQWdJ3p7Tb:l7lFFh/gYB5M8uDpH
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sMy3985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sMy3985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rNQ0936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rNQ0936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rNQ0936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sMy3985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sMy3985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rNQ0936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rNQ0936.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sMy3985.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/3348-489-0x0000000002530000-0x0000000002576000-memory.dmp family_redline behavioral1/memory/3348-494-0x00000000025D0000-0x0000000002614000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4584 vQR5770.exe 1504 vAW3125.exe 4788 rNQ0936.exe 3764 sMy3985.exe 4024 tTG79Ka.exe 3348 uEO38vt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rNQ0936.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features sMy3985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" sMy3985.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vAW3125.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vQR5770.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vQR5770.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vAW3125.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4788 rNQ0936.exe 4788 rNQ0936.exe 3764 sMy3985.exe 3764 sMy3985.exe 4024 tTG79Ka.exe 4024 tTG79Ka.exe 3348 uEO38vt.exe 3348 uEO38vt.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4788 rNQ0936.exe Token: SeDebugPrivilege 3764 sMy3985.exe Token: SeDebugPrivilege 4024 tTG79Ka.exe Token: SeDebugPrivilege 3348 uEO38vt.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1524 wrote to memory of 4584 1524 c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe 66 PID 1524 wrote to memory of 4584 1524 c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe 66 PID 1524 wrote to memory of 4584 1524 c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe 66 PID 4584 wrote to memory of 1504 4584 vQR5770.exe 67 PID 4584 wrote to memory of 1504 4584 vQR5770.exe 67 PID 4584 wrote to memory of 1504 4584 vQR5770.exe 67 PID 1504 wrote to memory of 4788 1504 vAW3125.exe 68 PID 1504 wrote to memory of 4788 1504 vAW3125.exe 68 PID 1504 wrote to memory of 3764 1504 vAW3125.exe 69 PID 1504 wrote to memory of 3764 1504 vAW3125.exe 69 PID 1504 wrote to memory of 3764 1504 vAW3125.exe 69 PID 4584 wrote to memory of 4024 4584 vQR5770.exe 70 PID 4584 wrote to memory of 4024 4584 vQR5770.exe 70 PID 4584 wrote to memory of 4024 4584 vQR5770.exe 70 PID 1524 wrote to memory of 3348 1524 c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe 72 PID 1524 wrote to memory of 3348 1524 c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe 72 PID 1524 wrote to memory of 3348 1524 c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe"C:\Users\Admin\AppData\Local\Temp\c85b0756ac9702d18291651dbcf93821fb41210985efad012f789232a574f41b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vQR5770.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vQR5770.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vAW3125.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vAW3125.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rNQ0936.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rNQ0936.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sMy3985.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sMy3985.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tTG79Ka.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tTG79Ka.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uEO38vt.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uEO38vt.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD57b68d2fee63e8605b7014e1dbeff376e
SHA1d2c3ff88628002e70f4d337383f315c1862e7486
SHA25618e5d7cf18679f5d074e4d9abc2718dd1fd6674951f62862dda09465db4d4f89
SHA5124cb0b1327aeae16bd20b69f5745f1cb0e0563ae072ff0e743bac7bc56ccf1365fb9bce31a21fbc2194fb5b120aefd86123fade8c4dd16765020b8db44f030c25
-
Filesize
298KB
MD57b68d2fee63e8605b7014e1dbeff376e
SHA1d2c3ff88628002e70f4d337383f315c1862e7486
SHA25618e5d7cf18679f5d074e4d9abc2718dd1fd6674951f62862dda09465db4d4f89
SHA5124cb0b1327aeae16bd20b69f5745f1cb0e0563ae072ff0e743bac7bc56ccf1365fb9bce31a21fbc2194fb5b120aefd86123fade8c4dd16765020b8db44f030c25
-
Filesize
478KB
MD58b0c59f5e8136d21ece00a4930a346f1
SHA12c997cf357f7064eafa53fff3e065249b9dc9da1
SHA256279b75d5da7769b7c83d831b64df8856e3e887993c8a147d23a920347faa7b0d
SHA512ca9ea36431db08cfa135a83e3f914b7cd16f6815c1b46e6dedd943fde135058e2f71483c6b4984dd6412ad81556ed47729e9f627c053138731759c0032d29459
-
Filesize
478KB
MD58b0c59f5e8136d21ece00a4930a346f1
SHA12c997cf357f7064eafa53fff3e065249b9dc9da1
SHA256279b75d5da7769b7c83d831b64df8856e3e887993c8a147d23a920347faa7b0d
SHA512ca9ea36431db08cfa135a83e3f914b7cd16f6815c1b46e6dedd943fde135058e2f71483c6b4984dd6412ad81556ed47729e9f627c053138731759c0032d29459
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
334KB
MD54c1da8a2410882a284903e8ca5c9eeb4
SHA1c63a7d02ff1703ff6bf0a5a7caed8281e791cdc6
SHA25650d3af997b22a2717ae35129ebdc3351ea2461721c916f32970401d8ee086ab9
SHA512d0a4e24d4e678f52edf5c2f0fb7bd6874d0dd5ff018ea26edcb6a2ced76b9ac0efaf9b64ae83137b1991e0e9c6506a030f14fc7daf9265dd62e268a07090d23f
-
Filesize
334KB
MD54c1da8a2410882a284903e8ca5c9eeb4
SHA1c63a7d02ff1703ff6bf0a5a7caed8281e791cdc6
SHA25650d3af997b22a2717ae35129ebdc3351ea2461721c916f32970401d8ee086ab9
SHA512d0a4e24d4e678f52edf5c2f0fb7bd6874d0dd5ff018ea26edcb6a2ced76b9ac0efaf9b64ae83137b1991e0e9c6506a030f14fc7daf9265dd62e268a07090d23f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
240KB
MD5ebd4e4bbe5bd01111ee4b46214e0108b
SHA140b6619b04c0763f9981ceb16d6225359126c7d5
SHA25675cf3a9c076d48b811a879e382aa3215c8c04975eed59c1beab8f5879deaf61b
SHA51223c16ca232badd59ddf3eb6335001e6ba86dd93d397dc1b725e21a3f275d8653096d74dc3cfd8e780a772dde0697c8e9072f345d018256e10ed9cb31092ac46c
-
Filesize
240KB
MD5ebd4e4bbe5bd01111ee4b46214e0108b
SHA140b6619b04c0763f9981ceb16d6225359126c7d5
SHA25675cf3a9c076d48b811a879e382aa3215c8c04975eed59c1beab8f5879deaf61b
SHA51223c16ca232badd59ddf3eb6335001e6ba86dd93d397dc1b725e21a3f275d8653096d74dc3cfd8e780a772dde0697c8e9072f345d018256e10ed9cb31092ac46c