Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/02/2023, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe
Resource
win10-20220812-en
General
-
Target
9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe
-
Size
499KB
-
MD5
474bb59c2e0fd4304a48dbaf46fbccc6
-
SHA1
31760d6126e93995c513281f6a4c9e6fcebda08b
-
SHA256
9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0
-
SHA512
1bd1b45b3371e399ad214ea233b16a5a939f402a91906db08070d8e8aa60470332e97b99d6c3ee8729b71a84f0065c278416b03c0a33f4103f0bd6acc0f58d16
-
SSDEEP
6144:KPy+bnr+3p0yN90QEO20+ZGcGtuZnSSoTkeuYFBITaHOXHH6zhv2VSvYxvgrIJxh:tMr3y906+ZecSXwaUahrvS3JxjgoEu/
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dGA36JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dGA36JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ePq90dg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ePq90dg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dGA36JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dGA36JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dGA36JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ePq90dg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ePq90dg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ePq90dg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4592 nEm75qt94.exe 2696 dGA36JC.exe 2712 ePq90dg.exe 3860 fwY73RT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" dGA36JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ePq90dg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ePq90dg.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nEm75qt94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nEm75qt94.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2696 dGA36JC.exe 2696 dGA36JC.exe 2712 ePq90dg.exe 2712 ePq90dg.exe 3860 fwY73RT.exe 3860 fwY73RT.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2696 dGA36JC.exe Token: SeDebugPrivilege 2712 ePq90dg.exe Token: SeDebugPrivilege 3860 fwY73RT.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1744 wrote to memory of 4592 1744 9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe 66 PID 1744 wrote to memory of 4592 1744 9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe 66 PID 1744 wrote to memory of 4592 1744 9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe 66 PID 4592 wrote to memory of 2696 4592 nEm75qt94.exe 67 PID 4592 wrote to memory of 2696 4592 nEm75qt94.exe 67 PID 4592 wrote to memory of 2712 4592 nEm75qt94.exe 68 PID 4592 wrote to memory of 2712 4592 nEm75qt94.exe 68 PID 4592 wrote to memory of 2712 4592 nEm75qt94.exe 68 PID 1744 wrote to memory of 3860 1744 9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe 69 PID 1744 wrote to memory of 3860 1744 9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe 69 PID 1744 wrote to memory of 3860 1744 9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe"C:\Users\Admin\AppData\Local\Temp\9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEm75qt94.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEm75qt94.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGA36JC.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGA36JC.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ePq90dg.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ePq90dg.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwY73RT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwY73RT.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
175KB
MD5a5f5c5d6291c7ae9e1d1b7ed1e551490
SHA13d06413341893b838549939e15f8f1eec423d71a
SHA2561a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e
SHA512d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2
-
Filesize
355KB
MD5c195c243ab01b17a8c7f4e9d1819e82d
SHA1829069c3e883cc7597542ce03f5e4eee3c2dfe32
SHA256f81b76c44395a78329c6a5068c2703bda2f6462eee6bb4a97f31cdaf622937dd
SHA5125191f9cbcd333aa411b0e0348865fdcf0b88de713e8ae95b445b9825f5b1ecfa5b00129a4f644efb6fbe5c05be0aa555b2622dae2c0fde7670a3ed1404ddb294
-
Filesize
355KB
MD5c195c243ab01b17a8c7f4e9d1819e82d
SHA1829069c3e883cc7597542ce03f5e4eee3c2dfe32
SHA256f81b76c44395a78329c6a5068c2703bda2f6462eee6bb4a97f31cdaf622937dd
SHA5125191f9cbcd333aa411b0e0348865fdcf0b88de713e8ae95b445b9825f5b1ecfa5b00129a4f644efb6fbe5c05be0aa555b2622dae2c0fde7670a3ed1404ddb294
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
295KB
MD5b56f1bee1d520634cb38ac5b0c935a46
SHA1ce066e6f10053af6d61cf4f0c1b25359537f286c
SHA25607afc589fecdfc24ae8baa51a0374074cda4c4b14a8d33b7a8313ad0f5e47b93
SHA51281cfd8b880aac14959eb7b282cfe4f44a473482eeb0c955c8dbd962fc25978ad07a1355848560f3f5def0f4116d2aae7c7c7f8902850a2a3bc3b6cc135d51c34
-
Filesize
295KB
MD5b56f1bee1d520634cb38ac5b0c935a46
SHA1ce066e6f10053af6d61cf4f0c1b25359537f286c
SHA25607afc589fecdfc24ae8baa51a0374074cda4c4b14a8d33b7a8313ad0f5e47b93
SHA51281cfd8b880aac14959eb7b282cfe4f44a473482eeb0c955c8dbd962fc25978ad07a1355848560f3f5def0f4116d2aae7c7c7f8902850a2a3bc3b6cc135d51c34