Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2023, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe
Resource
win10v2004-20220901-en
General
-
Target
062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe
-
Size
855KB
-
MD5
618ae8ec7a260d71ecfcac72361a7e32
-
SHA1
bfa3976852195d18bfbf0c049191bdb65990b7b8
-
SHA256
062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad
-
SHA512
65ef4191f53b7942797b525de0de1ec20d8b516a6d2f9379c5ec54344132c29b1def28e652269bee55fd94a5bd3a6d242cca5bf479b14202be4d3a061d7ba743
-
SSDEEP
24576:kygwf1xPy8bH3nfgJa/Bj2AAFvRu83vDpNiD/X:zgoK8b3nFBj2AA/LpNW
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" riC1544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" riC1544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" riC1544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" swa9354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" swa9354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" swa9354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" riC1544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" riC1544.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection swa9354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" swa9354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" swa9354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection riC1544.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 3992 vYw2167.exe 4156 vOS8458.exe 4148 riC1544.exe 224 swa9354.exe 2812 tRa42Pp.exe 3592 uVH20fs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features swa9354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" swa9354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" riC1544.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vYw2167.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vYw2167.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vOS8458.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vOS8458.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2228 224 WerFault.exe 87 5024 3592 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4148 riC1544.exe 4148 riC1544.exe 224 swa9354.exe 224 swa9354.exe 2812 tRa42Pp.exe 2812 tRa42Pp.exe 3592 uVH20fs.exe 3592 uVH20fs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4148 riC1544.exe Token: SeDebugPrivilege 224 swa9354.exe Token: SeDebugPrivilege 2812 tRa42Pp.exe Token: SeDebugPrivilege 3592 uVH20fs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3840 wrote to memory of 3992 3840 062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe 82 PID 3840 wrote to memory of 3992 3840 062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe 82 PID 3840 wrote to memory of 3992 3840 062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe 82 PID 3992 wrote to memory of 4156 3992 vYw2167.exe 83 PID 3992 wrote to memory of 4156 3992 vYw2167.exe 83 PID 3992 wrote to memory of 4156 3992 vYw2167.exe 83 PID 4156 wrote to memory of 4148 4156 vOS8458.exe 84 PID 4156 wrote to memory of 4148 4156 vOS8458.exe 84 PID 4156 wrote to memory of 224 4156 vOS8458.exe 87 PID 4156 wrote to memory of 224 4156 vOS8458.exe 87 PID 4156 wrote to memory of 224 4156 vOS8458.exe 87 PID 3992 wrote to memory of 2812 3992 vYw2167.exe 90 PID 3992 wrote to memory of 2812 3992 vYw2167.exe 90 PID 3992 wrote to memory of 2812 3992 vYw2167.exe 90 PID 3840 wrote to memory of 3592 3840 062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe 93 PID 3840 wrote to memory of 3592 3840 062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe 93 PID 3840 wrote to memory of 3592 3840 062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe"C:\Users\Admin\AppData\Local\Temp\062182ded6524fbca137dde8873c6ffbc5961cd53316c5586183710e66e7b8ad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYw2167.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYw2167.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vOS8458.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vOS8458.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\riC1544.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\riC1544.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\swa9354.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\swa9354.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 10925⤵
- Program crash
PID:2228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tRa42Pp.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tRa42Pp.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uVH20fs.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uVH20fs.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 16843⤵
- Program crash
PID:5024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 224 -ip 2241⤵PID:752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3592 -ip 35921⤵PID:2984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5dd858415b75360783fdc870c89eb958f
SHA1b3af4e657c2a0e4e1110d38cfc930cd814a28a5f
SHA2561cd184e3f9576e553ec992f0fc60a05d0aee6fd7f98bc5bf1484d796902b9674
SHA512fb0f42f6498c13147b04aad01f9d42b6f6ce79864f061ada0dc71fff35f4810a6790b8adc361c9616e83e55d0013b5617ac446b6649f4bbb62848d520ecc5179
-
Filesize
352KB
MD5dd858415b75360783fdc870c89eb958f
SHA1b3af4e657c2a0e4e1110d38cfc930cd814a28a5f
SHA2561cd184e3f9576e553ec992f0fc60a05d0aee6fd7f98bc5bf1484d796902b9674
SHA512fb0f42f6498c13147b04aad01f9d42b6f6ce79864f061ada0dc71fff35f4810a6790b8adc361c9616e83e55d0013b5617ac446b6649f4bbb62848d520ecc5179
-
Filesize
499KB
MD599aa53c33a2332115d7593d965773746
SHA168592195d9710eef6cb6982869a5ea5c6fbadd4d
SHA25644c5b4ebb98582b78bf64f7d2f6b9be7fe15b71da921a3713cb37daf1ae544f6
SHA512a4249db50a6c009f0c5a3608b7d6e696844fef410288176ddebb75219cf37d710762c7adfbd7f8906873af5884a9b79b70df90b5669ef8dacf47d0b65801300a
-
Filesize
499KB
MD599aa53c33a2332115d7593d965773746
SHA168592195d9710eef6cb6982869a5ea5c6fbadd4d
SHA25644c5b4ebb98582b78bf64f7d2f6b9be7fe15b71da921a3713cb37daf1ae544f6
SHA512a4249db50a6c009f0c5a3608b7d6e696844fef410288176ddebb75219cf37d710762c7adfbd7f8906873af5884a9b79b70df90b5669ef8dacf47d0b65801300a
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
355KB
MD5fa9254494e9fd173a9faf6050641c389
SHA1c4479bde8748bf6e7096440844698e99081746b7
SHA256489ea3e6fdc40dbe07966ea5ce6ae0be2787ed10e1b1fc968b882097516d88a1
SHA5127b830538b8322b62f89a851f51682e74c5bd2b341b8af6807215d572450f45710780dbfa59472693a39c1a895b87a733462771d99780466b8aeb3a9b5584ca04
-
Filesize
355KB
MD5fa9254494e9fd173a9faf6050641c389
SHA1c4479bde8748bf6e7096440844698e99081746b7
SHA256489ea3e6fdc40dbe07966ea5ce6ae0be2787ed10e1b1fc968b882097516d88a1
SHA5127b830538b8322b62f89a851f51682e74c5bd2b341b8af6807215d572450f45710780dbfa59472693a39c1a895b87a733462771d99780466b8aeb3a9b5584ca04
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
295KB
MD5dd0adf92524d842b17843e3a38769564
SHA14b34fbf5dade2193630f92053be9f0dcfe563d3c
SHA256489cdd40de47bde8a31100897afafb3213c01de9cab0bc656e3cbf01c48e3682
SHA5127fbb9c9ad3df3bfd0ae3741bf76c92bdd9ea3f23e1316f4948a60e1efc3ff6dcbd4d37d7da725659fa38a0cbc0fc41d1dc85515d56b15af5cbf891bfe6853bc2
-
Filesize
295KB
MD5dd0adf92524d842b17843e3a38769564
SHA14b34fbf5dade2193630f92053be9f0dcfe563d3c
SHA256489cdd40de47bde8a31100897afafb3213c01de9cab0bc656e3cbf01c48e3682
SHA5127fbb9c9ad3df3bfd0ae3741bf76c92bdd9ea3f23e1316f4948a60e1efc3ff6dcbd4d37d7da725659fa38a0cbc0fc41d1dc85515d56b15af5cbf891bfe6853bc2