Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2023, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe
Resource
win10v2004-20221111-en
General
-
Target
e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe
-
Size
855KB
-
MD5
fa7297d8c1348401fb8fa8b4ecb9ce11
-
SHA1
3428cbbc3f71ba77f1b9b1a58fe6e0cd8314c791
-
SHA256
e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545
-
SHA512
0b383516b2605a2529a4264502844aaa35b897c50852a3305b1ba156818420e96f5a115e38ba077af22a05fc60f396956e8d781ef02e908fefd800d1712ee5ce
-
SSDEEP
24576:byb4H46zl9/liYqJpzRmZkOUOPVZK8SiF+Q:Ob4jlfp+zQxUGVZei
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection rNg1747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rNg1747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rNg1747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sjs2574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sjs2574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sjs2574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rNg1747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rNg1747.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rNg1747.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection sjs2574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sjs2574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sjs2574.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4516 vfi2257.exe 4680 vVw7413.exe 4340 rNg1747.exe 1636 sjs2574.exe 1232 tRb98nO.exe 2528 uwv69Vb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rNg1747.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features sjs2574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" sjs2574.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vfi2257.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vfi2257.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vVw7413.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vVw7413.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4772 1636 WerFault.exe 80 564 2528 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4340 rNg1747.exe 4340 rNg1747.exe 1636 sjs2574.exe 1636 sjs2574.exe 1232 tRb98nO.exe 1232 tRb98nO.exe 2528 uwv69Vb.exe 2528 uwv69Vb.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4340 rNg1747.exe Token: SeDebugPrivilege 1636 sjs2574.exe Token: SeDebugPrivilege 1232 tRb98nO.exe Token: SeDebugPrivilege 2528 uwv69Vb.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4516 1528 e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe 76 PID 1528 wrote to memory of 4516 1528 e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe 76 PID 1528 wrote to memory of 4516 1528 e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe 76 PID 4516 wrote to memory of 4680 4516 vfi2257.exe 77 PID 4516 wrote to memory of 4680 4516 vfi2257.exe 77 PID 4516 wrote to memory of 4680 4516 vfi2257.exe 77 PID 4680 wrote to memory of 4340 4680 vVw7413.exe 78 PID 4680 wrote to memory of 4340 4680 vVw7413.exe 78 PID 4680 wrote to memory of 1636 4680 vVw7413.exe 80 PID 4680 wrote to memory of 1636 4680 vVw7413.exe 80 PID 4680 wrote to memory of 1636 4680 vVw7413.exe 80 PID 4516 wrote to memory of 1232 4516 vfi2257.exe 84 PID 4516 wrote to memory of 1232 4516 vfi2257.exe 84 PID 4516 wrote to memory of 1232 4516 vfi2257.exe 84 PID 1528 wrote to memory of 2528 1528 e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe 87 PID 1528 wrote to memory of 2528 1528 e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe 87 PID 1528 wrote to memory of 2528 1528 e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe"C:\Users\Admin\AppData\Local\Temp\e9ae1505911e958aa07b13f7fe6a0b2f11c6175aa46a0881dd916e8cc6678545.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vfi2257.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vfi2257.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vVw7413.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vVw7413.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rNg1747.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rNg1747.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sjs2574.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sjs2574.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 10325⤵
- Program crash
PID:4772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tRb98nO.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tRb98nO.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uwv69Vb.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uwv69Vb.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 13363⤵
- Program crash
PID:564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1636 -ip 16361⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2528 -ip 25281⤵PID:1448
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD51e78761217b0c30a16c534355995ad89
SHA12696959f46920089eb49532ef530f237ad2f3603
SHA2564755b1a81fd308da0a8fda8cbce8c117be673d1c1cc4e264cd23dee184e138ae
SHA512ca4b48a33a7e4349127349c2684c047ac76bb32ff1f90f8b027349989b3115a344ff14178aebc83af7953748d54b9287fd275545b39d4ddb3cb1cea3a2d30bea
-
Filesize
352KB
MD51e78761217b0c30a16c534355995ad89
SHA12696959f46920089eb49532ef530f237ad2f3603
SHA2564755b1a81fd308da0a8fda8cbce8c117be673d1c1cc4e264cd23dee184e138ae
SHA512ca4b48a33a7e4349127349c2684c047ac76bb32ff1f90f8b027349989b3115a344ff14178aebc83af7953748d54b9287fd275545b39d4ddb3cb1cea3a2d30bea
-
Filesize
500KB
MD5f5e13133e304a7369b6c197d4b1d7634
SHA1e94cf2f45e3fbb77f036408f63c5934df920c77b
SHA256abefbbac33d8bc28dacb84c1b2aec913173b293a581fc2a418ed2e0366f7d3f7
SHA5127229e3f5ef00b38da1c69c00eeab15d5bd5b9ebd94fc15605cb086ee92d6966030a9164674808948619742a086c57bcba4a310c1ac6a289b5def190ec19fb47e
-
Filesize
500KB
MD5f5e13133e304a7369b6c197d4b1d7634
SHA1e94cf2f45e3fbb77f036408f63c5934df920c77b
SHA256abefbbac33d8bc28dacb84c1b2aec913173b293a581fc2a418ed2e0366f7d3f7
SHA5127229e3f5ef00b38da1c69c00eeab15d5bd5b9ebd94fc15605cb086ee92d6966030a9164674808948619742a086c57bcba4a310c1ac6a289b5def190ec19fb47e
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
355KB
MD536a2b7e76f4205987f40229cb483e42b
SHA18243b5265b5bc7d753e400c5f8d63d69830796c2
SHA25637c031c1b6901b25551cdd4380cc7eb5b6239053f81c980289e55b4db662a406
SHA5123b9f83b6cc8f37511f76e7993a52eeec84e814b315074af267e591fc273850bd9ead84b5bda990652b12ab7b50bb201b981f234e6f5a7b3efd1a6a69e82e5e32
-
Filesize
355KB
MD536a2b7e76f4205987f40229cb483e42b
SHA18243b5265b5bc7d753e400c5f8d63d69830796c2
SHA25637c031c1b6901b25551cdd4380cc7eb5b6239053f81c980289e55b4db662a406
SHA5123b9f83b6cc8f37511f76e7993a52eeec84e814b315074af267e591fc273850bd9ead84b5bda990652b12ab7b50bb201b981f234e6f5a7b3efd1a6a69e82e5e32
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
295KB
MD5304766f61a677814af31d2737d118b6f
SHA1213a7e70d4f7d13e17ddff12152bcfe2c1cc2de4
SHA25607c33396ed7ec1b40808aae921c50c552dc21b08beabbd5541b9fc9f062e08ac
SHA51208c9202e988e4f6518a14f37b19eefc8b5901a2c07472140303c48535b67830e956759db3738b3bf63559220cb1e59f8045a2fad5d84530e9cb2e670740441ea
-
Filesize
295KB
MD5304766f61a677814af31d2737d118b6f
SHA1213a7e70d4f7d13e17ddff12152bcfe2c1cc2de4
SHA25607c33396ed7ec1b40808aae921c50c552dc21b08beabbd5541b9fc9f062e08ac
SHA51208c9202e988e4f6518a14f37b19eefc8b5901a2c07472140303c48535b67830e956759db3738b3bf63559220cb1e59f8045a2fad5d84530e9cb2e670740441ea