Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/02/2023, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe
Resource
win10v2004-20220812-en
General
-
Target
02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe
-
Size
998KB
-
MD5
761f4dedc9befed167365b92a33eec42
-
SHA1
00ba73d2d6be4b92eacaae4bf5c7811f7a0c9ebe
-
SHA256
02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6
-
SHA512
69999613d16791702359dfd040e30750c3d3f64a15598fffa729b6b8dd2e0e616c2836afaa0142be36597c6b29ab6985f84297bdfc1e62007dee37c662580e90
-
SSDEEP
24576:3yuuWaZbLNmyJnT4jVqCKe9hfLA4F0L3leyB34Tzk04FliBp8Wj4eGu:CYaZbLNbTOpT04F0x3KHk0WliBpE
Malware Config
Extracted
redline
dubka
193.233.20.13:4136
-
auth_value
e5a9421183a033f283b2f23139b471f0
Extracted
redline
nock
176.113.115.17:4132
-
auth_value
f32d3c6ff0a9a7632c60a2b045a9cde6
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mfb92or.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mfb92or.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection kxS31pc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" kxS31pc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" kxS31pc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" kxS31pc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" kxS31pc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" kxS31pc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mfb92or.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection mfb92or.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mfb92or.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mfb92or.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 4580 dDa7090.exe 3796 dqv5613.exe 1840 dlk3409.exe 4960 kxS31pc.exe 4800 mfb92or.exe 2296 nRJ30GW.exe 3044 oUX27Pf.exe 852 pjY33vh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" kxS31pc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mfb92or.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mfb92or.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" dlk3409.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dDa7090.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" dDa7090.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dqv5613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" dqv5613.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dlk3409.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1612 4800 WerFault.exe 86 3864 3044 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4960 kxS31pc.exe 4960 kxS31pc.exe 4800 mfb92or.exe 4800 mfb92or.exe 2296 nRJ30GW.exe 2296 nRJ30GW.exe 3044 oUX27Pf.exe 3044 oUX27Pf.exe 852 pjY33vh.exe 852 pjY33vh.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4960 kxS31pc.exe Token: SeDebugPrivilege 4800 mfb92or.exe Token: SeDebugPrivilege 2296 nRJ30GW.exe Token: SeDebugPrivilege 3044 oUX27Pf.exe Token: SeDebugPrivilege 852 pjY33vh.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1368 wrote to memory of 4580 1368 02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe 81 PID 1368 wrote to memory of 4580 1368 02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe 81 PID 1368 wrote to memory of 4580 1368 02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe 81 PID 4580 wrote to memory of 3796 4580 dDa7090.exe 82 PID 4580 wrote to memory of 3796 4580 dDa7090.exe 82 PID 4580 wrote to memory of 3796 4580 dDa7090.exe 82 PID 3796 wrote to memory of 1840 3796 dqv5613.exe 83 PID 3796 wrote to memory of 1840 3796 dqv5613.exe 83 PID 3796 wrote to memory of 1840 3796 dqv5613.exe 83 PID 1840 wrote to memory of 4960 1840 dlk3409.exe 84 PID 1840 wrote to memory of 4960 1840 dlk3409.exe 84 PID 1840 wrote to memory of 4800 1840 dlk3409.exe 86 PID 1840 wrote to memory of 4800 1840 dlk3409.exe 86 PID 1840 wrote to memory of 4800 1840 dlk3409.exe 86 PID 3796 wrote to memory of 2296 3796 dqv5613.exe 90 PID 3796 wrote to memory of 2296 3796 dqv5613.exe 90 PID 3796 wrote to memory of 2296 3796 dqv5613.exe 90 PID 4580 wrote to memory of 3044 4580 dDa7090.exe 92 PID 4580 wrote to memory of 3044 4580 dDa7090.exe 92 PID 4580 wrote to memory of 3044 4580 dDa7090.exe 92 PID 1368 wrote to memory of 852 1368 02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe 95 PID 1368 wrote to memory of 852 1368 02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe 95 PID 1368 wrote to memory of 852 1368 02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe"C:\Users\Admin\AppData\Local\Temp\02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDa7090.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDa7090.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dqv5613.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dqv5613.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlk3409.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlk3409.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kxS31pc.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kxS31pc.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mfb92or.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mfb92or.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 10926⤵
- Program crash
PID:1612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nRJ30GW.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nRJ30GW.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oUX27Pf.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oUX27Pf.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 19804⤵
- Program crash
PID:3864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pjY33vh.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pjY33vh.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4800 -ip 48001⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3044 -ip 30441⤵PID:4608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
855KB
MD5a3e8f2975b470c865e57f6e77ea42592
SHA197f87966ca38ee6a6c160e5aa882590c1ccd6ad9
SHA25648ab0a894bca18b8926228fdecd79f9c85cfe563fa26b2f5878c5fda3cfc5f45
SHA5120bfdc22673163e662869861d1e34eb146daf16f668d4847579ed63f9e22e201c10cc04e6ed568810e4d3af8cb38e786185132638fe821c15e06c221516cae53a
-
Filesize
855KB
MD5a3e8f2975b470c865e57f6e77ea42592
SHA197f87966ca38ee6a6c160e5aa882590c1ccd6ad9
SHA25648ab0a894bca18b8926228fdecd79f9c85cfe563fa26b2f5878c5fda3cfc5f45
SHA5120bfdc22673163e662869861d1e34eb146daf16f668d4847579ed63f9e22e201c10cc04e6ed568810e4d3af8cb38e786185132638fe821c15e06c221516cae53a
-
Filesize
175KB
MD58f2223375414f5a6708a342a1efb714e
SHA1b9342d91cef91c550ec054e4ef8ad8a8785f06a0
SHA25638a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e
SHA5121af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e
-
Filesize
175KB
MD58f2223375414f5a6708a342a1efb714e
SHA1b9342d91cef91c550ec054e4ef8ad8a8785f06a0
SHA25638a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e
SHA5121af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e
-
Filesize
500KB
MD56fa34fa9058cd1ebf8c0669c71a61d47
SHA1853b0fdbd97211ae1dad759d4b41a4f19f4cf814
SHA256dcb7bd814ecbfb07efefd3dcc4804689debcfc7fc5d3e1141929142d59c38a22
SHA512f5f1835e337c3613583c40237187a966edeb5c06874378520f333d27f2cd9d0bed3e89a1fc0108b0b47a6939dd16638f850d6f5431403db5186810a6af0b2665
-
Filesize
500KB
MD56fa34fa9058cd1ebf8c0669c71a61d47
SHA1853b0fdbd97211ae1dad759d4b41a4f19f4cf814
SHA256dcb7bd814ecbfb07efefd3dcc4804689debcfc7fc5d3e1141929142d59c38a22
SHA512f5f1835e337c3613583c40237187a966edeb5c06874378520f333d27f2cd9d0bed3e89a1fc0108b0b47a6939dd16638f850d6f5431403db5186810a6af0b2665
-
Filesize
352KB
MD5fc3006f1b5df63326089259d4f7d0fff
SHA1c68532029806e0fc7ed44e454103479fe1be1c99
SHA2567b6411a926d73dd34d26b7dc832594685e84cfa11d56558c52668d10539b9d32
SHA512115d8ae61b659e105bd386615f3f8ef6a78cca9268b2319aa632b06f6342b62f096a9343ed4642e6d4b2c14f5796be1aedb84183bc77faffa7b64e4ec1912463
-
Filesize
352KB
MD5fc3006f1b5df63326089259d4f7d0fff
SHA1c68532029806e0fc7ed44e454103479fe1be1c99
SHA2567b6411a926d73dd34d26b7dc832594685e84cfa11d56558c52668d10539b9d32
SHA512115d8ae61b659e105bd386615f3f8ef6a78cca9268b2319aa632b06f6342b62f096a9343ed4642e6d4b2c14f5796be1aedb84183bc77faffa7b64e4ec1912463
-
Filesize
355KB
MD53e192e82a7bd18174739293e76179929
SHA181ff251cb2a48f0accf0720c5a06854046fc38ec
SHA256b1d7e0d57c02f5b6b2058e7e6a799024ad709af024e67da23fa377e6422c1422
SHA5123b7b9ef31d806877cb71f284e79822a3d3773f9f384ddf3179a3dc11a5e6c853d0c713eacabf4f676b02c869d35032e835fd9413315dbee64b697832f2a87dec
-
Filesize
355KB
MD53e192e82a7bd18174739293e76179929
SHA181ff251cb2a48f0accf0720c5a06854046fc38ec
SHA256b1d7e0d57c02f5b6b2058e7e6a799024ad709af024e67da23fa377e6422c1422
SHA5123b7b9ef31d806877cb71f284e79822a3d3773f9f384ddf3179a3dc11a5e6c853d0c713eacabf4f676b02c869d35032e835fd9413315dbee64b697832f2a87dec
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
175KB
MD5dd0c9e110c68ce1fa5308979ef718f7b
SHA1473deb8069f0841d47b74b7f414dacc6f96eca78
SHA256dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3
SHA51229bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
295KB
MD5304766f61a677814af31d2737d118b6f
SHA1213a7e70d4f7d13e17ddff12152bcfe2c1cc2de4
SHA25607c33396ed7ec1b40808aae921c50c552dc21b08beabbd5541b9fc9f062e08ac
SHA51208c9202e988e4f6518a14f37b19eefc8b5901a2c07472140303c48535b67830e956759db3738b3bf63559220cb1e59f8045a2fad5d84530e9cb2e670740441ea
-
Filesize
295KB
MD5304766f61a677814af31d2737d118b6f
SHA1213a7e70d4f7d13e17ddff12152bcfe2c1cc2de4
SHA25607c33396ed7ec1b40808aae921c50c552dc21b08beabbd5541b9fc9f062e08ac
SHA51208c9202e988e4f6518a14f37b19eefc8b5901a2c07472140303c48535b67830e956759db3738b3bf63559220cb1e59f8045a2fad5d84530e9cb2e670740441ea