Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe
Resource
win10v2004-20230220-en
General
-
Target
17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe
-
Size
536KB
-
MD5
18bdbcf38fece4a57906d1795bbae04a
-
SHA1
f5ddce66f3a80265391ed2457708615600d067fb
-
SHA256
17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d
-
SHA512
871888fdd94fba3a0c7c5fc38302d1d8fb5c97ae96dff43a27b4d123868691b00f9ee712b01b044af841f2d02f02c2b34e208260a1e2a510e82517eaeb7db7d3
-
SSDEEP
12288:MMrEy90P0EyDyR9ZEpPzumd5+1CGgrDPhZBkYMgVZ2HARO:AyYLyg9WpPKF0Ggho/2oHL
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw10Hv93ep40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw10Hv93ep40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw10Hv93ep40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw10Hv93ep40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw10Hv93ep40.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw10Hv93ep40.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/220-159-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-160-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-164-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-162-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-166-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-168-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-170-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-172-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-174-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-176-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-178-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-180-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-182-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-184-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-186-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-188-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-190-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-192-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-194-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-196-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-198-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-200-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-202-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-206-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-208-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-204-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-210-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-212-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-214-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-216-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-218-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-220-0x0000000002750000-0x000000000278E000-memory.dmp family_redline behavioral1/memory/220-222-0x0000000002750000-0x000000000278E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4384 vAs2743SP.exe 4552 sw10Hv93ep40.exe 220 tzj48qZ90.exe 4948 uKT77Qp63.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw10Hv93ep40.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vAs2743SP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vAs2743SP.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{4FCAF91A-E4B0-4CC1-84C1-ABEF9313DAE6}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{5616FE6A-A808-4E41-9282-CF98966169C7}.catalogItem svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3992 220 WerFault.exe 92 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4552 sw10Hv93ep40.exe 4552 sw10Hv93ep40.exe 220 tzj48qZ90.exe 220 tzj48qZ90.exe 4948 uKT77Qp63.exe 4948 uKT77Qp63.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4552 sw10Hv93ep40.exe Token: SeDebugPrivilege 220 tzj48qZ90.exe Token: SeDebugPrivilege 4948 uKT77Qp63.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4384 4016 17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe 83 PID 4016 wrote to memory of 4384 4016 17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe 83 PID 4016 wrote to memory of 4384 4016 17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe 83 PID 4384 wrote to memory of 4552 4384 vAs2743SP.exe 84 PID 4384 wrote to memory of 4552 4384 vAs2743SP.exe 84 PID 4384 wrote to memory of 220 4384 vAs2743SP.exe 92 PID 4384 wrote to memory of 220 4384 vAs2743SP.exe 92 PID 4384 wrote to memory of 220 4384 vAs2743SP.exe 92 PID 4016 wrote to memory of 4948 4016 17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe 100 PID 4016 wrote to memory of 4948 4016 17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe 100 PID 4016 wrote to memory of 4948 4016 17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe"C:\Users\Admin\AppData\Local\Temp\17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAs2743SP.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAs2743SP.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw10Hv93ep40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw10Hv93ep40.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzj48qZ90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzj48qZ90.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 15644⤵
- Program crash
PID:3992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uKT77Qp63.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uKT77Qp63.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 220 -ip 2201⤵PID:3920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b92a503e97092213bbe657a1664fec0d
SHA122a91428d88811969a5a2d43f5a91b795227e1ce
SHA25682fef8f38d7f481bd2cdb3c7906ce237b103a14a001357da7fa3cfe2265d544c
SHA5128c045dbb3c6b7e79ee97e21a40b004bd3bd896b6d7ee11f405df048ae62268afd76757a7e450c9f5114f4736705156531502a0caf9fbe19b191550be7f7399b3
-
Filesize
175KB
MD5b92a503e97092213bbe657a1664fec0d
SHA122a91428d88811969a5a2d43f5a91b795227e1ce
SHA25682fef8f38d7f481bd2cdb3c7906ce237b103a14a001357da7fa3cfe2265d544c
SHA5128c045dbb3c6b7e79ee97e21a40b004bd3bd896b6d7ee11f405df048ae62268afd76757a7e450c9f5114f4736705156531502a0caf9fbe19b191550be7f7399b3
-
Filesize
391KB
MD5a0fa9bab62b925c470a23260aefaec2b
SHA144533ed0a378f3975d18bbe0bf1cd9f84b5f91ff
SHA25658b08c9cac4089e388f9b36752377a37498aeb815f54c649e341c55188968e49
SHA512229fcc190c7581c0ce92dfd102534710fccaf2a3e94519d3c206102101e161066971fd57d41f10f2909bb824377e77de60f00c5bba8271fb5540fe8f3ab8d183
-
Filesize
391KB
MD5a0fa9bab62b925c470a23260aefaec2b
SHA144533ed0a378f3975d18bbe0bf1cd9f84b5f91ff
SHA25658b08c9cac4089e388f9b36752377a37498aeb815f54c649e341c55188968e49
SHA512229fcc190c7581c0ce92dfd102534710fccaf2a3e94519d3c206102101e161066971fd57d41f10f2909bb824377e77de60f00c5bba8271fb5540fe8f3ab8d183
-
Filesize
11KB
MD530edfc9cc65763308cca008074b2b8e9
SHA1820a638f4acdb4c9c0400349b2f9434afb852ff9
SHA256226e5d807dd6a8f4d2dff71e4e607a803ee2b3bb1ae03ea517c588128a9d6002
SHA512566b5971902b9e1c9766a79f5e87797493d7d9081d8866815bc1c7323387250d1ce1053ca50d720a2e5149641f802896ab61efdb035c9290c42913d948cfd284
-
Filesize
11KB
MD530edfc9cc65763308cca008074b2b8e9
SHA1820a638f4acdb4c9c0400349b2f9434afb852ff9
SHA256226e5d807dd6a8f4d2dff71e4e607a803ee2b3bb1ae03ea517c588128a9d6002
SHA512566b5971902b9e1c9766a79f5e87797493d7d9081d8866815bc1c7323387250d1ce1053ca50d720a2e5149641f802896ab61efdb035c9290c42913d948cfd284
-
Filesize
303KB
MD5003ebed48d2fda6c315c683d32b6a6dc
SHA1677088017218065e750a178b68fe2388ac74920a
SHA2560fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c
SHA51226666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d
-
Filesize
303KB
MD5003ebed48d2fda6c315c683d32b6a6dc
SHA1677088017218065e750a178b68fe2388ac74920a
SHA2560fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c
SHA51226666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d