Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe
Resource
win10v2004-20230220-en
General
-
Target
742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe
-
Size
545KB
-
MD5
66c4c3de0335db13a71abf50282e312c
-
SHA1
6deb8dba7aac741f8a69b2891263fb222c151419
-
SHA256
742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99
-
SHA512
b7e7cfbc4b6a13c56f18df4699cbf6f5613e31fc271829d2685b0fdbd34151e0e8dc864541f3d79880ad591662174c2d25dda684a6ab1f3758e2d41bd33988d2
-
SSDEEP
12288:dMrWy905qNVUyBhfBjc6gfiMfmYFXbWtPetiWKG:nyFV7fp3ehCtPdWKG
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Extracted
redline
fomich
melevv.eu:4162
-
auth_value
b018e52ac946001794d8b8c23e901859
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw41mI48xQ91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw41mI48xQ91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw41mI48xQ91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw41mI48xQ91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw41mI48xQ91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw41mI48xQ91.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/1196-158-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-159-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-161-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-163-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-165-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-167-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-169-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-171-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-173-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-175-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-177-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-179-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-181-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-183-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-185-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-187-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-189-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-197-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-195-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-199-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-193-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-209-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-213-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-215-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-211-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-207-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-221-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-219-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-217-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-205-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-203-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-201-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/1196-191-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2140 vFk1540EM.exe 220 sw41mI48xQ91.exe 1196 tUQ46Ge73.exe 2252 uhS56fX01.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw41mI48xQ91.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vFk1540EM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vFk1540EM.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3620 1196 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 220 sw41mI48xQ91.exe 220 sw41mI48xQ91.exe 1196 tUQ46Ge73.exe 1196 tUQ46Ge73.exe 2252 uhS56fX01.exe 2252 uhS56fX01.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 220 sw41mI48xQ91.exe Token: SeDebugPrivilege 1196 tUQ46Ge73.exe Token: SeDebugPrivilege 2252 uhS56fX01.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4220 wrote to memory of 2140 4220 742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe 87 PID 4220 wrote to memory of 2140 4220 742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe 87 PID 4220 wrote to memory of 2140 4220 742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe 87 PID 2140 wrote to memory of 220 2140 vFk1540EM.exe 88 PID 2140 wrote to memory of 220 2140 vFk1540EM.exe 88 PID 2140 wrote to memory of 1196 2140 vFk1540EM.exe 92 PID 2140 wrote to memory of 1196 2140 vFk1540EM.exe 92 PID 2140 wrote to memory of 1196 2140 vFk1540EM.exe 92 PID 4220 wrote to memory of 2252 4220 742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe 96 PID 4220 wrote to memory of 2252 4220 742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe 96 PID 4220 wrote to memory of 2252 4220 742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe"C:\Users\Admin\AppData\Local\Temp\742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFk1540EM.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFk1540EM.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw41mI48xQ91.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw41mI48xQ91.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUQ46Ge73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUQ46Ge73.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 14084⤵
- Program crash
PID:3620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhS56fX01.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhS56fX01.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1196 -ip 11961⤵PID:4656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD529a3efda2245382374f390499069f609
SHA185e8f1ae4d62db3635daa4539fd20203bb59c6ca
SHA256a3001074008d838482acb2755d714e6acd4524368ea49f0f2897cbe0df992fd3
SHA5129c3fd348cddfe2264919b16427d225fc61c44c6a1cc959acae752f63aa5a8f14d217ef426bbad96f143095786abc5bd71a9af3d3f852f910a6a4a79b8e1cb231
-
Filesize
175KB
MD529a3efda2245382374f390499069f609
SHA185e8f1ae4d62db3635daa4539fd20203bb59c6ca
SHA256a3001074008d838482acb2755d714e6acd4524368ea49f0f2897cbe0df992fd3
SHA5129c3fd348cddfe2264919b16427d225fc61c44c6a1cc959acae752f63aa5a8f14d217ef426bbad96f143095786abc5bd71a9af3d3f852f910a6a4a79b8e1cb231
-
Filesize
401KB
MD5b96678193c516dc6eefe0186e8d11a6b
SHA19ff4f43823b9db34ff7faec4546d53312dfc97f3
SHA256f46d86f616b830ee78ac386eae99c26cb6cb607bd92df22321645e684263e4d3
SHA512166b02dd2cc57e86c66a4c11425a8e1b9e6bb74c5f6cbd1e91e179451a74d611b5e21e929dc864021ce5aa1f01096d4b468a5933a4458202e2255a4027aaa23b
-
Filesize
401KB
MD5b96678193c516dc6eefe0186e8d11a6b
SHA19ff4f43823b9db34ff7faec4546d53312dfc97f3
SHA256f46d86f616b830ee78ac386eae99c26cb6cb607bd92df22321645e684263e4d3
SHA512166b02dd2cc57e86c66a4c11425a8e1b9e6bb74c5f6cbd1e91e179451a74d611b5e21e929dc864021ce5aa1f01096d4b468a5933a4458202e2255a4027aaa23b
-
Filesize
17KB
MD5a8e66e08b54dd9ac0972c2ebb673558a
SHA176be1fd80e5ab2dd8e38e7066a78fc78c5ee604e
SHA25654d796615cd7ea16381202f7b7c366bb632a36373fde49c6c235b8b0171aa17f
SHA51218754c09c27b0dd2af281ed0e20cf2838af6ffcf829333e7dc2aa6ad0821bcfe3620ec69bda23357e3287ee0d88ae2b0d20e473943d9c8ab27df5146aff9f3da
-
Filesize
17KB
MD5a8e66e08b54dd9ac0972c2ebb673558a
SHA176be1fd80e5ab2dd8e38e7066a78fc78c5ee604e
SHA25654d796615cd7ea16381202f7b7c366bb632a36373fde49c6c235b8b0171aa17f
SHA51218754c09c27b0dd2af281ed0e20cf2838af6ffcf829333e7dc2aa6ad0821bcfe3620ec69bda23357e3287ee0d88ae2b0d20e473943d9c8ab27df5146aff9f3da
-
Filesize
377KB
MD5a9bb941524fc5973d45dad1da3e23d17
SHA1357a2a768bbec255880067c4a774ca2d4bee0588
SHA256e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659
SHA5124beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256
-
Filesize
377KB
MD5a9bb941524fc5973d45dad1da3e23d17
SHA1357a2a768bbec255880067c4a774ca2d4bee0588
SHA256e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659
SHA5124beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256