Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
85s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe
Resource
win10v2004-20230220-en
General
-
Target
7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe
-
Size
693KB
-
MD5
39035a87737d8415fd065125906c3d12
-
SHA1
7af99a65ab7fcd41ad6c07a4e571f29fad798d4c
-
SHA256
7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4
-
SHA512
1560fa4f819380268a2bcee5861244140708fcdfc6dbe882186ae78a5c8bdd40e9f3d2eb52e5f9a884cb1361d2484c687909b71ac7715eb883c4c3c7dbb17d73
-
SSDEEP
12288:2Mrry90j8UmeACtPGB8VyYumHBDB5FKwqNVOnuaFb9SHEZamOAZ+x8piCe7/uq:Fyx23t4xmHBbFKtVOntl9SHoun0Pe7/L
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urQT33ij66.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection urQT33ij66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urQT33ij66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urQT33ij66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urQT33ij66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urQT33ij66.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1060-193-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-198-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-196-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-194-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-200-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-202-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-204-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-206-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-208-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-210-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-212-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-214-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-216-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-218-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-220-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-222-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-224-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline behavioral1/memory/1060-226-0x0000000007190000-0x00000000071CE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2736 ycke65qq88.exe 4800 urQT33ij66.exe 1060 wraA50wM92.exe 2376 xuoZ74EZ04.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urQT33ij66.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urQT33ij66.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycke65qq88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycke65qq88.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 528 4800 WerFault.exe 86 1868 1060 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4800 urQT33ij66.exe 4800 urQT33ij66.exe 1060 wraA50wM92.exe 1060 wraA50wM92.exe 2376 xuoZ74EZ04.exe 2376 xuoZ74EZ04.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4800 urQT33ij66.exe Token: SeDebugPrivilege 1060 wraA50wM92.exe Token: SeDebugPrivilege 2376 xuoZ74EZ04.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4476 wrote to memory of 2736 4476 7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe 85 PID 4476 wrote to memory of 2736 4476 7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe 85 PID 4476 wrote to memory of 2736 4476 7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe 85 PID 2736 wrote to memory of 4800 2736 ycke65qq88.exe 86 PID 2736 wrote to memory of 4800 2736 ycke65qq88.exe 86 PID 2736 wrote to memory of 4800 2736 ycke65qq88.exe 86 PID 2736 wrote to memory of 1060 2736 ycke65qq88.exe 99 PID 2736 wrote to memory of 1060 2736 ycke65qq88.exe 99 PID 2736 wrote to memory of 1060 2736 ycke65qq88.exe 99 PID 4476 wrote to memory of 2376 4476 7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe 103 PID 4476 wrote to memory of 2376 4476 7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe 103 PID 4476 wrote to memory of 2376 4476 7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe"C:\Users\Admin\AppData\Local\Temp\7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycke65qq88.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycke65qq88.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urQT33ij66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urQT33ij66.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 10844⤵
- Program crash
PID:528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraA50wM92.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraA50wM92.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 14084⤵
- Program crash
PID:1868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuoZ74EZ04.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuoZ74EZ04.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4800 -ip 48001⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1060 -ip 10601⤵PID:4360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5aff2dc307092b58ea4f5930713705ae6
SHA1045719b66b014bb259c7f18394674270e2f1f47f
SHA256face10c16b25f11ec061d2db898009a0c6302b107525f69b33b39e556297a3c5
SHA5126743a6a0df5954f73ff4d54caee8dcb1d95a5effd740da0889204b67cfc1eedf9fb6d4e84f6bf5bd37f4f17fca94d9cba3bacf4bb21857592ded7903f8f6438a
-
Filesize
175KB
MD5aff2dc307092b58ea4f5930713705ae6
SHA1045719b66b014bb259c7f18394674270e2f1f47f
SHA256face10c16b25f11ec061d2db898009a0c6302b107525f69b33b39e556297a3c5
SHA5126743a6a0df5954f73ff4d54caee8dcb1d95a5effd740da0889204b67cfc1eedf9fb6d4e84f6bf5bd37f4f17fca94d9cba3bacf4bb21857592ded7903f8f6438a
-
Filesize
548KB
MD55ba3294247d435017f364004cf99cb9d
SHA120c9345dfd3858c206e75c4cc869bf8a7af7b355
SHA256c6364c818f2c407cad10f3a61422c17332ffa7c69a68c9850f85d079b7abf316
SHA512f42b7d1d1995fc49cceae61a4cfb396df26d8f4efb36dac94635660d143423a21466d2fab5b1e3972615e5f8b0aaf387fe0cd172114c77f91b0e8040b0597370
-
Filesize
548KB
MD55ba3294247d435017f364004cf99cb9d
SHA120c9345dfd3858c206e75c4cc869bf8a7af7b355
SHA256c6364c818f2c407cad10f3a61422c17332ffa7c69a68c9850f85d079b7abf316
SHA512f42b7d1d1995fc49cceae61a4cfb396df26d8f4efb36dac94635660d143423a21466d2fab5b1e3972615e5f8b0aaf387fe0cd172114c77f91b0e8040b0597370
-
Filesize
352KB
MD56345b3da7da3d9a3012ba87a252a29f6
SHA1a36f23e5d0802652705df132bce0a8589ff5e7bf
SHA256caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df
SHA5123d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82
-
Filesize
352KB
MD56345b3da7da3d9a3012ba87a252a29f6
SHA1a36f23e5d0802652705df132bce0a8589ff5e7bf
SHA256caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df
SHA5123d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82
-
Filesize
410KB
MD5cc1e39c942634bbd04ef3eb880af3cb4
SHA1390ee64e70074c204d8c7fc736e69b91940375bc
SHA25698f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec
SHA512f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2
-
Filesize
410KB
MD5cc1e39c942634bbd04ef3eb880af3cb4
SHA1390ee64e70074c204d8c7fc736e69b91940375bc
SHA25698f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec
SHA512f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2