Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe
Resource
win10v2004-20230221-en
General
-
Target
57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe
-
Size
555KB
-
MD5
e5384d2cb4f371feac94919c996ca6da
-
SHA1
5e9d085bab7f60b2f3abdd42d52ba30cbcff461a
-
SHA256
57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43
-
SHA512
8ee9a161e1ee52fea641bcd7355f622f217c0b41175b2e48052bdb4dc9938536fb0e65e7a8456ab7bf5775bce3b8c48da942bc4dadb3207878ac4e9c516dd783
-
SSDEEP
12288:GMroy90bX8bUVuPtkKHtAL/81sHGsdrsg+INUSF+x9TrC5:Gy+VotkStAA1s9F+5SITu5
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw71uQ01BX11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw71uQ01BX11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw71uQ01BX11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw71uQ01BX11.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw71uQ01BX11.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw71uQ01BX11.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/2832-156-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-159-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-157-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-161-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-163-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-165-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-169-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-171-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-167-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-173-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-175-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-177-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-179-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-183-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-181-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-185-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-187-0x0000000004CF0000-0x0000000004D00000-memory.dmp family_redline behavioral1/memory/2832-189-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-193-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-191-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-195-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-197-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-199-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-201-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-203-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-205-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-207-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-209-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-211-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-213-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-215-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-217-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-219-0x0000000007750000-0x000000000778E000-memory.dmp family_redline behavioral1/memory/2832-221-0x0000000007750000-0x000000000778E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2440 vkNR0761Xz.exe 1932 sw71uQ01BX11.exe 2832 tkpL86Ur79zK.exe 2960 upVh46Yi96QZ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw71uQ01BX11.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vkNR0761Xz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkNR0761Xz.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2096 2832 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1932 sw71uQ01BX11.exe 1932 sw71uQ01BX11.exe 2832 tkpL86Ur79zK.exe 2832 tkpL86Ur79zK.exe 2960 upVh46Yi96QZ.exe 2960 upVh46Yi96QZ.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1932 sw71uQ01BX11.exe Token: SeDebugPrivilege 2832 tkpL86Ur79zK.exe Token: SeDebugPrivilege 2960 upVh46Yi96QZ.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2440 2304 57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe 86 PID 2304 wrote to memory of 2440 2304 57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe 86 PID 2304 wrote to memory of 2440 2304 57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe 86 PID 2440 wrote to memory of 1932 2440 vkNR0761Xz.exe 87 PID 2440 wrote to memory of 1932 2440 vkNR0761Xz.exe 87 PID 2440 wrote to memory of 2832 2440 vkNR0761Xz.exe 93 PID 2440 wrote to memory of 2832 2440 vkNR0761Xz.exe 93 PID 2440 wrote to memory of 2832 2440 vkNR0761Xz.exe 93 PID 2304 wrote to memory of 2960 2304 57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe 97 PID 2304 wrote to memory of 2960 2304 57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe 97 PID 2304 wrote to memory of 2960 2304 57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe"C:\Users\Admin\AppData\Local\Temp\57a7a1843876f34f2b03259d36107b61519d9d115637d4df4adaaae0e2ba7d43.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkNR0761Xz.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkNR0761Xz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw71uQ01BX11.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw71uQ01BX11.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkpL86Ur79zK.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkpL86Ur79zK.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 13964⤵
- Program crash
PID:2096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upVh46Yi96QZ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upVh46Yi96QZ.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2832 -ip 28321⤵PID:3652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5585cec91521ce98dd2ed5bd0666136b4
SHA1a13055a9f40435f77062f1accf79b7ee61639c88
SHA256b0e5fc35fe082d1373afc0e8cf510482e09a124be4611e8b91a2cb2db58b03ef
SHA51230f5b4c7d37912f6a7027675378ab97105d9b373adc3293b070e8f2a9efa0914af2804be1c79253aa10b1578466f141f51c4244e907bbe9446c265f9e8e2a871
-
Filesize
175KB
MD5585cec91521ce98dd2ed5bd0666136b4
SHA1a13055a9f40435f77062f1accf79b7ee61639c88
SHA256b0e5fc35fe082d1373afc0e8cf510482e09a124be4611e8b91a2cb2db58b03ef
SHA51230f5b4c7d37912f6a7027675378ab97105d9b373adc3293b070e8f2a9efa0914af2804be1c79253aa10b1578466f141f51c4244e907bbe9446c265f9e8e2a871
-
Filesize
411KB
MD5febdb9e77c153a36fdcf3dfe77141dfd
SHA1737afad2d0f70fbffa163c6558a87417e2300d1c
SHA256e31a82c1c40c40dd86cd27dccbc503cf8ca08d45c2de8572a351a563cf4fc0f3
SHA51203b4a76d7150cd944df94c0aaa2133b90a9ec6b62dfee77e21f15b99aa62eae00180f6021bdf646b9097119c0df6eab9a4325c41b402f3a5b654a78836ce44f8
-
Filesize
411KB
MD5febdb9e77c153a36fdcf3dfe77141dfd
SHA1737afad2d0f70fbffa163c6558a87417e2300d1c
SHA256e31a82c1c40c40dd86cd27dccbc503cf8ca08d45c2de8572a351a563cf4fc0f3
SHA51203b4a76d7150cd944df94c0aaa2133b90a9ec6b62dfee77e21f15b99aa62eae00180f6021bdf646b9097119c0df6eab9a4325c41b402f3a5b654a78836ce44f8
-
Filesize
17KB
MD5f561b4450c5681a56c3f2683075e2810
SHA15f3936126827eb89f574db4c36015fff69645d9b
SHA256f04acf6cc1fb1046dc90899352e7bb36f6bc13af9e4dc175abec23de46625a5c
SHA5120398556c49ba7843f3ec8178528c6776b5dc21e5eb102f591af704dd662857135ae1f05b7e04fc0c32cc19deba444bca60319ca6ff626d75a477a2fac524531c
-
Filesize
17KB
MD5f561b4450c5681a56c3f2683075e2810
SHA15f3936126827eb89f574db4c36015fff69645d9b
SHA256f04acf6cc1fb1046dc90899352e7bb36f6bc13af9e4dc175abec23de46625a5c
SHA5120398556c49ba7843f3ec8178528c6776b5dc21e5eb102f591af704dd662857135ae1f05b7e04fc0c32cc19deba444bca60319ca6ff626d75a477a2fac524531c
-
Filesize
410KB
MD5dd957a86774a219d7a7c1dc3b2f39fdc
SHA144158d89d13015254526a17a20a65a3ddd05e85c
SHA256e154068bcbd7ab9a1ad782314383ff0f4bdef76b23ed99aded1f7260c61230cb
SHA512a6e615f934c7775ff4e227642506e0effb2a1f015c8edee62ab518c8c3d3bbfc591ac01b541dc6a0ef8efb581bb3c5c722ed9a6d437839f28f88829a1b8233fc
-
Filesize
410KB
MD5dd957a86774a219d7a7c1dc3b2f39fdc
SHA144158d89d13015254526a17a20a65a3ddd05e85c
SHA256e154068bcbd7ab9a1ad782314383ff0f4bdef76b23ed99aded1f7260c61230cb
SHA512a6e615f934c7775ff4e227642506e0effb2a1f015c8edee62ab518c8c3d3bbfc591ac01b541dc6a0ef8efb581bb3c5c722ed9a6d437839f28f88829a1b8233fc