Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe
Resource
win10v2004-20230220-en
General
-
Target
74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe
-
Size
694KB
-
MD5
b5b28a29864da3f471c40f4150b5c145
-
SHA1
c992401ac17883a5147025706b2ca1ed2916ef52
-
SHA256
74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010
-
SHA512
56cbd73a537308ba4e605eecbbc900200cb4e193c24fd5f5be087501e00e83d50b2ca751f9542ea3d8165a8865595508b12aa332daede5bb1c2555938fa8f1a4
-
SSDEEP
12288:oMrOy90leU0VFU2PflrNkGyOk0xbC+9hqmw/TE8dTNIYHL:2yUKVFVP9JkGyOXgJx5L
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urcf56vD90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urcf56vD90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urcf56vD90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urcf56vD90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urcf56vD90.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection urcf56vD90.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4400-192-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-193-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-195-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-197-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-199-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-201-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-203-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-205-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-209-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-207-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-211-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-215-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-213-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-217-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-219-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-221-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-223-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline behavioral1/memory/4400-225-0x0000000004C20000-0x0000000004C5E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4820 ycZC40gT63.exe 4832 urcf56vD90.exe 4400 wrel57Kg26.exe 4108 xuCU03VW44.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urcf56vD90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urcf56vD90.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycZC40gT63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycZC40gT63.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1288 4832 WerFault.exe 87 3372 4400 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4832 urcf56vD90.exe 4832 urcf56vD90.exe 4400 wrel57Kg26.exe 4400 wrel57Kg26.exe 4108 xuCU03VW44.exe 4108 xuCU03VW44.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4832 urcf56vD90.exe Token: SeDebugPrivilege 4400 wrel57Kg26.exe Token: SeDebugPrivilege 4108 xuCU03VW44.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3180 wrote to memory of 4820 3180 74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe 86 PID 3180 wrote to memory of 4820 3180 74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe 86 PID 3180 wrote to memory of 4820 3180 74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe 86 PID 4820 wrote to memory of 4832 4820 ycZC40gT63.exe 87 PID 4820 wrote to memory of 4832 4820 ycZC40gT63.exe 87 PID 4820 wrote to memory of 4832 4820 ycZC40gT63.exe 87 PID 4820 wrote to memory of 4400 4820 ycZC40gT63.exe 93 PID 4820 wrote to memory of 4400 4820 ycZC40gT63.exe 93 PID 4820 wrote to memory of 4400 4820 ycZC40gT63.exe 93 PID 3180 wrote to memory of 4108 3180 74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe 97 PID 3180 wrote to memory of 4108 3180 74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe 97 PID 3180 wrote to memory of 4108 3180 74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe"C:\Users\Admin\AppData\Local\Temp\74c9111723d8381390bd276efe5fba3b942d6bd53f1a6abab63258c9327ba010.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycZC40gT63.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycZC40gT63.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urcf56vD90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urcf56vD90.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 10804⤵
- Program crash
PID:1288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrel57Kg26.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrel57Kg26.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 14084⤵
- Program crash
PID:3372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuCU03VW44.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuCU03VW44.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4832 -ip 48321⤵PID:528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4400 -ip 44001⤵PID:844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD559c4c1bc546e6704a2c74a168ba05207
SHA19756cb356a84291ecc4e0abcc5cba7087a2a01dd
SHA256b1ba79fd46f2060b5047891cabb428dfdd04cd8ab4b72f9664c2561a99a6b1fd
SHA5128eec61c928dc0cfd776a80a61e3882937c0a1db42c07ca55f1f178e3da8a4e8bec11f85e1856b92a958051af2a9fe67a61797d91b7c6aa408f1a69105f1c646c
-
Filesize
175KB
MD559c4c1bc546e6704a2c74a168ba05207
SHA19756cb356a84291ecc4e0abcc5cba7087a2a01dd
SHA256b1ba79fd46f2060b5047891cabb428dfdd04cd8ab4b72f9664c2561a99a6b1fd
SHA5128eec61c928dc0cfd776a80a61e3882937c0a1db42c07ca55f1f178e3da8a4e8bec11f85e1856b92a958051af2a9fe67a61797d91b7c6aa408f1a69105f1c646c
-
Filesize
550KB
MD57c3e56f336c83e99321178f8a011d467
SHA11eea1e295e2b9c7affb5656db6367d07695e4b69
SHA25687b85255ddf1768f0052f88c5457f34d9ef147610679384a2b6e625b175a73d2
SHA512889055c3250a4625526fd8793471a7442b998fa1cea39ea7b63e974fa68cbe1f7a8f5771c3ec812ff897950baa3d074d1bd6885c3beb5d1f385864ced2daa43f
-
Filesize
550KB
MD57c3e56f336c83e99321178f8a011d467
SHA11eea1e295e2b9c7affb5656db6367d07695e4b69
SHA25687b85255ddf1768f0052f88c5457f34d9ef147610679384a2b6e625b175a73d2
SHA512889055c3250a4625526fd8793471a7442b998fa1cea39ea7b63e974fa68cbe1f7a8f5771c3ec812ff897950baa3d074d1bd6885c3beb5d1f385864ced2daa43f
-
Filesize
352KB
MD5946e45ca9ca57dbee2abd7de33d70086
SHA19003d342bb7b083b73c7b67e3a8059e1826d9695
SHA256aa2990a947b4f237d68abb0193d1da436930d427eced5942132bd24fd0bd3bd9
SHA51200743633925a810ce584991704d25034fd3d407838b245d456da54572b3558589acfa5dcbabf9ab09621f143dfc78767cfc979c18346a1e6baa55648405c8c3d
-
Filesize
352KB
MD5946e45ca9ca57dbee2abd7de33d70086
SHA19003d342bb7b083b73c7b67e3a8059e1826d9695
SHA256aa2990a947b4f237d68abb0193d1da436930d427eced5942132bd24fd0bd3bd9
SHA51200743633925a810ce584991704d25034fd3d407838b245d456da54572b3558589acfa5dcbabf9ab09621f143dfc78767cfc979c18346a1e6baa55648405c8c3d
-
Filesize
410KB
MD597581d18424b6968bffda63f4e27c2b0
SHA1501bc8daae8308a502ceae32244e79e55d2282c3
SHA25699908812a3e7d39049e6a424c5eaed09d067384e8997d55ea8804be915a6df30
SHA512bb82a81e022d658c76192e97266feec3731260ac514f7f0c12ee96a9a81c8947c7ac756969b3671c1eef648a69f3bb39ec0fb3fb4cd4d0de272d3f2aeec2b1ba
-
Filesize
410KB
MD597581d18424b6968bffda63f4e27c2b0
SHA1501bc8daae8308a502ceae32244e79e55d2282c3
SHA25699908812a3e7d39049e6a424c5eaed09d067384e8997d55ea8804be915a6df30
SHA512bb82a81e022d658c76192e97266feec3731260ac514f7f0c12ee96a9a81c8947c7ac756969b3671c1eef648a69f3bb39ec0fb3fb4cd4d0de272d3f2aeec2b1ba