Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2023, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe
Resource
win10v2004-20230220-en
General
-
Target
a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe
-
Size
546KB
-
MD5
84a11d1f4c08385476b80871e995b8e5
-
SHA1
0b14924d32ea111e4ed52af7b792b69148bcdf22
-
SHA256
a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0
-
SHA512
c6f8ae007887cac65df06e32cf91c4d22fd397f100283c2f0fdb08f0db42e5a23e6284a0731a09fc48949dfefec7d8ac24977e352fd8710799260fa75e4278aa
-
SSDEEP
12288:jMrky90b3EC9+l0GMpbAxoioOZajggcQUbsIiPw3lHME4ziOVBNEBl:HyIEVlcbXior/bUbMw/4zFEBl
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Extracted
redline
foksa
hueref.eu:4162
-
auth_value
6a9b2601a21672b285de3ed41b5402e4
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw96Kw29vY66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw96Kw29vY66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw96Kw29vY66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw96Kw29vY66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw96Kw29vY66.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw96Kw29vY66.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/848-158-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-159-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-161-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-163-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-165-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-167-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-169-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-171-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-173-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-175-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-177-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-179-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-181-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-183-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-185-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-187-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-189-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-191-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-193-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-195-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-197-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-199-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-201-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-203-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-205-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-207-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-209-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-211-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-213-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-215-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-217-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-219-0x0000000002830000-0x000000000286E000-memory.dmp family_redline behavioral1/memory/848-221-0x0000000002830000-0x000000000286E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1300 vkqO4446yL.exe 3988 sw96Kw29vY66.exe 848 tkmd61bP43lq.exe 1428 upZH58rH68gc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw96Kw29vY66.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vkqO4446yL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vkqO4446yL.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5044 848 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3988 sw96Kw29vY66.exe 3988 sw96Kw29vY66.exe 848 tkmd61bP43lq.exe 848 tkmd61bP43lq.exe 1428 upZH58rH68gc.exe 1428 upZH58rH68gc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3988 sw96Kw29vY66.exe Token: SeDebugPrivilege 848 tkmd61bP43lq.exe Token: SeDebugPrivilege 1428 upZH58rH68gc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1300 3036 a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe 86 PID 3036 wrote to memory of 1300 3036 a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe 86 PID 3036 wrote to memory of 1300 3036 a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe 86 PID 1300 wrote to memory of 3988 1300 vkqO4446yL.exe 87 PID 1300 wrote to memory of 3988 1300 vkqO4446yL.exe 87 PID 1300 wrote to memory of 848 1300 vkqO4446yL.exe 93 PID 1300 wrote to memory of 848 1300 vkqO4446yL.exe 93 PID 1300 wrote to memory of 848 1300 vkqO4446yL.exe 93 PID 3036 wrote to memory of 1428 3036 a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe 97 PID 3036 wrote to memory of 1428 3036 a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe 97 PID 3036 wrote to memory of 1428 3036 a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe"C:\Users\Admin\AppData\Local\Temp\a9ce2c4a6e29e0e27f030e06f3d5c6f8fae435e699a163d33413f14f3c5919c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkqO4446yL.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vkqO4446yL.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw96Kw29vY66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw96Kw29vY66.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkmd61bP43lq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkmd61bP43lq.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 14124⤵
- Program crash
PID:5044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upZH58rH68gc.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\upZH58rH68gc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 848 -ip 8481⤵PID:4640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
175KB
MD575ced8ad0d8cd237ebc9cb7b00852651
SHA1adab63df3e0a40fd9f170ab57da66f01f226141c
SHA256a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819
SHA512f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431
-
Filesize
401KB
MD59953b9ec5e0b53018eabcbd59c158794
SHA1f29dde50610f5c7fd64b3b34325074fa794c1181
SHA25656256dfe57cdd8561532733dbe43bc69c6312b2e5aa44e9b81452c0fe2454e6f
SHA5123d6e95b1ddee99f20be5d88e07dbd94efe19c5fa73bdba2a0b49161a486b53989707f2e102d3223e2394f9f2563e4e215fce2994a28368e7c207232d0a6d304b
-
Filesize
401KB
MD59953b9ec5e0b53018eabcbd59c158794
SHA1f29dde50610f5c7fd64b3b34325074fa794c1181
SHA25656256dfe57cdd8561532733dbe43bc69c6312b2e5aa44e9b81452c0fe2454e6f
SHA5123d6e95b1ddee99f20be5d88e07dbd94efe19c5fa73bdba2a0b49161a486b53989707f2e102d3223e2394f9f2563e4e215fce2994a28368e7c207232d0a6d304b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
315KB
MD557b733a273d864562d577e2da325caef
SHA1d8226b21840894177597d76c9109f8d5a6e2ff8d
SHA256369dc44660b6cc48f11f43ff7b8c77c48718097f739f1b5ca2a0531ed018e410
SHA51220f1e6715f6dbe51229ee0d353bd6710f255e7a7d8150225147f4d55731a39d603a63b89c76135a197cbc9775d7ab56c44deeb8874fd05d808a6d8105f3691f4
-
Filesize
315KB
MD557b733a273d864562d577e2da325caef
SHA1d8226b21840894177597d76c9109f8d5a6e2ff8d
SHA256369dc44660b6cc48f11f43ff7b8c77c48718097f739f1b5ca2a0531ed018e410
SHA51220f1e6715f6dbe51229ee0d353bd6710f255e7a7d8150225147f4d55731a39d603a63b89c76135a197cbc9775d7ab56c44deeb8874fd05d808a6d8105f3691f4