Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2023, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe
Resource
win10v2004-20230221-en
General
-
Target
55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe
-
Size
529KB
-
MD5
c03380a08757332d65b394750f91a03d
-
SHA1
5091030b592eea675b2f8dddb137bee5acc8bfd7
-
SHA256
55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f
-
SHA512
4cd69583da452853f041887c2ee768baa987c3e4f47e44271f97ca5a4a1bd340bb4512ddadf48862b6190b9e3d49184dd0e7a013bb2b782b40d01a722d1faaae
-
SSDEEP
12288:bMrfy90F5p6ZlCuIRA8iehLel28RQkg/rvQNZR:QyA5pSCBCrehLelzqvEZR
Malware Config
Extracted
redline
rulit
pedigj.eu:4162
-
auth_value
f4df9ef56871d4ac883b282abaf635e0
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf70gf15oY20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf70gf15oY20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf70gf15oY20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf70gf15oY20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf70gf15oY20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf70gf15oY20.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/5084-158-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-159-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-161-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-163-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-165-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-167-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-169-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-171-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-173-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-175-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-177-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-179-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-181-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-183-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-185-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-187-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-189-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-191-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-193-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-197-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-195-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-199-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-201-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-203-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-205-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-207-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-209-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-211-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-213-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-215-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-217-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-219-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5084-221-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2572 vhNt3677BW.exe 1372 sf70gf15oY20.exe 5084 tf35Uw41EO94.exe 2580 uhZC97fR93lZ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf70gf15oY20.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhNt3677BW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhNt3677BW.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5012 5084 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1372 sf70gf15oY20.exe 1372 sf70gf15oY20.exe 5084 tf35Uw41EO94.exe 5084 tf35Uw41EO94.exe 2580 uhZC97fR93lZ.exe 2580 uhZC97fR93lZ.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1372 sf70gf15oY20.exe Token: SeDebugPrivilege 5084 tf35Uw41EO94.exe Token: SeDebugPrivilege 2580 uhZC97fR93lZ.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4780 wrote to memory of 2572 4780 55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe 85 PID 4780 wrote to memory of 2572 4780 55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe 85 PID 4780 wrote to memory of 2572 4780 55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe 85 PID 2572 wrote to memory of 1372 2572 vhNt3677BW.exe 86 PID 2572 wrote to memory of 1372 2572 vhNt3677BW.exe 86 PID 2572 wrote to memory of 5084 2572 vhNt3677BW.exe 97 PID 2572 wrote to memory of 5084 2572 vhNt3677BW.exe 97 PID 2572 wrote to memory of 5084 2572 vhNt3677BW.exe 97 PID 4780 wrote to memory of 2580 4780 55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe 102 PID 4780 wrote to memory of 2580 4780 55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe 102 PID 4780 wrote to memory of 2580 4780 55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe"C:\Users\Admin\AppData\Local\Temp\55a683513b1912b107bd7378feb9e82ba43cefc3d4d9b1427f88349aa6ed152f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhNt3677BW.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhNt3677BW.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf70gf15oY20.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf70gf15oY20.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf35Uw41EO94.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf35Uw41EO94.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 16044⤵
- Program crash
PID:5012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhZC97fR93lZ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhZC97fR93lZ.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5084 -ip 50841⤵PID:212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b060f8b79e8314205889a7f7472c0f99
SHA11b0d30a26a848c628d56952b366f5ef6bc8544bd
SHA25626b591919dd56618debd75b42e733ddf15d44ea24002e1a658529c2014cbef5a
SHA5125cba2545c28f358ed68bd7991b780203647a7934138e6955c5522261fb68b26a68622edfe6d6f3c3ceeb76395a3dc55aad1bb52829282f31f37874c5e9e0c44c
-
Filesize
175KB
MD5b060f8b79e8314205889a7f7472c0f99
SHA11b0d30a26a848c628d56952b366f5ef6bc8544bd
SHA25626b591919dd56618debd75b42e733ddf15d44ea24002e1a658529c2014cbef5a
SHA5125cba2545c28f358ed68bd7991b780203647a7934138e6955c5522261fb68b26a68622edfe6d6f3c3ceeb76395a3dc55aad1bb52829282f31f37874c5e9e0c44c
-
Filesize
385KB
MD5d704129c756203d44a9f1e7732560890
SHA1e2c65ec33aea6129b9c93ba764f105f37e66a426
SHA2569febb7c674b3f933ebddea0dfcd82b5e13dd6eb63d387899c951e347c9145798
SHA51275af8e089ca388712338871897c595e6aee1c06eebf790f9541d599094e436161dc9e79402ab035ceb364c3b1519d1ed6cf7116eb0c2f896ca6e4d851280af42
-
Filesize
385KB
MD5d704129c756203d44a9f1e7732560890
SHA1e2c65ec33aea6129b9c93ba764f105f37e66a426
SHA2569febb7c674b3f933ebddea0dfcd82b5e13dd6eb63d387899c951e347c9145798
SHA51275af8e089ca388712338871897c595e6aee1c06eebf790f9541d599094e436161dc9e79402ab035ceb364c3b1519d1ed6cf7116eb0c2f896ca6e4d851280af42
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
293KB
MD5ba27de08c518617ba15853a0f54717dd
SHA14f580231136fbbed921ac592a61a15be24b7d3bd
SHA25635486d1f9ba6027805e7f437b7de245dbc75b6158001028ef162f4afcb1e256c
SHA5128f60ca7fef2432843df136a0cc93b0b5ff650a130af00ae0ee28818da8f42886225f082ae4a71c33818d4d48e4eebbce86a6325c6a9181119919ea5dd2e2141c
-
Filesize
293KB
MD5ba27de08c518617ba15853a0f54717dd
SHA14f580231136fbbed921ac592a61a15be24b7d3bd
SHA25635486d1f9ba6027805e7f437b7de245dbc75b6158001028ef162f4afcb1e256c
SHA5128f60ca7fef2432843df136a0cc93b0b5ff650a130af00ae0ee28818da8f42886225f082ae4a71c33818d4d48e4eebbce86a6325c6a9181119919ea5dd2e2141c