Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2023, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe
Resource
win10v2004-20230221-en
General
-
Target
38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe
-
Size
530KB
-
MD5
eac8730d07e3c1ea76b788fd43c1f02f
-
SHA1
6d0d3f2f3e8b20a596c756b345c0aa9bd0403d8d
-
SHA256
38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475
-
SHA512
57a340ffa4a58f3378583ea624abee8d23e9675c7e99b107211dd8a319613199b84c3ca5b71d484b13da9f261e3b732c7b403e95cc12c1d5036055674e3da5de
-
SSDEEP
12288:ZMrDy90RPoyVPjSMYN+jkXJWZ9DomoFNNeMRJ05iDdx/:6yUP7V1YNLXJk9om+7Ks
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf88iW42Ts43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf88iW42Ts43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf88iW42Ts43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf88iW42Ts43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf88iW42Ts43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf88iW42Ts43.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3736-158-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-161-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-159-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-163-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-165-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-167-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-169-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-171-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-173-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-175-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-177-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-179-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-181-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-183-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-185-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-187-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-189-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-191-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-193-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-195-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-197-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-199-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-201-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-203-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-205-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-207-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-209-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-211-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-213-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-215-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-217-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-219-0x0000000002730000-0x000000000276E000-memory.dmp family_redline behavioral1/memory/3736-221-0x0000000002730000-0x000000000276E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1820 vhML6122hO.exe 2768 sf88iW42Ts43.exe 3736 tf61cv17eK81.exe 2320 uhox94Fj37qm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf88iW42Ts43.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhML6122hO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhML6122hO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4944 3736 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2768 sf88iW42Ts43.exe 2768 sf88iW42Ts43.exe 3736 tf61cv17eK81.exe 3736 tf61cv17eK81.exe 2320 uhox94Fj37qm.exe 2320 uhox94Fj37qm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2768 sf88iW42Ts43.exe Token: SeDebugPrivilege 3736 tf61cv17eK81.exe Token: SeDebugPrivilege 2320 uhox94Fj37qm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1820 2912 38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe 86 PID 2912 wrote to memory of 1820 2912 38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe 86 PID 2912 wrote to memory of 1820 2912 38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe 86 PID 1820 wrote to memory of 2768 1820 vhML6122hO.exe 87 PID 1820 wrote to memory of 2768 1820 vhML6122hO.exe 87 PID 1820 wrote to memory of 3736 1820 vhML6122hO.exe 92 PID 1820 wrote to memory of 3736 1820 vhML6122hO.exe 92 PID 1820 wrote to memory of 3736 1820 vhML6122hO.exe 92 PID 2912 wrote to memory of 2320 2912 38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe 96 PID 2912 wrote to memory of 2320 2912 38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe 96 PID 2912 wrote to memory of 2320 2912 38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe"C:\Users\Admin\AppData\Local\Temp\38eaf1898e347d6a1d43f148cfbca8d6c165f3bf633c7d30fa95679e21d76475.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhML6122hO.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhML6122hO.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf88iW42Ts43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf88iW42Ts43.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf61cv17eK81.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf61cv17eK81.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 18284⤵
- Program crash
PID:4944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhox94Fj37qm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhox94Fj37qm.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3736 -ip 37361⤵PID:1828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fbafc5a3576d3260291f0bb47a96e778
SHA1906b73e67cf237284fd09ad69be04e5badca3c4a
SHA256371da714906533a952ae854ee20206346eecc3c6d43470fe7e694980af5054e7
SHA5120b21e542af8261f4e9a2aad94f0b227e5e34cbfbf8038bb2bf12eac69bf022b151141db0bbb9c51c7e29b402b9bbc1e81f3bd7c474936b9b77d76d0d30325bad
-
Filesize
175KB
MD5fbafc5a3576d3260291f0bb47a96e778
SHA1906b73e67cf237284fd09ad69be04e5badca3c4a
SHA256371da714906533a952ae854ee20206346eecc3c6d43470fe7e694980af5054e7
SHA5120b21e542af8261f4e9a2aad94f0b227e5e34cbfbf8038bb2bf12eac69bf022b151141db0bbb9c51c7e29b402b9bbc1e81f3bd7c474936b9b77d76d0d30325bad
-
Filesize
385KB
MD5ddea0da11a40ee9eb5088c69b250efc4
SHA119d4f1b7271fce076741988376924e14186910c5
SHA256341f32abeba4841a883ebe9707b5270911a8b03c2f38d8688a21d2dc4fca0957
SHA51259b9f51e1e034cc62e097c2761b79214641f3a009c0340a2d7e68b8228d07105cb1bef0a0ad92eaa7cecad55323ec09df77f1ee53c560d51ac4ed05b9b5bdbcf
-
Filesize
385KB
MD5ddea0da11a40ee9eb5088c69b250efc4
SHA119d4f1b7271fce076741988376924e14186910c5
SHA256341f32abeba4841a883ebe9707b5270911a8b03c2f38d8688a21d2dc4fca0957
SHA51259b9f51e1e034cc62e097c2761b79214641f3a009c0340a2d7e68b8228d07105cb1bef0a0ad92eaa7cecad55323ec09df77f1ee53c560d51ac4ed05b9b5bdbcf
-
Filesize
11KB
MD56c786be394321f4c02f3835196cddcbc
SHA1b3376ebb0dc7ccb4b85ddb9d48e0e827a71e2957
SHA256f17606f1a31174c859e693c1421ebf8a3e4b1e0ff28d0c7009e1f6fbcd3ca00b
SHA51261c107dd7ab5d334eb31d8d8d8132d086450f79bbd8561e3bf94d5bbefcda7e5e3f4d120789666e92eddf8f70b9028c6adbc0b9d2e2131db3ae3009aed23c8f9
-
Filesize
11KB
MD56c786be394321f4c02f3835196cddcbc
SHA1b3376ebb0dc7ccb4b85ddb9d48e0e827a71e2957
SHA256f17606f1a31174c859e693c1421ebf8a3e4b1e0ff28d0c7009e1f6fbcd3ca00b
SHA51261c107dd7ab5d334eb31d8d8d8132d086450f79bbd8561e3bf94d5bbefcda7e5e3f4d120789666e92eddf8f70b9028c6adbc0b9d2e2131db3ae3009aed23c8f9
-
Filesize
294KB
MD5cdcef278fd567074f7fd62913f828c7f
SHA1f8f15924c0670526951bd988acd59ba3b0f95889
SHA256fdc600b7491c442a1c8538b09303b44c51fe3436671493cbc7ab0ca5bd512243
SHA51206d63079ba454a6f9d86208369ace8125db61e97d5dce25ca0a2e6c244403ff9ef7bed684c48592248273a5ffa5a79c56c4f2ce941fe2eb04800606072178d2d
-
Filesize
294KB
MD5cdcef278fd567074f7fd62913f828c7f
SHA1f8f15924c0670526951bd988acd59ba3b0f95889
SHA256fdc600b7491c442a1c8538b09303b44c51fe3436671493cbc7ab0ca5bd512243
SHA51206d63079ba454a6f9d86208369ace8125db61e97d5dce25ca0a2e6c244403ff9ef7bed684c48592248273a5ffa5a79c56c4f2ce941fe2eb04800606072178d2d