Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2023, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe
Resource
win10v2004-20230220-en
General
-
Target
50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe
-
Size
526KB
-
MD5
6e4a4fd89a439b8a7206438652275c8d
-
SHA1
1d807090fa108056c9d9016c873b2e2de5347c87
-
SHA256
50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7
-
SHA512
3f7e9b20d13febad7da1349433280e4a83c69291e20344d83b3964758e13b2de2382fca373123c69be58d43e92332b70dc12b04a093c950987077e89538c9f08
-
SSDEEP
12288:gMrdy90IYCLd4Nrvcx7eH2KutT1ZyVYN5Jp7:Ny4CLdaLWKKwuTp7
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf56Kw06Um84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf56Kw06Um84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf56Kw06Um84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf56Kw06Um84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf56Kw06Um84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf56Kw06Um84.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/1564-155-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-156-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-163-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-159-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-165-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-167-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-169-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-171-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-173-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-175-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-177-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-179-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-181-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-183-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-185-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-189-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-191-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-187-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-193-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-195-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-199-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-197-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-201-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-203-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-205-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-207-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-209-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-211-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-213-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-215-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-217-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-219-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-221-0x00000000050F0000-0x000000000512E000-memory.dmp family_redline behavioral1/memory/1564-1072-0x0000000002240000-0x0000000002250000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2140 vhJH5737mL.exe 1604 sf56Kw06Um84.exe 1564 tf27HG89of88.exe 3480 uhJs01Bg34UQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf56Kw06Um84.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhJH5737mL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhJH5737mL.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1668 1564 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1604 sf56Kw06Um84.exe 1604 sf56Kw06Um84.exe 1564 tf27HG89of88.exe 1564 tf27HG89of88.exe 3480 uhJs01Bg34UQ.exe 3480 uhJs01Bg34UQ.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1604 sf56Kw06Um84.exe Token: SeDebugPrivilege 1564 tf27HG89of88.exe Token: SeDebugPrivilege 3480 uhJs01Bg34UQ.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1552 wrote to memory of 2140 1552 50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe 83 PID 1552 wrote to memory of 2140 1552 50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe 83 PID 1552 wrote to memory of 2140 1552 50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe 83 PID 2140 wrote to memory of 1604 2140 vhJH5737mL.exe 84 PID 2140 wrote to memory of 1604 2140 vhJH5737mL.exe 84 PID 2140 wrote to memory of 1564 2140 vhJH5737mL.exe 90 PID 2140 wrote to memory of 1564 2140 vhJH5737mL.exe 90 PID 2140 wrote to memory of 1564 2140 vhJH5737mL.exe 90 PID 1552 wrote to memory of 3480 1552 50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe 96 PID 1552 wrote to memory of 3480 1552 50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe 96 PID 1552 wrote to memory of 3480 1552 50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe"C:\Users\Admin\AppData\Local\Temp\50f4f989e4b657e02224738e464f133f5898c16e8a5b90be7c984075b2eb27d7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhJH5737mL.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhJH5737mL.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf56Kw06Um84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf56Kw06Um84.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf27HG89of88.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf27HG89of88.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 13484⤵
- Program crash
PID:1668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhJs01Bg34UQ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhJs01Bg34UQ.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1564 -ip 15641⤵PID:3316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5208f6912c1a8b44cbdf1acefe3e3cf75
SHA1523410b55205fa12ae23b62a18262c6d71cae217
SHA2560fbf3c8c49f13cfa6399b170439874f97cbed5a62d2b5647fe2f2747bd9df6b7
SHA5128372bd0a31e1839ab10efb39002ee096ab18d9b0f6c476ff7949bb63a9699c5207bd8cd7115db3fd422c7df05ef344d40a26108c8962b4750fc3c66c567dc12d
-
Filesize
175KB
MD5208f6912c1a8b44cbdf1acefe3e3cf75
SHA1523410b55205fa12ae23b62a18262c6d71cae217
SHA2560fbf3c8c49f13cfa6399b170439874f97cbed5a62d2b5647fe2f2747bd9df6b7
SHA5128372bd0a31e1839ab10efb39002ee096ab18d9b0f6c476ff7949bb63a9699c5207bd8cd7115db3fd422c7df05ef344d40a26108c8962b4750fc3c66c567dc12d
-
Filesize
381KB
MD5573202e4aa102acc99fe364b9cade74c
SHA126b683b4ac762486a8f1da7e5d5a60c2d0960128
SHA2564b4bb34689f6893d2f460c3211b5af95e46a83be34ef0b8ad742aa14eafad428
SHA512bcd0e5bdf18b7848181af7f586ca0fa6f56c817427f789156120d967ba363a59060b15fe2445d73a984017e68c5e6ac9f741023794bcd20777ce123ec525058a
-
Filesize
381KB
MD5573202e4aa102acc99fe364b9cade74c
SHA126b683b4ac762486a8f1da7e5d5a60c2d0960128
SHA2564b4bb34689f6893d2f460c3211b5af95e46a83be34ef0b8ad742aa14eafad428
SHA512bcd0e5bdf18b7848181af7f586ca0fa6f56c817427f789156120d967ba363a59060b15fe2445d73a984017e68c5e6ac9f741023794bcd20777ce123ec525058a
-
Filesize
11KB
MD5196b6f6a3f018793a27516ce66aab9d3
SHA14efc104dc1e8801215c8416c158f84aaef37d8be
SHA25698334b644bcd77acf7abafdb3d47d9a1652a93dc4d2f05df206a20bdf2bb27b2
SHA512effcfd6a1857bcd08e4732ba145c20bf4d1001716b9b3a22fd4f172f13757c84daab26d6ad766103b5721b2747e36686ee7a58620449fff4580271444bd6eee0
-
Filesize
11KB
MD5196b6f6a3f018793a27516ce66aab9d3
SHA14efc104dc1e8801215c8416c158f84aaef37d8be
SHA25698334b644bcd77acf7abafdb3d47d9a1652a93dc4d2f05df206a20bdf2bb27b2
SHA512effcfd6a1857bcd08e4732ba145c20bf4d1001716b9b3a22fd4f172f13757c84daab26d6ad766103b5721b2747e36686ee7a58620449fff4580271444bd6eee0
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72
-
Filesize
292KB
MD5bd407beaed8912f6f9f5b269e5a85686
SHA1f9d8fc6c0a1ca9a1e0af1ca278f629994df04b1b
SHA2563fb5f126878146985387aac28dc8b1c17d8ee6ae3630a0c754c135138180d367
SHA51279eca3bfa76f241986888271cbcf4858a6eb2c729b1dbebcf000ae13b9fb1e981360c930e40c39437c027794ecce33d9302e6db93d65208ad6bb458aa1b2ff72