Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2023, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe
Resource
win10v2004-20230220-en
General
-
Target
f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe
-
Size
526KB
-
MD5
bdfa32d6ff3f8a09929cd5d2a29c9b76
-
SHA1
dc236a94d7bf45af931439c773278b5fce43b689
-
SHA256
f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f
-
SHA512
5f552f2babb146b0e56a2a8700a0e3e9f770595f3ff8fac33aef7a1512bfdc3d9b5689745a58f8a28581eaaf55e61b25d23dd0ca159323862d942aba9fe45359
-
SSDEEP
12288:UMrLy90bTt3sA0saZTVt9x0J/nUy4iNuoMkCyWk:Hyl/FZbc/UG/oA
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf10fb22sb62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf10fb22sb62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf10fb22sb62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf10fb22sb62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf10fb22sb62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf10fb22sb62.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/5116-158-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-156-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-161-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-163-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-165-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-167-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-169-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-171-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-173-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-175-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-177-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-179-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-181-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-183-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-185-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-187-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-189-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-191-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-193-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-195-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-197-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-199-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-201-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-203-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-205-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-207-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-209-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-211-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-213-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-215-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-217-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-219-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/5116-221-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4312 vhSl9816Kx.exe 3844 sf10fb22sb62.exe 5116 tf30Zu94Il92.exe 3044 uhNE29de43cn.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf10fb22sb62.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhSl9816Kx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhSl9816Kx.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 404 5116 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3844 sf10fb22sb62.exe 3844 sf10fb22sb62.exe 5116 tf30Zu94Il92.exe 5116 tf30Zu94Il92.exe 3044 uhNE29de43cn.exe 3044 uhNE29de43cn.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3844 sf10fb22sb62.exe Token: SeDebugPrivilege 5116 tf30Zu94Il92.exe Token: SeDebugPrivilege 3044 uhNE29de43cn.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1736 wrote to memory of 4312 1736 f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe 85 PID 1736 wrote to memory of 4312 1736 f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe 85 PID 1736 wrote to memory of 4312 1736 f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe 85 PID 4312 wrote to memory of 3844 4312 vhSl9816Kx.exe 86 PID 4312 wrote to memory of 3844 4312 vhSl9816Kx.exe 86 PID 4312 wrote to memory of 5116 4312 vhSl9816Kx.exe 90 PID 4312 wrote to memory of 5116 4312 vhSl9816Kx.exe 90 PID 4312 wrote to memory of 5116 4312 vhSl9816Kx.exe 90 PID 1736 wrote to memory of 3044 1736 f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe 94 PID 1736 wrote to memory of 3044 1736 f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe 94 PID 1736 wrote to memory of 3044 1736 f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe"C:\Users\Admin\AppData\Local\Temp\f1e7dfd049f963c0a7c248960ee93b4bea16713beb5f554de49040b24a380f1f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhSl9816Kx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhSl9816Kx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf10fb22sb62.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf10fb22sb62.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf30Zu94Il92.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf30Zu94Il92.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 16644⤵
- Program crash
PID:404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhNE29de43cn.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhNE29de43cn.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5116 -ip 51161⤵PID:2692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51f4785d410d5cc26aff2e4fced4ef01f
SHA125c58dce2fb637ff4d0bed01f87f4989fc96baff
SHA25635235ef55f6d67d77cfa12126b4059fd26a9a3adc042933a55402006a205b440
SHA51272e836f7d61b00d163aeba005e9ec0fc88f1e72e7c2d225595369a61db640aa66d074348d9179ece0ac37b6258bbb0eabf1b4d2fba55456543dcbf4d3fc97967
-
Filesize
175KB
MD51f4785d410d5cc26aff2e4fced4ef01f
SHA125c58dce2fb637ff4d0bed01f87f4989fc96baff
SHA25635235ef55f6d67d77cfa12126b4059fd26a9a3adc042933a55402006a205b440
SHA51272e836f7d61b00d163aeba005e9ec0fc88f1e72e7c2d225595369a61db640aa66d074348d9179ece0ac37b6258bbb0eabf1b4d2fba55456543dcbf4d3fc97967
-
Filesize
382KB
MD53e66f8852ff9e3a659f37e21b047f218
SHA175577144e58a3e8ce99bd6dca2bd3d0f4bd9160a
SHA2563b9c35800b3a4f105025cc0172a1bbb3f48f0ff7c7b8a8f3f9e38da81be0eafe
SHA5120ca35d48c50ce31b96c28c1a6d327f5fb449823aa3233457dd20206a3c66573cf903feec2dbfd224a912a34a3f1a49ce838d2608c4330dd956899633b0a8d956
-
Filesize
382KB
MD53e66f8852ff9e3a659f37e21b047f218
SHA175577144e58a3e8ce99bd6dca2bd3d0f4bd9160a
SHA2563b9c35800b3a4f105025cc0172a1bbb3f48f0ff7c7b8a8f3f9e38da81be0eafe
SHA5120ca35d48c50ce31b96c28c1a6d327f5fb449823aa3233457dd20206a3c66573cf903feec2dbfd224a912a34a3f1a49ce838d2608c4330dd956899633b0a8d956
-
Filesize
11KB
MD572dd8134e04d4fa874a7035c66e72d44
SHA1bd019ecc8f841401fd587389fc91966bf5e9a1b3
SHA256d4fb61c25eed0fd20d4c3f3231c89402ab5218093758194b9dc1fb7f0aa2b4f7
SHA512f95ca2c1894529095f1eb212698268f6aee2285fd737b28367c8847abf0c826e40f086e6c2643bff498fd70c7e3aac9025fec526e064a8a0a2e3712fe47785aa
-
Filesize
11KB
MD572dd8134e04d4fa874a7035c66e72d44
SHA1bd019ecc8f841401fd587389fc91966bf5e9a1b3
SHA256d4fb61c25eed0fd20d4c3f3231c89402ab5218093758194b9dc1fb7f0aa2b4f7
SHA512f95ca2c1894529095f1eb212698268f6aee2285fd737b28367c8847abf0c826e40f086e6c2643bff498fd70c7e3aac9025fec526e064a8a0a2e3712fe47785aa
-
Filesize
364KB
MD50fb36e6dfd2286b0bb7e48c476a3f73b
SHA138801c7ea1faf291cb471397c38630a305518828
SHA256edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e
SHA51295c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d
-
Filesize
364KB
MD50fb36e6dfd2286b0bb7e48c476a3f73b
SHA138801c7ea1faf291cb471397c38630a305518828
SHA256edb3b7633dd16579b23dc83d9950c525d7a9c2bec60785c04dc3b63ea3eaba8e
SHA51295c334ce7bae2ccdff2bf4f288c544a2d87946405b723367df421de635a8037167aaeb9b655dd48f8ed9a10a5cfad6b25b4bfd5dc88e99c26ded8e4d694de64d