Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2023, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe
Resource
win10v2004-20230220-en
General
-
Target
45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe
-
Size
560KB
-
MD5
a721237fc59826593b16e05a77c9936c
-
SHA1
498bcc6de832789d8bd6cbd941a7e62164e6c041
-
SHA256
45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b
-
SHA512
72cfb4d3bd17f84fd875f0729f5efa2cac1f32c0d39c86f404e4dc7103e2770bd93187a8c3c3bbcc75b688c4d7e10b43798a10e1097c9cb0bb8f691174c5c977
-
SSDEEP
12288:jMrGy90kTg90DFAtleqvYmb+eB853zqtd8MeLbWgnC0:FyHkeDStlzvYqsJi8MUbxC0
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf37Et27Wx29.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf37Et27Wx29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf37Et27Wx29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf37Et27Wx29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf37Et27Wx29.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf37Et27Wx29.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/4872-155-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-156-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-158-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-160-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-162-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-164-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-166-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-168-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-170-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-172-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-174-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-176-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-178-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-180-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-182-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-184-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-190-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-193-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-187-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-195-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-197-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-199-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-201-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-203-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-205-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-209-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-211-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-207-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-213-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-215-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-217-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-219-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-221-0x00000000078B0000-0x00000000078EE000-memory.dmp family_redline behavioral1/memory/4872-1072-0x0000000004F50000-0x0000000004F60000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1800 vhtD5163dm.exe 1312 sf37Et27Wx29.exe 4872 tf72kw99bn23.exe 736 uhKq73SI34hE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf37Et27Wx29.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhtD5163dm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhtD5163dm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1224 4872 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1312 sf37Et27Wx29.exe 1312 sf37Et27Wx29.exe 4872 tf72kw99bn23.exe 4872 tf72kw99bn23.exe 736 uhKq73SI34hE.exe 736 uhKq73SI34hE.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1312 sf37Et27Wx29.exe Token: SeDebugPrivilege 4872 tf72kw99bn23.exe Token: SeDebugPrivilege 736 uhKq73SI34hE.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2136 wrote to memory of 1800 2136 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe 86 PID 2136 wrote to memory of 1800 2136 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe 86 PID 2136 wrote to memory of 1800 2136 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe 86 PID 1800 wrote to memory of 1312 1800 vhtD5163dm.exe 87 PID 1800 wrote to memory of 1312 1800 vhtD5163dm.exe 87 PID 1800 wrote to memory of 4872 1800 vhtD5163dm.exe 93 PID 1800 wrote to memory of 4872 1800 vhtD5163dm.exe 93 PID 1800 wrote to memory of 4872 1800 vhtD5163dm.exe 93 PID 2136 wrote to memory of 736 2136 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe 96 PID 2136 wrote to memory of 736 2136 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe 96 PID 2136 wrote to memory of 736 2136 45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe"C:\Users\Admin\AppData\Local\Temp\45379fd4bba6e95ba6dfb6c52db7d067ff7a8301873197df44ca36c77f98eb0b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhtD5163dm.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhtD5163dm.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf37Et27Wx29.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf37Et27Wx29.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf72kw99bn23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf72kw99bn23.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 13564⤵
- Program crash
PID:1224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhKq73SI34hE.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhKq73SI34hE.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4872 -ip 48721⤵PID:2644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5ec802e335ad7e28e542dedadf5f4fd6f
SHA13413cf46b9f3baa7e5f661c2c87790f3ae20d3cd
SHA256c15d54bd696064e2fc042f78a8d73f9ee64a4f083d38b70659684b0107aa76be
SHA512ec4ed534e51c57c444dec3727a9dc7823f01bb86a2e446871c7392ce67068b7774428735fb42301bd60fcefd341209b5bbb90d2e1731c30b008e5bcb0d154045
-
Filesize
176KB
MD5ec802e335ad7e28e542dedadf5f4fd6f
SHA13413cf46b9f3baa7e5f661c2c87790f3ae20d3cd
SHA256c15d54bd696064e2fc042f78a8d73f9ee64a4f083d38b70659684b0107aa76be
SHA512ec4ed534e51c57c444dec3727a9dc7823f01bb86a2e446871c7392ce67068b7774428735fb42301bd60fcefd341209b5bbb90d2e1731c30b008e5bcb0d154045
-
Filesize
416KB
MD53807fccbf75d9af066b5806228a8e22a
SHA17150b1585a9c800f6ff5b7dbee6af4196996a719
SHA2564c8aa517f37d1687b59afc2e7fe24ecd40e02e2a6655841868192f203961bfc2
SHA51254f09c6a795596a65c2b966e37bb81c1b50b50ecad69efe85136a99d6c3e7e5a5f35f2d765f8d6711bc4fb5aa017fb715621d699d79200695ca1fe1c4dd16eef
-
Filesize
416KB
MD53807fccbf75d9af066b5806228a8e22a
SHA17150b1585a9c800f6ff5b7dbee6af4196996a719
SHA2564c8aa517f37d1687b59afc2e7fe24ecd40e02e2a6655841868192f203961bfc2
SHA51254f09c6a795596a65c2b966e37bb81c1b50b50ecad69efe85136a99d6c3e7e5a5f35f2d765f8d6711bc4fb5aa017fb715621d699d79200695ca1fe1c4dd16eef
-
Filesize
11KB
MD55bf6bc3d5a8523694995b75a9a2f132f
SHA1ad56cb421bc1e1fb54f6328d79a3c8fab167d72d
SHA2561750c0ac6b1ac15d6764a920221efd05b1d5272ebb3ade0ce327142bc9097db2
SHA51241e33b009a5ab6bce5ebe4d2f28190debe59b8728ba7384a5e42f40b5594a9ee270f19f91856ba915ce3d84735bb2de96f1c888076798be6e9b7c485e5b7a302
-
Filesize
11KB
MD55bf6bc3d5a8523694995b75a9a2f132f
SHA1ad56cb421bc1e1fb54f6328d79a3c8fab167d72d
SHA2561750c0ac6b1ac15d6764a920221efd05b1d5272ebb3ade0ce327142bc9097db2
SHA51241e33b009a5ab6bce5ebe4d2f28190debe59b8728ba7384a5e42f40b5594a9ee270f19f91856ba915ce3d84735bb2de96f1c888076798be6e9b7c485e5b7a302
-
Filesize
416KB
MD5197d8f3be31e2a0e255e510348dccf49
SHA1c55404597c3904b99ebb6eac727feeef78fda213
SHA256e0f10554868f152ebcb4cbc700ca36c4e4661b8211b6af815c2e028ebb8da58c
SHA512efd1b3f491868fa6b90876b8357a551d381f710016a5f398c1e0d273828bd42c4d9d4bfc3eaa98a65461b7b95811bf577f96cb45480b3c395fefb76ccdcbafc2
-
Filesize
416KB
MD5197d8f3be31e2a0e255e510348dccf49
SHA1c55404597c3904b99ebb6eac727feeef78fda213
SHA256e0f10554868f152ebcb4cbc700ca36c4e4661b8211b6af815c2e028ebb8da58c
SHA512efd1b3f491868fa6b90876b8357a551d381f710016a5f398c1e0d273828bd42c4d9d4bfc3eaa98a65461b7b95811bf577f96cb45480b3c395fefb76ccdcbafc2