Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
76s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe
Resource
win10v2004-20230220-en
General
-
Target
a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe
-
Size
530KB
-
MD5
9d98887da237676528795fc16cc28242
-
SHA1
5fac23c5983cb857dec0ac79f4d9491f9a3cb99d
-
SHA256
a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425
-
SHA512
2262ed94830c4bc627f6f924d966442dc4d08084515e46cbaabd7adf07b2b4e64df65b7b6dd6583e6d43f5a474ee9d8f92a05ef190b993d8502c59c29e8471ca
-
SSDEEP
12288:4MrNy902v5yPNzLa5YdCKvVFZuMBJhRX3wDb1YJks:VyxvsPNvaKbvFR/hRIbqJr
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf50YH01UP26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf50YH01UP26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf50YH01UP26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf50YH01UP26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf50YH01UP26.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf50YH01UP26.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral2/memory/3704-158-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-159-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-161-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-163-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-165-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-167-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-169-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-171-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-173-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-175-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-177-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-179-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-181-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-183-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-185-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-187-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-189-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-191-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-193-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-195-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-197-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-199-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-201-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-203-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-205-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-207-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-209-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-213-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-215-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-211-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-217-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-219-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral2/memory/3704-221-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 796 vhhM0717qJ.exe 4476 sf50YH01UP26.exe 3704 tf34gN25AR02.exe 1992 uhRt50LD40Wo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf50YH01UP26.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhhM0717qJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhhM0717qJ.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4876 3704 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4476 sf50YH01UP26.exe 4476 sf50YH01UP26.exe 3704 tf34gN25AR02.exe 3704 tf34gN25AR02.exe 1992 uhRt50LD40Wo.exe 1992 uhRt50LD40Wo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4476 sf50YH01UP26.exe Token: SeDebugPrivilege 3704 tf34gN25AR02.exe Token: SeDebugPrivilege 1992 uhRt50LD40Wo.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1008 wrote to memory of 796 1008 a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe 86 PID 1008 wrote to memory of 796 1008 a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe 86 PID 1008 wrote to memory of 796 1008 a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe 86 PID 796 wrote to memory of 4476 796 vhhM0717qJ.exe 87 PID 796 wrote to memory of 4476 796 vhhM0717qJ.exe 87 PID 796 wrote to memory of 3704 796 vhhM0717qJ.exe 88 PID 796 wrote to memory of 3704 796 vhhM0717qJ.exe 88 PID 796 wrote to memory of 3704 796 vhhM0717qJ.exe 88 PID 1008 wrote to memory of 1992 1008 a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe 91 PID 1008 wrote to memory of 1992 1008 a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe 91 PID 1008 wrote to memory of 1992 1008 a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe"C:\Users\Admin\AppData\Local\Temp\a9a79e838aa44a567de917e6cfceac32d31d490be8721790d73faee90fa37425.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhhM0717qJ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhhM0717qJ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf50YH01UP26.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf50YH01UP26.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf34gN25AR02.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf34gN25AR02.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 16564⤵
- Program crash
PID:4876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRt50LD40Wo.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhRt50LD40Wo.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3704 -ip 37041⤵PID:4388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD51390e22edc77aa421eb0357375b442ef
SHA1015409efc11c4f5f6f091a1517e47021aa32b9ec
SHA25647b53226bcd1f0d32e065794a916066df71f6c150f7a0f93f159f0135c9839ec
SHA5122c0c8b152c91c1759a8a8afb6e04bea08d548e21ba73b98bc73d0c34d77c04004f051ccb6b65231dce2ab54f3d84baa6677a35edf203813629cea2af7be3429a
-
Filesize
175KB
MD51390e22edc77aa421eb0357375b442ef
SHA1015409efc11c4f5f6f091a1517e47021aa32b9ec
SHA25647b53226bcd1f0d32e065794a916066df71f6c150f7a0f93f159f0135c9839ec
SHA5122c0c8b152c91c1759a8a8afb6e04bea08d548e21ba73b98bc73d0c34d77c04004f051ccb6b65231dce2ab54f3d84baa6677a35edf203813629cea2af7be3429a
-
Filesize
385KB
MD5d8e3f421348ce110fa5822c0bba850cc
SHA15bdc351bfd86409cbe5e09c628f5ea2a0ceb4618
SHA25606c3ce6329fca61382dec0158bf047f796d7dd13930a1393d2f77820c8a15e67
SHA51240aa9e349a6d4535490e5c7265d74eeefc1d72f7564129951632ebce74a9c1e1e5b8ce7aa7f6b1db9cdff5b2b54c121c579b18ff84c020a0e010d505e140c9a6
-
Filesize
385KB
MD5d8e3f421348ce110fa5822c0bba850cc
SHA15bdc351bfd86409cbe5e09c628f5ea2a0ceb4618
SHA25606c3ce6329fca61382dec0158bf047f796d7dd13930a1393d2f77820c8a15e67
SHA51240aa9e349a6d4535490e5c7265d74eeefc1d72f7564129951632ebce74a9c1e1e5b8ce7aa7f6b1db9cdff5b2b54c121c579b18ff84c020a0e010d505e140c9a6
-
Filesize
11KB
MD5882a67e5fd493f6bd53c1017fc83560b
SHA11ded2aad86cbbd08642c958dde824ae21064f045
SHA25654b69b90a598a0481908d727d34b90c87c93eca5ef74ad44afe09971e77fae00
SHA5125cbf8aeb1e6ce65397a24018a49a0c9c3b6863d11bfaf7d0ea432bc756995700cbc80ef13da3a8ceab818416dbca95da7721a69b55a1158ca5e04832cd2e7820
-
Filesize
11KB
MD5882a67e5fd493f6bd53c1017fc83560b
SHA11ded2aad86cbbd08642c958dde824ae21064f045
SHA25654b69b90a598a0481908d727d34b90c87c93eca5ef74ad44afe09971e77fae00
SHA5125cbf8aeb1e6ce65397a24018a49a0c9c3b6863d11bfaf7d0ea432bc756995700cbc80ef13da3a8ceab818416dbca95da7721a69b55a1158ca5e04832cd2e7820
-
Filesize
294KB
MD510466b602e1c396979e43b57cd69bdc2
SHA1dd1e099b5b8b216f8894f100427eec39023ddb4e
SHA25678104c47615ced3ba71d64a76627b6fac8b81e9b6d10c3c2713e4054fd8c1c1a
SHA5120e93a5fb25762f5295cbb68a299fefbdac4d450f55f0636917da8a48782616abed7056557c41f29ef883b42cf21cce94447dc03b68e3ce35cae3f72c7addfa4e
-
Filesize
294KB
MD510466b602e1c396979e43b57cd69bdc2
SHA1dd1e099b5b8b216f8894f100427eec39023ddb4e
SHA25678104c47615ced3ba71d64a76627b6fac8b81e9b6d10c3c2713e4054fd8c1c1a
SHA5120e93a5fb25762f5295cbb68a299fefbdac4d450f55f0636917da8a48782616abed7056557c41f29ef883b42cf21cce94447dc03b68e3ce35cae3f72c7addfa4e