Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2023, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe
Resource
win10v2004-20230220-en
General
-
Target
489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe
-
Size
550KB
-
MD5
d18433f2ce4d3c9cafeb09576f70b773
-
SHA1
089ba25d80f461fe48932608dd432d82cb87981c
-
SHA256
489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512
-
SHA512
b8909b3803f655ae9335ac90bb57a626483d7c62361e23c6f8871ec56557369d68c808cc1043c0a9c4ada0efa48f0ac8916990e335baca279acfaedd50caa4ab
-
SSDEEP
12288:DMrvy902KPwqg/H00mAhyCIh82754pPsfU+pQ8kj/07G+NY:oy7K+jhS82Cp0fUF8nW
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
misha
193.56.146.11:4173
-
auth_value
e17e441c954db214b94a603a7b0b1aea
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection s4696Qe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s4696Qe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s4696Qe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s4696Qe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s4696Qe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s4696Qe.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4848-158-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-159-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-161-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-163-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-165-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-167-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-169-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-171-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-173-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-175-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-177-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-179-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-181-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-185-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-183-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-187-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-189-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-191-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-193-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-195-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-197-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-199-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-201-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-203-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-205-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-207-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-209-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-211-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-213-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-215-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-217-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-219-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline behavioral1/memory/4848-221-0x0000000004BE0000-0x0000000004C1E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4388 vktc0305BK.exe 1624 s4696Qe.exe 4848 t61AL59.exe 4000 uGGMD06.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" s4696Qe.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vktc0305BK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vktc0305BK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3608 4848 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1624 s4696Qe.exe 1624 s4696Qe.exe 4848 t61AL59.exe 4848 t61AL59.exe 4000 uGGMD06.exe 4000 uGGMD06.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1624 s4696Qe.exe Token: SeDebugPrivilege 4848 t61AL59.exe Token: SeDebugPrivilege 4000 uGGMD06.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4088 wrote to memory of 4388 4088 489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe 84 PID 4088 wrote to memory of 4388 4088 489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe 84 PID 4088 wrote to memory of 4388 4088 489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe 84 PID 4388 wrote to memory of 1624 4388 vktc0305BK.exe 85 PID 4388 wrote to memory of 1624 4388 vktc0305BK.exe 85 PID 4388 wrote to memory of 4848 4388 vktc0305BK.exe 95 PID 4388 wrote to memory of 4848 4388 vktc0305BK.exe 95 PID 4388 wrote to memory of 4848 4388 vktc0305BK.exe 95 PID 4088 wrote to memory of 4000 4088 489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe 101 PID 4088 wrote to memory of 4000 4088 489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe 101 PID 4088 wrote to memory of 4000 4088 489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe"C:\Users\Admin\AppData\Local\Temp\489d74f3a5de2b22c72bcfa6069d33f477259a59b430ad0709bbe838d487d512.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vktc0305BK.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vktc0305BK.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s4696Qe.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s4696Qe.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t61AL59.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t61AL59.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 17324⤵
- Program crash
PID:3608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uGGMD06.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uGGMD06.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4848 -ip 48481⤵PID:2828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
175KB
MD5fb6b1dfc1d31819df66b4eba004f4f1e
SHA18fb4085acc6bdac0c653130d20ccf87dc0a4bc16
SHA2564a8cf958110e605398244c588878680f5f367bf064573a69fded3f4ca70c7549
SHA512270f0208fac6330d413709de2f1aa348f20e434bb70b886a96e7db87f74607c9dcbee92b458ea375ca9d22a89af46b31655b84d6f26fac3d12e63f8242d41f3a
-
Filesize
405KB
MD522a225a022e8bd82d1aaa4c8b0535728
SHA12360518a1349c16302be645d37f6b599104497c0
SHA2563f997d5d0e47072e1c300da74a4fd4e32eacd44aa519cb0df6eda917fac5ee1a
SHA51258289ee2ad64f6ad9e1e3c98e54fd99c6af30c4e8f664211f85112930e127c6af6ac78a62cf8a079ce6c77c141076b74d206795c806ae313d354130f8fc8ec54
-
Filesize
405KB
MD522a225a022e8bd82d1aaa4c8b0535728
SHA12360518a1349c16302be645d37f6b599104497c0
SHA2563f997d5d0e47072e1c300da74a4fd4e32eacd44aa519cb0df6eda917fac5ee1a
SHA51258289ee2ad64f6ad9e1e3c98e54fd99c6af30c4e8f664211f85112930e127c6af6ac78a62cf8a079ce6c77c141076b74d206795c806ae313d354130f8fc8ec54
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
365KB
MD569fb73e283630210dcb0e9b400a1ee4c
SHA1f746b5f15ebf476579d0705720ab4daec3306e41
SHA2569cda3093dddacbd05e0e9c8ce7320c73320ff2ea4b66ca3578b5b4fd9dc80fe2
SHA512ee9062a2b4a2ece85c000e369dd1bc1815ce159c87235cba0e36e7a26f7548c28d4c6dfe9a10b22addbe7b1f8c2cd9972446925a5e57fa0644d9c617cda1784f
-
Filesize
365KB
MD569fb73e283630210dcb0e9b400a1ee4c
SHA1f746b5f15ebf476579d0705720ab4daec3306e41
SHA2569cda3093dddacbd05e0e9c8ce7320c73320ff2ea4b66ca3578b5b4fd9dc80fe2
SHA512ee9062a2b4a2ece85c000e369dd1bc1815ce159c87235cba0e36e7a26f7548c28d4c6dfe9a10b22addbe7b1f8c2cd9972446925a5e57fa0644d9c617cda1784f