Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2023, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe
Resource
win10v2004-20230220-en
General
-
Target
e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe
-
Size
693KB
-
MD5
613b9273eb8c1cb80da5d377328ff2ad
-
SHA1
f1be52bac7b49995146b2cb59065e009ead46419
-
SHA256
e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be
-
SHA512
0a9cd68775e1d43ecb07e033c71abbafffd093dfded94fb3aecef06ffd3188ea94669a6a12d33399dbe5116ac2dd22b73b8af8e2a53cbbdc054c10df45e18a71
-
SSDEEP
12288:HMrFy90QB55Vgd1PiyrkavK2+Otcg0wiUcIUxzS0zEOYn8crrIlb1Myt:eyDhV0PiyYUb+OtcgoUBUxzcNrQV
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
diza
193.56.146.11:4173
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4694Gd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4694Gd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b4694Gd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4694Gd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4694Gd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4694Gd.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3696-191-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-192-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-194-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-196-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-198-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-200-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-202-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-204-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-206-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-208-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-210-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-214-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-216-0x0000000004BA0000-0x0000000004BB0000-memory.dmp family_redline behavioral1/memory/3696-217-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-219-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-221-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-223-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-225-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline behavioral1/memory/3696-227-0x0000000004B00000-0x0000000004B3E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1304 nql0583Hg.exe 1636 b4694Gd.exe 3696 c38of84.exe 640 dSIbe25.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b4694Gd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b4694Gd.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nql0583Hg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nql0583Hg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1276 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2000 3696 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1636 b4694Gd.exe 1636 b4694Gd.exe 3696 c38of84.exe 3696 c38of84.exe 640 dSIbe25.exe 640 dSIbe25.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1636 b4694Gd.exe Token: SeDebugPrivilege 3696 c38of84.exe Token: SeDebugPrivilege 640 dSIbe25.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4436 wrote to memory of 1304 4436 e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe 86 PID 4436 wrote to memory of 1304 4436 e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe 86 PID 4436 wrote to memory of 1304 4436 e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe 86 PID 1304 wrote to memory of 1636 1304 nql0583Hg.exe 87 PID 1304 wrote to memory of 1636 1304 nql0583Hg.exe 87 PID 1304 wrote to memory of 1636 1304 nql0583Hg.exe 87 PID 1304 wrote to memory of 3696 1304 nql0583Hg.exe 91 PID 1304 wrote to memory of 3696 1304 nql0583Hg.exe 91 PID 1304 wrote to memory of 3696 1304 nql0583Hg.exe 91 PID 4436 wrote to memory of 640 4436 e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe 94 PID 4436 wrote to memory of 640 4436 e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe 94 PID 4436 wrote to memory of 640 4436 e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe"C:\Users\Admin\AppData\Local\Temp\e27f47e752fe59234a19c0b79be8a53716b27a654f56a38df60cf2c71b87f2be.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nql0583Hg.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nql0583Hg.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4694Gd.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4694Gd.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c38of84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c38of84.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 18444⤵
- Program crash
PID:2000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dSIbe25.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dSIbe25.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3696 -ip 36961⤵PID:4580
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD55c65803d42d5d06e302798faee3a11cd
SHA11e8de783b9994a3e422d9799437e4ad0ce554cc6
SHA256a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2
SHA51271a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804
-
Filesize
175KB
MD55c65803d42d5d06e302798faee3a11cd
SHA11e8de783b9994a3e422d9799437e4ad0ce554cc6
SHA256a44091a1a8110f482b8a4bea50b7eeddc9d8cb6c11878fe49b955f886b3defd2
SHA51271a465f5df53ed7fcc34a492acedb12bb2d81538aa4e137dfb9ec71bb911a943eed2b2d3f45cd13f15cb57aaf4f7536576cc5629848da5c6e273ec1e323d4804
-
Filesize
548KB
MD58a5e803034347b0a74d4a622b56c3927
SHA1b8af0eb23c7d2681f5292a4ed2d8fbc9d060ee76
SHA256d7e03f53344c8e288cb3493f5e58bfc27e8dd2de761d82166e6ef1d81a17a4e2
SHA51234710207b2ebeabc012d155e233ab3b5473cab84280638e8919e3766f4c65b09cc2a235b606fc1398b3edc64c130004020c09d6031f927f904181028b5916564
-
Filesize
548KB
MD58a5e803034347b0a74d4a622b56c3927
SHA1b8af0eb23c7d2681f5292a4ed2d8fbc9d060ee76
SHA256d7e03f53344c8e288cb3493f5e58bfc27e8dd2de761d82166e6ef1d81a17a4e2
SHA51234710207b2ebeabc012d155e233ab3b5473cab84280638e8919e3766f4c65b09cc2a235b606fc1398b3edc64c130004020c09d6031f927f904181028b5916564
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
380KB
MD5cd30df0759fea97083bdf62f610ec081
SHA1864bf5a66a31bf4bd217fa7c5496c9759211da26
SHA2567ac406e27ae45f23178785c807d52d6cf2954038e445f33f09b1fc5fa0e78ce0
SHA51213491b8f0b4a4c890f741825a8cf5903f857c33503a8f7ce61c543174693c9925f8ceb4847a92a148394d892adf8d9fed095cdac5cdbc9d84302f0f3c620883b
-
Filesize
380KB
MD5cd30df0759fea97083bdf62f610ec081
SHA1864bf5a66a31bf4bd217fa7c5496c9759211da26
SHA2567ac406e27ae45f23178785c807d52d6cf2954038e445f33f09b1fc5fa0e78ce0
SHA51213491b8f0b4a4c890f741825a8cf5903f857c33503a8f7ce61c543174693c9925f8ceb4847a92a148394d892adf8d9fed095cdac5cdbc9d84302f0f3c620883b