Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2023, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
e94cc00e26cebf17242f445814bbf53e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e94cc00e26cebf17242f445814bbf53e.exe
Resource
win10v2004-20230220-en
General
-
Target
e94cc00e26cebf17242f445814bbf53e.exe
-
Size
694KB
-
MD5
e94cc00e26cebf17242f445814bbf53e
-
SHA1
d4f85180d5de1261325c9a33b7af157dab44bb20
-
SHA256
30b3952bd4f49fb1c1643e29c05af36d39ed26896c0011b48bdd16a5674cf362
-
SHA512
50d7e579f30dea0040881cfd5f8ff9fc31dd862d82887039a03d124df457ca4ae36fecd7eb508539624b87455e395e2c03bed4e47fff3e1587767eaf6dc07dbd
-
SSDEEP
12288:vMrQy907SCu5+9JD2mhxK2+Ptfg0wiDcZ1AjvKYiSkzLycLlhnUiRu2gz:ryu6Q9t/b+PtfgoDUAjvKYNAyOUiLgz
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b6291mW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b6291mW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b6291mW.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b6291mW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b6291mW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b6291mW.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral2/memory/4104-191-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-192-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-194-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-199-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-202-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-204-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-206-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-208-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-210-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-212-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-214-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-216-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-218-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-220-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-222-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-224-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-226-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline behavioral2/memory/4104-228-0x0000000004AC0000-0x0000000004AFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1980 njY7530ZT.exe 3300 b6291mW.exe 4104 c16TU74.exe 4936 dTEBh41.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b6291mW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b6291mW.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e94cc00e26cebf17242f445814bbf53e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e94cc00e26cebf17242f445814bbf53e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce njY7530ZT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" njY7530ZT.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4596 4104 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3300 b6291mW.exe 3300 b6291mW.exe 4104 c16TU74.exe 4104 c16TU74.exe 4936 dTEBh41.exe 4936 dTEBh41.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3300 b6291mW.exe Token: SeDebugPrivilege 4104 c16TU74.exe Token: SeDebugPrivilege 4936 dTEBh41.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1980 1776 e94cc00e26cebf17242f445814bbf53e.exe 86 PID 1776 wrote to memory of 1980 1776 e94cc00e26cebf17242f445814bbf53e.exe 86 PID 1776 wrote to memory of 1980 1776 e94cc00e26cebf17242f445814bbf53e.exe 86 PID 1980 wrote to memory of 3300 1980 njY7530ZT.exe 87 PID 1980 wrote to memory of 3300 1980 njY7530ZT.exe 87 PID 1980 wrote to memory of 3300 1980 njY7530ZT.exe 87 PID 1980 wrote to memory of 4104 1980 njY7530ZT.exe 93 PID 1980 wrote to memory of 4104 1980 njY7530ZT.exe 93 PID 1980 wrote to memory of 4104 1980 njY7530ZT.exe 93 PID 1776 wrote to memory of 4936 1776 e94cc00e26cebf17242f445814bbf53e.exe 100 PID 1776 wrote to memory of 4936 1776 e94cc00e26cebf17242f445814bbf53e.exe 100 PID 1776 wrote to memory of 4936 1776 e94cc00e26cebf17242f445814bbf53e.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e94cc00e26cebf17242f445814bbf53e.exe"C:\Users\Admin\AppData\Local\Temp\e94cc00e26cebf17242f445814bbf53e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\njY7530ZT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\njY7530ZT.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6291mW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6291mW.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c16TU74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c16TU74.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 13604⤵
- Program crash
PID:4596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dTEBh41.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dTEBh41.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4104 -ip 41041⤵PID:1236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
550KB
MD52b3f3a8143bd30454f351fedef9fca59
SHA1fcca27d87074cae1e24897dd01ad92c12337390e
SHA2566eb11a73cd82b0a20f0e9eea2f558ef4a47cab9be1968a29fd8310c74c4e6538
SHA512df953b0d43b9205506ea5a392637db1aab1f6946ddd13816c5cb5ccfed25c8f069cb9645a32064165034d512ebccc88ea3f41425ab622b35e0b96e52a7ab1730
-
Filesize
550KB
MD52b3f3a8143bd30454f351fedef9fca59
SHA1fcca27d87074cae1e24897dd01ad92c12337390e
SHA2566eb11a73cd82b0a20f0e9eea2f558ef4a47cab9be1968a29fd8310c74c4e6538
SHA512df953b0d43b9205506ea5a392637db1aab1f6946ddd13816c5cb5ccfed25c8f069cb9645a32064165034d512ebccc88ea3f41425ab622b35e0b96e52a7ab1730
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
323KB
MD5ee43881ab62092621b2d2e22a0295878
SHA10339221e3f787602fea6a0541817565d751a293c
SHA2562764ed1001c0289c438398b43297206b64e883f65c34eec0418f809392bab22d
SHA512df6b636d896665a3ec9ee572dc8dcb79169c02316741d9a693d7c09be7ce419e373b1c4d0635c8ecda95e936313750820fb97ee31111a005b334f44ec6112f6c
-
Filesize
381KB
MD5826b7cff885f3a7dfe0e9ea576f4af6a
SHA1a3a5327979d48ce7a59318ad76385031577a3da4
SHA256b0bf92be138a39b635a3c9abb97305acdc545ea5eda987602f8006ecce64ca96
SHA512bade2f94a3fc75072267ab36b6f5f45b642d6a96af7e03db92077db7f18ef2dc2b32fb808dcfd2304b04367e7a883102154a45910d2f8e668e55c4d948bbf6f1
-
Filesize
381KB
MD5826b7cff885f3a7dfe0e9ea576f4af6a
SHA1a3a5327979d48ce7a59318ad76385031577a3da4
SHA256b0bf92be138a39b635a3c9abb97305acdc545ea5eda987602f8006ecce64ca96
SHA512bade2f94a3fc75072267ab36b6f5f45b642d6a96af7e03db92077db7f18ef2dc2b32fb808dcfd2304b04367e7a883102154a45910d2f8e668e55c4d948bbf6f1