Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe
Resource
win10v2004-20230220-en
General
-
Target
b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe
-
Size
790KB
-
MD5
0c3f8bb5e3c09a5e3b33a7ff6179508a
-
SHA1
6b8895c84877532dc3da77a5377442dfe1c37754
-
SHA256
b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d
-
SHA512
41461201f4fd30c63a3a0d88f2919b3313c1e7f5a93a67119d7a9b88fb98402d5a0d4e2877d32af44745ea6e771bbaed145f6f88c1e5720cb7a7273e6de927e8
-
SSDEEP
24576:IyZW3weS8yrpXuPloQ2Tnfc3dLuESJnH:PM3FS8y8PlT2TnkNuE8
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rita
193.233.20.28:4125
-
auth_value
5cf1bcf41b0a2f3710619223451dfd3a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1651eX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1651eX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1651eX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c93zB86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c93zB86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c93zB86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c93zB86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c93zB86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b1651eX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1651eX.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1651eX.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c93zB86.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4540-203-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-206-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-204-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-208-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-210-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-212-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-214-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-216-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-218-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-220-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-222-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-224-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-226-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-228-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-230-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-232-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-234-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-236-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/4540-446-0x0000000004BC0000-0x0000000004BD0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3292 tice9306.exe 4736 tice5933.exe 3472 b1651eX.exe 4092 c93zB86.exe 4540 deRBA55.exe 5084 e40xp49.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1651eX.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c93zB86.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c93zB86.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice5933.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice5933.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice9306.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9306.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4796 4092 WerFault.exe 93 4776 4540 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3472 b1651eX.exe 3472 b1651eX.exe 4092 c93zB86.exe 4092 c93zB86.exe 4540 deRBA55.exe 4540 deRBA55.exe 5084 e40xp49.exe 5084 e40xp49.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3472 b1651eX.exe Token: SeDebugPrivilege 4092 c93zB86.exe Token: SeDebugPrivilege 4540 deRBA55.exe Token: SeDebugPrivilege 5084 e40xp49.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4932 wrote to memory of 3292 4932 b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe 86 PID 4932 wrote to memory of 3292 4932 b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe 86 PID 4932 wrote to memory of 3292 4932 b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe 86 PID 3292 wrote to memory of 4736 3292 tice9306.exe 87 PID 3292 wrote to memory of 4736 3292 tice9306.exe 87 PID 3292 wrote to memory of 4736 3292 tice9306.exe 87 PID 4736 wrote to memory of 3472 4736 tice5933.exe 88 PID 4736 wrote to memory of 3472 4736 tice5933.exe 88 PID 4736 wrote to memory of 4092 4736 tice5933.exe 93 PID 4736 wrote to memory of 4092 4736 tice5933.exe 93 PID 4736 wrote to memory of 4092 4736 tice5933.exe 93 PID 3292 wrote to memory of 4540 3292 tice9306.exe 99 PID 3292 wrote to memory of 4540 3292 tice9306.exe 99 PID 3292 wrote to memory of 4540 3292 tice9306.exe 99 PID 4932 wrote to memory of 5084 4932 b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe 104 PID 4932 wrote to memory of 5084 4932 b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe 104 PID 4932 wrote to memory of 5084 4932 b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe"C:\Users\Admin\AppData\Local\Temp\b62168c1dfbd144cee4929211387ea98db72a09d4a9c969aed0f10c78c0e684d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9306.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9306.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5933.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice5933.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1651eX.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1651eX.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c93zB86.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c93zB86.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 10885⤵
- Program crash
PID:4796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\deRBA55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\deRBA55.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 12884⤵
- Program crash
PID:4776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e40xp49.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e40xp49.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4092 -ip 40921⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4540 -ip 45401⤵PID:1140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
645KB
MD52c584ab03af73d7f5e9af23964c85db7
SHA1b22d07d8b6d2594202c35c07091c31cdf8fdbef5
SHA256a6e3691b1da06386f72d9303a3f76c8fb70b7d829de30cb5ec1ccdbfd25c698d
SHA512e13187685d43e1f594a7dadb370c70781eb45edfe4ae391fd9dca3419b42953aa83c250e3a4f8aafffad55d20ad0f3f549447a556cc096f9d7b971663282d4b0
-
Filesize
645KB
MD52c584ab03af73d7f5e9af23964c85db7
SHA1b22d07d8b6d2594202c35c07091c31cdf8fdbef5
SHA256a6e3691b1da06386f72d9303a3f76c8fb70b7d829de30cb5ec1ccdbfd25c698d
SHA512e13187685d43e1f594a7dadb370c70781eb45edfe4ae391fd9dca3419b42953aa83c250e3a4f8aafffad55d20ad0f3f549447a556cc096f9d7b971663282d4b0
-
Filesize
296KB
MD589cb6a9576c9bbbb94e2eacfdbcaa375
SHA1daa4160d264cdc73cc3747ffa8d228087512a98f
SHA2565b27edb00f5b53cc2701b4dedf2d2315388c3a012ae252196aec5436bc259f08
SHA5121c4982d0bd5953802e4cdf1ed336fe6aa7552d8462e7f31692d9ee5f16eea6b1d09d8fe279391da93d1f7a6eb4dcca2484a96656634c830d711a3a85d9c62e99
-
Filesize
296KB
MD589cb6a9576c9bbbb94e2eacfdbcaa375
SHA1daa4160d264cdc73cc3747ffa8d228087512a98f
SHA2565b27edb00f5b53cc2701b4dedf2d2315388c3a012ae252196aec5436bc259f08
SHA5121c4982d0bd5953802e4cdf1ed336fe6aa7552d8462e7f31692d9ee5f16eea6b1d09d8fe279391da93d1f7a6eb4dcca2484a96656634c830d711a3a85d9c62e99
-
Filesize
323KB
MD5f78dd41e3ce8a02cf7b2bdba1079c930
SHA1fa8bbe9e5fad14e36e46dec5e0e17dab05fe93cf
SHA256d38aaa7595d30cade01283163d57e21239d5898db9d961763588520294279133
SHA512946d3503a6c0839a048dd672e32f67b9857058243196bfa7893cebc9c8dcfa5440a24e8073cbbe435c95917fc5736a6baef332fed8888c7e5294189e68dae753
-
Filesize
323KB
MD5f78dd41e3ce8a02cf7b2bdba1079c930
SHA1fa8bbe9e5fad14e36e46dec5e0e17dab05fe93cf
SHA256d38aaa7595d30cade01283163d57e21239d5898db9d961763588520294279133
SHA512946d3503a6c0839a048dd672e32f67b9857058243196bfa7893cebc9c8dcfa5440a24e8073cbbe435c95917fc5736a6baef332fed8888c7e5294189e68dae753
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD5ba9e21cf5f10fd52f6acbf3e5e8eb381
SHA11923065544ced98ec4a30a4de8a084eb886b3294
SHA2563780a76ff5c50eade05de3ce60ca982017b8d4bdd4c6af0f8fea9d13dfa3bcc6
SHA512490e487f9b8f41378f78a0254b978ea7349d1482fb76a92e38877d6aea3bce2078fb3105c2c13d53990fc993850ad26310448cd2e0a1b4bee8a56529ccdfc01b
-
Filesize
239KB
MD5ba9e21cf5f10fd52f6acbf3e5e8eb381
SHA11923065544ced98ec4a30a4de8a084eb886b3294
SHA2563780a76ff5c50eade05de3ce60ca982017b8d4bdd4c6af0f8fea9d13dfa3bcc6
SHA512490e487f9b8f41378f78a0254b978ea7349d1482fb76a92e38877d6aea3bce2078fb3105c2c13d53990fc993850ad26310448cd2e0a1b4bee8a56529ccdfc01b