Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe
Resource
win10v2004-20230220-en
General
-
Target
1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe
-
Size
875KB
-
MD5
ed9599f2019752d3ed022f12532504f4
-
SHA1
32c9659ad279853b58b43a6dc019b51d9ec54bce
-
SHA256
1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149
-
SHA512
f9b02aaa4bad25be4530cf4fcc520e56e28e53062a6d806cc2ac84385579d66b3136c0bf95d43b736b8bd00af3b0ae771b5671bd42368b5ce709c1332e8be77f
-
SSDEEP
12288:0Mrfy90iy8srOqhjc59wNPlcch+OW5WgYkS7w12bkhhGwNxB11dQ44mp8SL:by2SqV2wNvhcwg67w12bkGAH1Qmp8SL
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rita
193.233.20.28:4125
-
auth_value
5cf1bcf41b0a2f3710619223451dfd3a
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2687Hi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2687Hi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2687Hi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2687Hi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2687Hi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c90MU60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2687Hi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c90MU60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c90MU60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c90MU60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c90MU60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c90MU60.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/856-206-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-207-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-209-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-211-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-213-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-215-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-217-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-219-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-221-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-223-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-225-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-227-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-229-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-231-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-233-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-235-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-237-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/856-239-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4656 tice3061.exe 4996 tice8889.exe 1936 b2687Hi.exe 3392 c90MU60.exe 856 dINux16.exe 1960 e07JW36.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2687Hi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c90MU60.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c90MU60.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice3061.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice3061.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice8889.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice8889.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1800 3392 WerFault.exe 93 1876 856 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1936 b2687Hi.exe 1936 b2687Hi.exe 3392 c90MU60.exe 3392 c90MU60.exe 856 dINux16.exe 856 dINux16.exe 1960 e07JW36.exe 1960 e07JW36.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1936 b2687Hi.exe Token: SeDebugPrivilege 3392 c90MU60.exe Token: SeDebugPrivilege 856 dINux16.exe Token: SeDebugPrivilege 1960 e07JW36.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2100 wrote to memory of 4656 2100 1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe 86 PID 2100 wrote to memory of 4656 2100 1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe 86 PID 2100 wrote to memory of 4656 2100 1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe 86 PID 4656 wrote to memory of 4996 4656 tice3061.exe 87 PID 4656 wrote to memory of 4996 4656 tice3061.exe 87 PID 4656 wrote to memory of 4996 4656 tice3061.exe 87 PID 4996 wrote to memory of 1936 4996 tice8889.exe 88 PID 4996 wrote to memory of 1936 4996 tice8889.exe 88 PID 4996 wrote to memory of 3392 4996 tice8889.exe 93 PID 4996 wrote to memory of 3392 4996 tice8889.exe 93 PID 4996 wrote to memory of 3392 4996 tice8889.exe 93 PID 4656 wrote to memory of 856 4656 tice3061.exe 99 PID 4656 wrote to memory of 856 4656 tice3061.exe 99 PID 4656 wrote to memory of 856 4656 tice3061.exe 99 PID 2100 wrote to memory of 1960 2100 1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe 110 PID 2100 wrote to memory of 1960 2100 1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe 110 PID 2100 wrote to memory of 1960 2100 1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe"C:\Users\Admin\AppData\Local\Temp\1b5c59f42cea1f5cb3dd5f8fb5b79e4d77118830a38f5642bb759436d6cd1149.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3061.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3061.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8889.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8889.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2687Hi.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2687Hi.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c90MU60.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c90MU60.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 10805⤵
- Program crash
PID:1800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dINux16.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dINux16.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 13284⤵
- Program crash
PID:1876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e07JW36.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e07JW36.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3392 -ip 33921⤵PID:564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 856 -ip 8561⤵PID:1756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
175KB
MD58b0ea3120d3d291045b26bcea5ccef54
SHA107ed9587057ae936ca0610051142a4add4f7b6aa
SHA2566659717ddb5d87d6dc4e3c9e1d582bc58778c633eb50c61e3bdc57b5d3be7690
SHA5126d112c8621488b8ec6373ec6ab87b20cd07d33ea945d67a6aaa9ca043d9556b735b3c7b9d33c562e29c8e875c3a947a203a33ad27c2d2afe75e2f75873768244
-
Filesize
731KB
MD5a5d03224ea07a16018aff1d97cb2332d
SHA1f32843899d740cd15557b35c98d5ab9cc506fca9
SHA256a5713fe030f8ab4e7d1c46333fea1beec8bcb3096ec047c5629229c6fb354265
SHA512702ee187b8b4dc266043a11f2d9484745aa2cf96e3cf573258f438321ef875d225f14a4b10ae83ea11af1eb86b21c4e5983879b18fc967c401ccdb24e8033df7
-
Filesize
731KB
MD5a5d03224ea07a16018aff1d97cb2332d
SHA1f32843899d740cd15557b35c98d5ab9cc506fca9
SHA256a5713fe030f8ab4e7d1c46333fea1beec8bcb3096ec047c5629229c6fb354265
SHA512702ee187b8b4dc266043a11f2d9484745aa2cf96e3cf573258f438321ef875d225f14a4b10ae83ea11af1eb86b21c4e5983879b18fc967c401ccdb24e8033df7
-
Filesize
409KB
MD5e114b0dd2a6808ae5e475a8f65a8af09
SHA1ae287305d478889c1fd37e4e5ec2e7e0ee720c5d
SHA2568e970a8b33e7fdb0d17a1f105caf107f63135e359938fe721348edfd1b31c86e
SHA512f01d176c129b909584d8bf88bb6208627281c3e32505484759fc89224413191f3c005ed155ba64077d7fe07c3877a36ece3456a3798e1f1b64f1ffe334c33789
-
Filesize
409KB
MD5e114b0dd2a6808ae5e475a8f65a8af09
SHA1ae287305d478889c1fd37e4e5ec2e7e0ee720c5d
SHA2568e970a8b33e7fdb0d17a1f105caf107f63135e359938fe721348edfd1b31c86e
SHA512f01d176c129b909584d8bf88bb6208627281c3e32505484759fc89224413191f3c005ed155ba64077d7fe07c3877a36ece3456a3798e1f1b64f1ffe334c33789
-
Filesize
366KB
MD55e8babc7879bb7c72f96274cc0168631
SHA11bb2444ffb27eb1f7b192e5a7785064e27e0db65
SHA256ddabb7b52f306c9ee19f9e4d1479d23a216ad3a38661194d573db20b4e96e117
SHA512622e7fae6fca2f7d2a0be913a55e7d59fbea1c020b1b4a6e5e9698df8869fac0f36fa957d7a2a53f9fe98f42a86e6747f9a44f46c8ebecbbc821b839929fe254
-
Filesize
366KB
MD55e8babc7879bb7c72f96274cc0168631
SHA11bb2444ffb27eb1f7b192e5a7785064e27e0db65
SHA256ddabb7b52f306c9ee19f9e4d1479d23a216ad3a38661194d573db20b4e96e117
SHA512622e7fae6fca2f7d2a0be913a55e7d59fbea1c020b1b4a6e5e9698df8869fac0f36fa957d7a2a53f9fe98f42a86e6747f9a44f46c8ebecbbc821b839929fe254
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD5fa194403bcc46f44173e3fb12eca864a
SHA1506a7178968c590dbf59cc6ca4fb302611384f1f
SHA256aa1a4860e14530e9a893b5b6e47fb801a2e4dc4e2b1c31bee3b55a0c939b1770
SHA512385a41d376bc5b21eb9212b6ed05be58a267ba9ec5f77a1c72dd8961565564060b51245df74add741c4b208d1685d1cd0cc30b3aeee9bb1f5416b5d7d6f64c9f
-
Filesize
351KB
MD5fa194403bcc46f44173e3fb12eca864a
SHA1506a7178968c590dbf59cc6ca4fb302611384f1f
SHA256aa1a4860e14530e9a893b5b6e47fb801a2e4dc4e2b1c31bee3b55a0c939b1770
SHA512385a41d376bc5b21eb9212b6ed05be58a267ba9ec5f77a1c72dd8961565564060b51245df74add741c4b208d1685d1cd0cc30b3aeee9bb1f5416b5d7d6f64c9f