Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
83s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe
Resource
win10v2004-20230221-en
General
-
Target
09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe
-
Size
874KB
-
MD5
a06728886cad601ef98c7610a906e358
-
SHA1
b8a293b64fe9239d0023be8c6f629de344da21d0
-
SHA256
09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2
-
SHA512
202e07d7bab0dc1a8e0f840d8b13d5b05f638646094f3222565d050a661e89d0c7427d4459c2620d2e4de1d8033b5ecdd97b5317eec78dcaa78dfda133a1e731
-
SSDEEP
12288:EMrRy900kdLQbKBn5qpxVdLaF8Vc06LMDL/NrX2kqB8SEtG4D0om/Gzuq/BUy51h:dyp+Ub+yooX/Bs8o+muzJ5L1h
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b1121zF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1121zF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c34cG15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c34cG15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c34cG15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c34cG15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c34cG15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1121zF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1121zF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1121zF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1121zF.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c34cG15.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4968-203-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-204-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-206-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-208-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-210-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-212-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-214-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-216-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-218-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-220-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-224-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-226-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-222-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-228-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-230-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-233-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-237-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline behavioral1/memory/4968-240-0x00000000070E0000-0x000000000711E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3244 tice8708.exe 3764 tice3371.exe 4300 b1121zF.exe 3052 c34cG15.exe 4968 dEyci18.exe 3336 e11ah13.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1121zF.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c34cG15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c34cG15.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice8708.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice8708.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice3371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice3371.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5076 3052 WerFault.exe 93 1896 4968 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4300 b1121zF.exe 4300 b1121zF.exe 3052 c34cG15.exe 3052 c34cG15.exe 4968 dEyci18.exe 4968 dEyci18.exe 3336 e11ah13.exe 3336 e11ah13.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4300 b1121zF.exe Token: SeDebugPrivilege 3052 c34cG15.exe Token: SeDebugPrivilege 4968 dEyci18.exe Token: SeDebugPrivilege 3336 e11ah13.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4664 wrote to memory of 3244 4664 09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe 85 PID 4664 wrote to memory of 3244 4664 09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe 85 PID 4664 wrote to memory of 3244 4664 09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe 85 PID 3244 wrote to memory of 3764 3244 tice8708.exe 86 PID 3244 wrote to memory of 3764 3244 tice8708.exe 86 PID 3244 wrote to memory of 3764 3244 tice8708.exe 86 PID 3764 wrote to memory of 4300 3764 tice3371.exe 87 PID 3764 wrote to memory of 4300 3764 tice3371.exe 87 PID 3764 wrote to memory of 3052 3764 tice3371.exe 93 PID 3764 wrote to memory of 3052 3764 tice3371.exe 93 PID 3764 wrote to memory of 3052 3764 tice3371.exe 93 PID 3244 wrote to memory of 4968 3244 tice8708.exe 96 PID 3244 wrote to memory of 4968 3244 tice8708.exe 96 PID 3244 wrote to memory of 4968 3244 tice8708.exe 96 PID 4664 wrote to memory of 3336 4664 09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe 101 PID 4664 wrote to memory of 3336 4664 09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe 101 PID 4664 wrote to memory of 3336 4664 09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe"C:\Users\Admin\AppData\Local\Temp\09d6f22b490413d01e4bd3f8a8685e9517a8eb8d4a474d7ff4f93bdf3ec570d2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice8708.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice8708.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3371.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3371.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1121zF.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1121zF.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c34cG15.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c34cG15.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 10885⤵
- Program crash
PID:5076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dEyci18.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dEyci18.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 13524⤵
- Program crash
PID:1896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e11ah13.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e11ah13.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3052 -ip 30521⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4968 -ip 49681⤵PID:2028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
729KB
MD575883df0d0aa5c2c58f58d79bcf61fd3
SHA1b5f02ff044b679a29a521ced5d5bc01029bc6281
SHA25630409b2b18f4ee2176fa3f0191bf1d00442fd4f89202a0023fd0f25a0a18cf32
SHA5123a78a470e3ef9d61fd28975a8fbc6ce61321ad89d90af47ad26b5fdb594830237ba065b782acc3a49a5431b19bb19810c965a2f8e92a7398282af9d1a9bc6415
-
Filesize
729KB
MD575883df0d0aa5c2c58f58d79bcf61fd3
SHA1b5f02ff044b679a29a521ced5d5bc01029bc6281
SHA25630409b2b18f4ee2176fa3f0191bf1d00442fd4f89202a0023fd0f25a0a18cf32
SHA5123a78a470e3ef9d61fd28975a8fbc6ce61321ad89d90af47ad26b5fdb594830237ba065b782acc3a49a5431b19bb19810c965a2f8e92a7398282af9d1a9bc6415
-
Filesize
408KB
MD520ea1430d28e5d1026440bf1d974bdee
SHA1f85227451c21635d68a27ed91080bc3d17645ff8
SHA2560caa4ed6e32a79dcb0e4f27e1db340971447849bc3cd5d43f6b44d2ee4707778
SHA5120ba44360a735e7b701d681a6a3451f8aa675306a74a858bacf854b3fa31eeeb58ccfc811ab9e55526ed69eae39fea3867f385be452cbca46c457fb6aefb6776b
-
Filesize
408KB
MD520ea1430d28e5d1026440bf1d974bdee
SHA1f85227451c21635d68a27ed91080bc3d17645ff8
SHA2560caa4ed6e32a79dcb0e4f27e1db340971447849bc3cd5d43f6b44d2ee4707778
SHA5120ba44360a735e7b701d681a6a3451f8aa675306a74a858bacf854b3fa31eeeb58ccfc811ab9e55526ed69eae39fea3867f385be452cbca46c457fb6aefb6776b
-
Filesize
365KB
MD50a7558a22f7a4e990dcb205d4b863c5f
SHA191ef6fbbb11362d1adc69bc82e4b078b02090510
SHA2562293e8a90c207897754f36ef76b4519e78d5a3bc0cad73e83864d47e61c56788
SHA512b859ec100b9b2bba35b0f9337c6d44a4303493cf06413312edae490bf0c5fb7c125340b483dc2f20c50803fc008c2762c8060a94ca8c7339eec3b1e4348c5d46
-
Filesize
365KB
MD50a7558a22f7a4e990dcb205d4b863c5f
SHA191ef6fbbb11362d1adc69bc82e4b078b02090510
SHA2562293e8a90c207897754f36ef76b4519e78d5a3bc0cad73e83864d47e61c56788
SHA512b859ec100b9b2bba35b0f9337c6d44a4303493cf06413312edae490bf0c5fb7c125340b483dc2f20c50803fc008c2762c8060a94ca8c7339eec3b1e4348c5d46
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD56cab6d8cacbddb6168fe5e8bc0df7e4e
SHA145389dfbd6a2a16f34cabaf423c1eb0c0f995de1
SHA256ac0f9bcd5341d907a23786d8dac38c08180bb8cfefdc5feda75f49101d208b07
SHA512b4465ca744dfce5ba8c536927ae598f4924fdbb5ffc12508aed2a0ec8e9b51988683ff35935bba070f51fd43286c3814ff085147495e38ee24e605ec4f87a5bb
-
Filesize
351KB
MD56cab6d8cacbddb6168fe5e8bc0df7e4e
SHA145389dfbd6a2a16f34cabaf423c1eb0c0f995de1
SHA256ac0f9bcd5341d907a23786d8dac38c08180bb8cfefdc5feda75f49101d208b07
SHA512b4465ca744dfce5ba8c536927ae598f4924fdbb5ffc12508aed2a0ec8e9b51988683ff35935bba070f51fd43286c3814ff085147495e38ee24e605ec4f87a5bb