Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe
Resource
win10v2004-20230220-en
General
-
Target
cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe
-
Size
864KB
-
MD5
29381b7ef0d8518e3a53c0f78ef14cbe
-
SHA1
3e3dbcd31af5c332e570e7fb4533910ff05ffed7
-
SHA256
cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230
-
SHA512
7b649ef8ca7ce7255b2a90372e3bb89ce144c9e2ed2d6b0281d41fe49833165abd625d3ac49739dbc6b1e59929ad255dfec30fa59e738278334d31245669d8a8
-
SSDEEP
12288:XMrsy90d8g1x8nHBAfh1OzZfV4ZwLqp74DiNZBqileuoz4Wo5iTGLNNfz:Dykp1x0HqLaneTN4DviZoz4vkI3
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8704FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8704FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8704FV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c17YL53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c17YL53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c17YL53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c17YL53.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b8704FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8704FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8704FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c17YL53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c17YL53.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2964-206-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-208-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-210-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-212-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-214-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-216-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-218-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-220-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-222-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-228-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-226-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-224-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-230-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-232-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-234-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-236-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-238-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline behavioral1/memory/2964-240-0x0000000004DA0000-0x0000000004DDE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4524 tice2538.exe 2236 tice2596.exe 1560 b8704FV.exe 4920 c17YL53.exe 2964 dvgFR26.exe 1108 e01fP24.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8704FV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c17YL53.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c17YL53.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice2538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice2538.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice2596.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice2596.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3476 4920 WerFault.exe 92 2656 2964 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1560 b8704FV.exe 1560 b8704FV.exe 4920 c17YL53.exe 4920 c17YL53.exe 2964 dvgFR26.exe 2964 dvgFR26.exe 1108 e01fP24.exe 1108 e01fP24.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1560 b8704FV.exe Token: SeDebugPrivilege 4920 c17YL53.exe Token: SeDebugPrivilege 2964 dvgFR26.exe Token: SeDebugPrivilege 1108 e01fP24.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4248 wrote to memory of 4524 4248 cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe 86 PID 4248 wrote to memory of 4524 4248 cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe 86 PID 4248 wrote to memory of 4524 4248 cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe 86 PID 4524 wrote to memory of 2236 4524 tice2538.exe 87 PID 4524 wrote to memory of 2236 4524 tice2538.exe 87 PID 4524 wrote to memory of 2236 4524 tice2538.exe 87 PID 2236 wrote to memory of 1560 2236 tice2596.exe 88 PID 2236 wrote to memory of 1560 2236 tice2596.exe 88 PID 2236 wrote to memory of 4920 2236 tice2596.exe 92 PID 2236 wrote to memory of 4920 2236 tice2596.exe 92 PID 2236 wrote to memory of 4920 2236 tice2596.exe 92 PID 4524 wrote to memory of 2964 4524 tice2538.exe 95 PID 4524 wrote to memory of 2964 4524 tice2538.exe 95 PID 4524 wrote to memory of 2964 4524 tice2538.exe 95 PID 4248 wrote to memory of 1108 4248 cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe 103 PID 4248 wrote to memory of 1108 4248 cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe 103 PID 4248 wrote to memory of 1108 4248 cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe"C:\Users\Admin\AppData\Local\Temp\cf4f0b8ce122fd8181f90cfd99fe1d29971105d88a154849993c038abdab3230.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2538.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice2538.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2596.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2596.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8704FV.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8704FV.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c17YL53.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c17YL53.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 10805⤵
- Program crash
PID:3476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvgFR26.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dvgFR26.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 13484⤵
- Program crash
PID:2656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e01fP24.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e01fP24.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4920 -ip 49201⤵PID:3056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2964 -ip 29641⤵PID:2640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
719KB
MD5e4c749fc1cf1e503ed59237cabb6772f
SHA188ed933da138bb0eeb319468349fd603a1173256
SHA256cbac3a985a8b37410372435629be7aefdd17bc00eb3e0ed9eb309a2f2accc6cf
SHA5127039351ead82cfeec840bd33c6b8d8624d56ed6c31b3c93dc0fdb396b1c00f119ce287687dd5aac8c49b7ffb27b37b43e8e66b94f3f41b11bf9950e49135b062
-
Filesize
719KB
MD5e4c749fc1cf1e503ed59237cabb6772f
SHA188ed933da138bb0eeb319468349fd603a1173256
SHA256cbac3a985a8b37410372435629be7aefdd17bc00eb3e0ed9eb309a2f2accc6cf
SHA5127039351ead82cfeec840bd33c6b8d8624d56ed6c31b3c93dc0fdb396b1c00f119ce287687dd5aac8c49b7ffb27b37b43e8e66b94f3f41b11bf9950e49135b062
-
Filesize
400KB
MD5e1f567c781b47002a1102bd8311930e0
SHA103fa7437be5e6871180b8614e57aaa0e246761b7
SHA25633aeddb92ee9d311f6ff3b749d0aca296bf676e6a4dbe184358512c90129df44
SHA5124ebfc27a97e06955f012a9e9c3307262538fd0740e970c0664131a44ef48a7d363c1e7d608559e4b1af858400130fc03901b3ec3b01a1d64d27bf1876195a971
-
Filesize
400KB
MD5e1f567c781b47002a1102bd8311930e0
SHA103fa7437be5e6871180b8614e57aaa0e246761b7
SHA25633aeddb92ee9d311f6ff3b749d0aca296bf676e6a4dbe184358512c90129df44
SHA5124ebfc27a97e06955f012a9e9c3307262538fd0740e970c0664131a44ef48a7d363c1e7d608559e4b1af858400130fc03901b3ec3b01a1d64d27bf1876195a971
-
Filesize
360KB
MD5e65aaf6b957f3c42775775f20c7076b5
SHA12d91e0f78073bff08088b993417da461c435ab67
SHA256c23ba022e69f03a03103f96385a93d3641482a90885ff2195321c0feed752451
SHA5122c8c180364fda4d268777b56a6bb44aade61927ab8351b587894ac12615b47a3c42867d7c57da39cfb17dffdfac4e9f68540208f2444ab9cc94f68ddf52443b9
-
Filesize
360KB
MD5e65aaf6b957f3c42775775f20c7076b5
SHA12d91e0f78073bff08088b993417da461c435ab67
SHA256c23ba022e69f03a03103f96385a93d3641482a90885ff2195321c0feed752451
SHA5122c8c180364fda4d268777b56a6bb44aade61927ab8351b587894ac12615b47a3c42867d7c57da39cfb17dffdfac4e9f68540208f2444ab9cc94f68ddf52443b9
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
342KB
MD5091cfb9043636799020353a534ccf670
SHA1b09680af876aa0a88985379758cd9fc370be16c2
SHA256b75ea51530585914f6d012599cc4a65fb906ca57176aabe0d8c7d271b156135d
SHA512551d04d504de7d94d21e7703e7f221ebc5f0b6b462f8f9795ee5a57de4ab50d862d30656bc5aab6cd84e29071975ba0f4f6428559dd947afb835150433266cde
-
Filesize
342KB
MD5091cfb9043636799020353a534ccf670
SHA1b09680af876aa0a88985379758cd9fc370be16c2
SHA256b75ea51530585914f6d012599cc4a65fb906ca57176aabe0d8c7d271b156135d
SHA512551d04d504de7d94d21e7703e7f221ebc5f0b6b462f8f9795ee5a57de4ab50d862d30656bc5aab6cd84e29071975ba0f4f6428559dd947afb835150433266cde