Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe
Resource
win10v2004-20230220-en
General
-
Target
c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe
-
Size
795KB
-
MD5
d9c90727e4ff06e693d629699e5a21a6
-
SHA1
c8483ee9f2cacaad80700777bf38acbcdaddc428
-
SHA256
c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630
-
SHA512
971c142eb4f736850587da2a28c0200965d793427e9ae3d210891d4f3e787ae29ff8fb1d768172a5529a207957fd00d5fb0a62c9b1a49f0195b4b0b6eded9255
-
SSDEEP
24576:OyzgVh8JTmnrU80KThA8YjFmkfCSh0PHLc:dzgn8JTOdomih0PHL
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b7787ut.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c48lI07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c48lI07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c48lI07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c48lI07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c48lI07.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b7787ut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b7787ut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b7787ut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b7787ut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b7787ut.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c48lI07.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1788-203-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-204-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-206-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-208-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-210-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-212-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-214-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-216-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-218-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-220-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-222-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-224-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-226-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-228-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-230-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-232-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-234-0x0000000002520000-0x000000000255E000-memory.dmp family_redline behavioral1/memory/1788-236-0x0000000002520000-0x000000000255E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1560 tice9470.exe 3480 tice4491.exe 2960 b7787ut.exe 2388 c48lI07.exe 1788 dGPXa90.exe 3956 e97oZ06.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b7787ut.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c48lI07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c48lI07.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice4491.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice4491.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice9470.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice9470.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3184 2388 WerFault.exe 93 2256 1788 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2960 b7787ut.exe 2960 b7787ut.exe 2388 c48lI07.exe 2388 c48lI07.exe 1788 dGPXa90.exe 1788 dGPXa90.exe 3956 e97oZ06.exe 3956 e97oZ06.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2960 b7787ut.exe Token: SeDebugPrivilege 2388 c48lI07.exe Token: SeDebugPrivilege 1788 dGPXa90.exe Token: SeDebugPrivilege 3956 e97oZ06.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 620 wrote to memory of 1560 620 c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe 85 PID 620 wrote to memory of 1560 620 c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe 85 PID 620 wrote to memory of 1560 620 c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe 85 PID 1560 wrote to memory of 3480 1560 tice9470.exe 86 PID 1560 wrote to memory of 3480 1560 tice9470.exe 86 PID 1560 wrote to memory of 3480 1560 tice9470.exe 86 PID 3480 wrote to memory of 2960 3480 tice4491.exe 87 PID 3480 wrote to memory of 2960 3480 tice4491.exe 87 PID 3480 wrote to memory of 2388 3480 tice4491.exe 93 PID 3480 wrote to memory of 2388 3480 tice4491.exe 93 PID 3480 wrote to memory of 2388 3480 tice4491.exe 93 PID 1560 wrote to memory of 1788 1560 tice9470.exe 96 PID 1560 wrote to memory of 1788 1560 tice9470.exe 96 PID 1560 wrote to memory of 1788 1560 tice9470.exe 96 PID 620 wrote to memory of 3956 620 c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe 104 PID 620 wrote to memory of 3956 620 c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe 104 PID 620 wrote to memory of 3956 620 c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe"C:\Users\Admin\AppData\Local\Temp\c2309eac41091ebbfcd0f7dfeccf4c3af20f443b9de383dac846ac42146bb630.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9470.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice9470.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4491.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7787ut.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7787ut.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48lI07.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48lI07.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 10805⤵
- Program crash
PID:3184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGPXa90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGPXa90.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 13524⤵
- Program crash
PID:2256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e97oZ06.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e97oZ06.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2388 -ip 23881⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1788 -ip 17881⤵PID:4360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
650KB
MD519f15a7a4dccc27b5280dd9d518ee1ba
SHA12eff10ba91eacc169fe6656f864a094af5fd756b
SHA256de15b012da5430b91f0e2b750fa008b31f1320fa577751eccdd77e9919f01856
SHA5125c16c0e99a60aad89de137fe75821b4bdc6e3f0c6337a4d112e5ccb2866005eece2c8f20368168a790c53b585d5d28b8995cd8b6bd43be643ff8a9848a05f3fa
-
Filesize
650KB
MD519f15a7a4dccc27b5280dd9d518ee1ba
SHA12eff10ba91eacc169fe6656f864a094af5fd756b
SHA256de15b012da5430b91f0e2b750fa008b31f1320fa577751eccdd77e9919f01856
SHA5125c16c0e99a60aad89de137fe75821b4bdc6e3f0c6337a4d112e5ccb2866005eece2c8f20368168a790c53b585d5d28b8995cd8b6bd43be643ff8a9848a05f3fa
-
Filesize
283KB
MD55f6cc5753ed77713d9e43b204047b4fd
SHA152b0621fbed1d04ec4d6bd9f7e61b1e6f5e652f1
SHA2565c804af2ebcd518145486fc0d8f7d81a812303b0af97c3ac896a7548d86eee71
SHA512fdbdd06c3319ebd8e8f8d135792d4cdcc0e936a8303cbfeb01b163d57fd03d410a1e728a99acc1b9a56b7177199931eb43ad37a8274399acf2b713a97e024581
-
Filesize
283KB
MD55f6cc5753ed77713d9e43b204047b4fd
SHA152b0621fbed1d04ec4d6bd9f7e61b1e6f5e652f1
SHA2565c804af2ebcd518145486fc0d8f7d81a812303b0af97c3ac896a7548d86eee71
SHA512fdbdd06c3319ebd8e8f8d135792d4cdcc0e936a8303cbfeb01b163d57fd03d410a1e728a99acc1b9a56b7177199931eb43ad37a8274399acf2b713a97e024581
-
Filesize
324KB
MD5bee077942e0fb5b4d265310a870f4bfa
SHA1f37a09f159d88182078e802c5833cb1ee3975985
SHA2567e04572abd261d34128c7e74d2f5c9ddd5f719f950853e5dbb31a77d783e38ae
SHA512e87470cb1dd826c8ff656b27abb97f06246732757bf93ead3d0bbe3ec30c7385d4c48a4ef8887b830a5b33570b1472997b54c64c051053ffac1c4a2d53c69a6c
-
Filesize
324KB
MD5bee077942e0fb5b4d265310a870f4bfa
SHA1f37a09f159d88182078e802c5833cb1ee3975985
SHA2567e04572abd261d34128c7e74d2f5c9ddd5f719f950853e5dbb31a77d783e38ae
SHA512e87470cb1dd826c8ff656b27abb97f06246732757bf93ead3d0bbe3ec30c7385d4c48a4ef8887b830a5b33570b1472997b54c64c051053ffac1c4a2d53c69a6c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
225KB
MD533231815cbd84a724f4c9812e5e61624
SHA19eb08fcfc4793dae36cfc5e43562e13075146e74
SHA2561582ab7509bfda42191e7aa43bbe8aaff0e5abf9db16c1208e52b5073b3df0a5
SHA512aea04dafd6686a9eb5659a99f398a9ed579557c1406d7d18f79c4fa39e1a600862c1d57c2814c04224a46425a915686288426479f34a60639fa0a739603cba97
-
Filesize
225KB
MD533231815cbd84a724f4c9812e5e61624
SHA19eb08fcfc4793dae36cfc5e43562e13075146e74
SHA2561582ab7509bfda42191e7aa43bbe8aaff0e5abf9db16c1208e52b5073b3df0a5
SHA512aea04dafd6686a9eb5659a99f398a9ed579557c1406d7d18f79c4fa39e1a600862c1d57c2814c04224a46425a915686288426479f34a60639fa0a739603cba97