Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe
Resource
win10v2004-20230220-en
General
-
Target
96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe
-
Size
793KB
-
MD5
7bf4dd892b8197264acdbb81dc74cff4
-
SHA1
c64d3d706f95997ee0e0d1be5253aae3338a46a1
-
SHA256
96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e
-
SHA512
56dcd8dca12651d46c8e4e1574e2b0f77917631fc3c7780ea4c26404c11a7a80cd49dc62354f1dc29f844de45db98a49aa1cb4c6b2c84505621bdb0fab6d92c1
-
SSDEEP
24576:kyzDVzK0ZgYeERQKUsJqivlcDl2I2QvsR:zzDfZO2xpvSYIvs
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2469Fx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2469Fx.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c31Dx20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c31Dx20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c31Dx20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c31Dx20.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2469Fx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2469Fx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2469Fx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2469Fx.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c31Dx20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c31Dx20.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4024-205-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-206-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-208-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-216-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-214-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-212-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-210-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-218-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-220-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-222-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-224-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-226-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-228-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-230-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-232-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-234-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-236-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4024-1122-0x0000000004BD0000-0x0000000004BE0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4600 tice4506.exe 1552 tice0648.exe 2784 b2469Fx.exe 2640 c31Dx20.exe 4024 dOsIv82.exe 3844 e48oV95.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2469Fx.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c31Dx20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c31Dx20.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice4506.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice4506.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice0648.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice0648.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4724 2640 WerFault.exe 98 4780 4024 WerFault.exe 104 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2784 b2469Fx.exe 2784 b2469Fx.exe 2640 c31Dx20.exe 2640 c31Dx20.exe 4024 dOsIv82.exe 4024 dOsIv82.exe 3844 e48oV95.exe 3844 e48oV95.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2784 b2469Fx.exe Token: SeDebugPrivilege 2640 c31Dx20.exe Token: SeDebugPrivilege 4024 dOsIv82.exe Token: SeDebugPrivilege 3844 e48oV95.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4600 2012 96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe 86 PID 2012 wrote to memory of 4600 2012 96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe 86 PID 2012 wrote to memory of 4600 2012 96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe 86 PID 4600 wrote to memory of 1552 4600 tice4506.exe 87 PID 4600 wrote to memory of 1552 4600 tice4506.exe 87 PID 4600 wrote to memory of 1552 4600 tice4506.exe 87 PID 1552 wrote to memory of 2784 1552 tice0648.exe 88 PID 1552 wrote to memory of 2784 1552 tice0648.exe 88 PID 1552 wrote to memory of 2640 1552 tice0648.exe 98 PID 1552 wrote to memory of 2640 1552 tice0648.exe 98 PID 1552 wrote to memory of 2640 1552 tice0648.exe 98 PID 4600 wrote to memory of 4024 4600 tice4506.exe 104 PID 4600 wrote to memory of 4024 4600 tice4506.exe 104 PID 4600 wrote to memory of 4024 4600 tice4506.exe 104 PID 2012 wrote to memory of 3844 2012 96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe 109 PID 2012 wrote to memory of 3844 2012 96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe 109 PID 2012 wrote to memory of 3844 2012 96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe"C:\Users\Admin\AppData\Local\Temp\96423c11ee60508a161c301b8a18a1dbebc243f943f7f50db0a8d8af8e61b18e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4506.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4506.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0648.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0648.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2469Fx.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2469Fx.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c31Dx20.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c31Dx20.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 10805⤵
- Program crash
PID:4724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOsIv82.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOsIv82.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 18284⤵
- Program crash
PID:4780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48oV95.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e48oV95.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2640 -ip 26401⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4024 -ip 40241⤵PID:5036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
648KB
MD50c9d50bb2a06798771006ad0963d0a28
SHA134432045f9997cb2b71e3aa3ec12f50bb6777fee
SHA256f40ec6c5331c3716939310580e502ed4ec780c96f8f5dc51e7a624f0917310f2
SHA512cf4bb040fe71db9eb4283089eba22974433d24632d96b3163f3b8bf84b486c106b3501b9ed95be0e7dce700e11123ff844bce5f5661026df3a31d27b8358e7a3
-
Filesize
648KB
MD50c9d50bb2a06798771006ad0963d0a28
SHA134432045f9997cb2b71e3aa3ec12f50bb6777fee
SHA256f40ec6c5331c3716939310580e502ed4ec780c96f8f5dc51e7a624f0917310f2
SHA512cf4bb040fe71db9eb4283089eba22974433d24632d96b3163f3b8bf84b486c106b3501b9ed95be0e7dce700e11123ff844bce5f5661026df3a31d27b8358e7a3
-
Filesize
283KB
MD562c921f7b7c69930f0a7e8154d7eaa82
SHA182790acb68075d8b4d68e9fe6f853dbd2430fbdd
SHA256ded792a57fcdb37dd0b00f6bee72a1101555da7febbaa94f6e05f20dc0bcfe1e
SHA512dc700e4a6eaf39054c6024f0c76f6ef1826295325823c04fa3a7db06119ee9505fa0301c633b2ab68f3c8f508dfb6b31468ce3d940e576097e969b185931918b
-
Filesize
283KB
MD562c921f7b7c69930f0a7e8154d7eaa82
SHA182790acb68075d8b4d68e9fe6f853dbd2430fbdd
SHA256ded792a57fcdb37dd0b00f6bee72a1101555da7febbaa94f6e05f20dc0bcfe1e
SHA512dc700e4a6eaf39054c6024f0c76f6ef1826295325823c04fa3a7db06119ee9505fa0301c633b2ab68f3c8f508dfb6b31468ce3d940e576097e969b185931918b
-
Filesize
325KB
MD5dc95bb959d880c60feb4602b65330b02
SHA19ace0aaf6c15f74791fe07104995e7dfbcae5c37
SHA2562e3c68332c98d9d685f80c3df81cd8e938d72e897e505366c08cf1b74dd2be58
SHA512ef08cdc415e89e1f8f0f531c13be5e9dfb4b4662e6cb5e40548a7e5495c3adbd6d7c817b3f7dce808b2524ff6fe86b0dd816663382b1e113ba4d1a152fe5a4a5
-
Filesize
325KB
MD5dc95bb959d880c60feb4602b65330b02
SHA19ace0aaf6c15f74791fe07104995e7dfbcae5c37
SHA2562e3c68332c98d9d685f80c3df81cd8e938d72e897e505366c08cf1b74dd2be58
SHA512ef08cdc415e89e1f8f0f531c13be5e9dfb4b4662e6cb5e40548a7e5495c3adbd6d7c817b3f7dce808b2524ff6fe86b0dd816663382b1e113ba4d1a152fe5a4a5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD5a5c55cf53638896d2ca1b18cb70d7645
SHA1f056ace5d54d22c3956e814654500f49ffe6ae45
SHA256c1af6b94005d52666c93322d7d479569bcab9248bcf6e8d5784f7e3d719a5bde
SHA5120f61dded83b7d024e833e4c716f2074cae12f5e33d0056cf2c13160554d6f295db8c2e0719fafaef2d92ba7165404f5dba0fe070335c520cac6c126c5176868a
-
Filesize
226KB
MD5a5c55cf53638896d2ca1b18cb70d7645
SHA1f056ace5d54d22c3956e814654500f49ffe6ae45
SHA256c1af6b94005d52666c93322d7d479569bcab9248bcf6e8d5784f7e3d719a5bde
SHA5120f61dded83b7d024e833e4c716f2074cae12f5e33d0056cf2c13160554d6f295db8c2e0719fafaef2d92ba7165404f5dba0fe070335c520cac6c126c5176868a