Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
77s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2023, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe
Resource
win10v2004-20230220-en
General
-
Target
96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe
-
Size
792KB
-
MD5
ec6f94af241a9a9b582872e37202c676
-
SHA1
4b6c7c17ac8d5e0614388159b315c4a5ce2d7392
-
SHA256
96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf
-
SHA512
72f1a2eb3dac4b1485ce7fb21555a36d6b9a7af88efbba50fd9f70ee15fcc7e99f6851dff412f3fed3b65c8916cd00b68a2c91d2a0644b2d2d3b359c4c01f81c
-
SSDEEP
24576:myQVf0rsoE2bHIA01Uox14Rk44sOYrCyPO:1Q10woEGu1UeORCsOOP
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1040ln.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1040ln.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1040ln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b1040ln.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1040ln.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1040ln.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c21qu47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c21qu47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c21qu47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c21qu47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c21qu47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c21qu47.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/956-202-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-201-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-204-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-206-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-208-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-210-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-212-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-214-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-216-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-218-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-220-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-222-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-224-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-226-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-228-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-230-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-232-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-234-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/956-404-0x0000000002580000-0x0000000002590000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 336 tice1194.exe 4296 tice8161.exe 1628 b1040ln.exe 1820 c21qu47.exe 956 dDnlk81.exe 4644 e74oe66.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1040ln.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c21qu47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c21qu47.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice1194.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice1194.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice8161.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice8161.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 764 1820 WerFault.exe 89 4568 956 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1628 b1040ln.exe 1628 b1040ln.exe 1820 c21qu47.exe 1820 c21qu47.exe 956 dDnlk81.exe 956 dDnlk81.exe 4644 e74oe66.exe 4644 e74oe66.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1628 b1040ln.exe Token: SeDebugPrivilege 1820 c21qu47.exe Token: SeDebugPrivilege 956 dDnlk81.exe Token: SeDebugPrivilege 4644 e74oe66.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4160 wrote to memory of 336 4160 96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe 83 PID 4160 wrote to memory of 336 4160 96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe 83 PID 4160 wrote to memory of 336 4160 96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe 83 PID 336 wrote to memory of 4296 336 tice1194.exe 84 PID 336 wrote to memory of 4296 336 tice1194.exe 84 PID 336 wrote to memory of 4296 336 tice1194.exe 84 PID 4296 wrote to memory of 1628 4296 tice8161.exe 85 PID 4296 wrote to memory of 1628 4296 tice8161.exe 85 PID 4296 wrote to memory of 1820 4296 tice8161.exe 89 PID 4296 wrote to memory of 1820 4296 tice8161.exe 89 PID 4296 wrote to memory of 1820 4296 tice8161.exe 89 PID 336 wrote to memory of 956 336 tice1194.exe 93 PID 336 wrote to memory of 956 336 tice1194.exe 93 PID 336 wrote to memory of 956 336 tice1194.exe 93 PID 4160 wrote to memory of 4644 4160 96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe 107 PID 4160 wrote to memory of 4644 4160 96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe 107 PID 4160 wrote to memory of 4644 4160 96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe"C:\Users\Admin\AppData\Local\Temp\96967a4221142488b3ee4bd06b2adbd16782ffa466f9732a240ef246f40101bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1194.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice1194.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8161.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice8161.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1040ln.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1040ln.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c21qu47.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c21qu47.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 10805⤵
- Program crash
PID:764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDnlk81.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dDnlk81.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 13524⤵
- Program crash
PID:4568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e74oe66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e74oe66.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1820 -ip 18201⤵PID:5024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 956 -ip 9561⤵PID:4784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
647KB
MD5c1fceb65ded603312bade8b862ea04c5
SHA1b2a5d433b8c87ccc471d477f690f5466d24a3bda
SHA25683f1c30dc9e6b07edb84a3c235cc5df62c0249cb79975bbfc0d7387a41237524
SHA512944e86763f20ae9ef2b178e70849bc59b952c5e3c3c1995f231daf02dc6c4b89875a69cb642bd726b2b3d5c9158c4748b31bb7555dbf612bcedde4b8b7b98f53
-
Filesize
647KB
MD5c1fceb65ded603312bade8b862ea04c5
SHA1b2a5d433b8c87ccc471d477f690f5466d24a3bda
SHA25683f1c30dc9e6b07edb84a3c235cc5df62c0249cb79975bbfc0d7387a41237524
SHA512944e86763f20ae9ef2b178e70849bc59b952c5e3c3c1995f231daf02dc6c4b89875a69cb642bd726b2b3d5c9158c4748b31bb7555dbf612bcedde4b8b7b98f53
-
Filesize
283KB
MD54aaad586c9f453d13863b9fd4de17bd7
SHA1c480e0f71dd8e59cf9ed619f11a74b4c98546b76
SHA256725e4ebb675a0cf2b6336342bbbe14993bee16bece117474b881028c7860d0bc
SHA5124cf997c8d43490e487a1dca066b5c968ff0fc489a532730e9ef4b85d711537f92f023f59be6717a2c0c5921967682bf0114ea4fb6f3df05cdab94de1d64699af
-
Filesize
283KB
MD54aaad586c9f453d13863b9fd4de17bd7
SHA1c480e0f71dd8e59cf9ed619f11a74b4c98546b76
SHA256725e4ebb675a0cf2b6336342bbbe14993bee16bece117474b881028c7860d0bc
SHA5124cf997c8d43490e487a1dca066b5c968ff0fc489a532730e9ef4b85d711537f92f023f59be6717a2c0c5921967682bf0114ea4fb6f3df05cdab94de1d64699af
-
Filesize
324KB
MD54fa61b2da0f2f983d8ba1656446e1018
SHA16a664f266292773c91f7249b291ab9b1a12ffc69
SHA256c56e73bc4d726056e7c6f1547a78b2b0f3976432b10dbe257a459617dba29994
SHA512a03f70fe68279590fcc72482aa3124fccd70cde9c8fa3a5001d8dff52d965f3b53e4374819a7ae1f870cbfb803903aa150a161cd27f669c340e213f7d3e06182
-
Filesize
324KB
MD54fa61b2da0f2f983d8ba1656446e1018
SHA16a664f266292773c91f7249b291ab9b1a12ffc69
SHA256c56e73bc4d726056e7c6f1547a78b2b0f3976432b10dbe257a459617dba29994
SHA512a03f70fe68279590fcc72482aa3124fccd70cde9c8fa3a5001d8dff52d965f3b53e4374819a7ae1f870cbfb803903aa150a161cd27f669c340e213f7d3e06182
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
225KB
MD59da0a12570523b034c83fbb1fcc95fd2
SHA1f759365da1af90e7c488df24862f81a0e61d3fed
SHA256a8eb55858c0760ef9c0b89f90bff12094babf82d3a193d078fbd4577c83e0785
SHA512b3a9b182c4d3ba0c01fe9e64cac7ae5ced09286c1727592ce0a1ff349bc54f800ead38cdbfc92ffb48cee95ad57cf6f0467fe0c1b9c1d8d15ebd1cbdaf7ff8bd
-
Filesize
225KB
MD59da0a12570523b034c83fbb1fcc95fd2
SHA1f759365da1af90e7c488df24862f81a0e61d3fed
SHA256a8eb55858c0760ef9c0b89f90bff12094babf82d3a193d078fbd4577c83e0785
SHA512b3a9b182c4d3ba0c01fe9e64cac7ae5ced09286c1727592ce0a1ff349bc54f800ead38cdbfc92ffb48cee95ad57cf6f0467fe0c1b9c1d8d15ebd1cbdaf7ff8bd