Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe
Resource
win10v2004-20230220-en
General
-
Target
9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe
-
Size
819KB
-
MD5
0113de7cd2aad99355e8ce5e471b0a3e
-
SHA1
a32b726e4fd135fc7b073ef91ec73544cf4d8cc6
-
SHA256
9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c
-
SHA512
233631c61025ae126bd9e324047d1f47a8d8be4503b66f978a706f1c466265b676b1736ca07f3abef99b0a14c2c0627b277be8fb6005d0d1d73648d2540392ce
-
SSDEEP
24576:DyDwHXBqGlhiKdvWGh1dsSw8U8OkzVMl:WDwBqGfbk+e
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f3951Ru.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f3951Ru.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f3951Ru.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h96uR51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h96uR51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f3951Ru.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f3951Ru.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f3951Ru.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h96uR51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h96uR51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h96uR51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h96uR51.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4364-203-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-204-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-206-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-208-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-210-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-212-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-214-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-216-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-218-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-220-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-222-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-225-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-228-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-232-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-234-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-236-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-238-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-240-0x0000000002940000-0x000000000297E000-memory.dmp family_redline behavioral1/memory/4364-1124-0x0000000004F90000-0x0000000004FA0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 800 niba3939.exe 2080 niba7399.exe 1624 f3951Ru.exe 4196 h96uR51.exe 4364 icCRk01.exe 2032 l34GR61.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h96uR51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f3951Ru.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h96uR51.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba3939.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba3939.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba7399.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba7399.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4936 4196 WerFault.exe 92 2740 4364 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1624 f3951Ru.exe 1624 f3951Ru.exe 4196 h96uR51.exe 4196 h96uR51.exe 4364 icCRk01.exe 4364 icCRk01.exe 2032 l34GR61.exe 2032 l34GR61.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1624 f3951Ru.exe Token: SeDebugPrivilege 4196 h96uR51.exe Token: SeDebugPrivilege 4364 icCRk01.exe Token: SeDebugPrivilege 2032 l34GR61.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1828 wrote to memory of 800 1828 9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe 85 PID 1828 wrote to memory of 800 1828 9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe 85 PID 1828 wrote to memory of 800 1828 9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe 85 PID 800 wrote to memory of 2080 800 niba3939.exe 86 PID 800 wrote to memory of 2080 800 niba3939.exe 86 PID 800 wrote to memory of 2080 800 niba3939.exe 86 PID 2080 wrote to memory of 1624 2080 niba7399.exe 87 PID 2080 wrote to memory of 1624 2080 niba7399.exe 87 PID 2080 wrote to memory of 4196 2080 niba7399.exe 92 PID 2080 wrote to memory of 4196 2080 niba7399.exe 92 PID 2080 wrote to memory of 4196 2080 niba7399.exe 92 PID 800 wrote to memory of 4364 800 niba3939.exe 98 PID 800 wrote to memory of 4364 800 niba3939.exe 98 PID 800 wrote to memory of 4364 800 niba3939.exe 98 PID 1828 wrote to memory of 2032 1828 9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe 103 PID 1828 wrote to memory of 2032 1828 9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe 103 PID 1828 wrote to memory of 2032 1828 9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe"C:\Users\Admin\AppData\Local\Temp\9974afe38d2493cfc9d1677dfb2738b1b48302aa13b8dd79a5b06d961cb2e23c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3939.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3939.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7399.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7399.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3951Ru.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3951Ru.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h96uR51.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h96uR51.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 10845⤵
- Program crash
PID:4936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\icCRk01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\icCRk01.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 13604⤵
- Program crash
PID:2740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34GR61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l34GR61.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4196 -ip 41961⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4364 -ip 43641⤵PID:3692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
676KB
MD5373d2a9db2260341092b7353929241b8
SHA17dbddc030191a201d0d485097ca0ff06adec95ef
SHA256736d95880aa6061051f065c3506b981965cdeca5676b257f21e6a5439258fa93
SHA51203d5b64c4bf6c3efecc9a8ccf0f87fd14518e38f3d671fdc097aeda702ccd29b642185229e1139c9ad12998749f58131b45b7ca54419cc72a0476a4206a69116
-
Filesize
676KB
MD5373d2a9db2260341092b7353929241b8
SHA17dbddc030191a201d0d485097ca0ff06adec95ef
SHA256736d95880aa6061051f065c3506b981965cdeca5676b257f21e6a5439258fa93
SHA51203d5b64c4bf6c3efecc9a8ccf0f87fd14518e38f3d671fdc097aeda702ccd29b642185229e1139c9ad12998749f58131b45b7ca54419cc72a0476a4206a69116
-
Filesize
349KB
MD52d172a3f3badca5e59590286d264448c
SHA1f44bcc7c2c6bf2ee0beb89a1acaa4ea4b553a2d3
SHA256931ef79bca7bb3b58aa049624a26afa501ceeab1d59f199785cccda86656d510
SHA5123410854582b9281fdf482aab55f762fb571035bb74deea699f6a595eb0b2b9422b97f19b6bda9b46cab71c29869b7701325e2d97d0fb45f404fae84eb0aceed3
-
Filesize
349KB
MD52d172a3f3badca5e59590286d264448c
SHA1f44bcc7c2c6bf2ee0beb89a1acaa4ea4b553a2d3
SHA256931ef79bca7bb3b58aa049624a26afa501ceeab1d59f199785cccda86656d510
SHA5123410854582b9281fdf482aab55f762fb571035bb74deea699f6a595eb0b2b9422b97f19b6bda9b46cab71c29869b7701325e2d97d0fb45f404fae84eb0aceed3
-
Filesize
334KB
MD5a1745cd5b49c5ca6b5b7f64f3adca526
SHA12f093fda0006d9f930f6fa99380af929238c6dd1
SHA256199c693d9ad59d5f9c1cccd1e10b3595f6cb10c36eb5df11a0225a6c10470569
SHA5128267ce01db9b310bc673c84dd29dd8a8316ab362d28be6c2bc74be9e6dc81b52f3ecb10a3353671c8c8433bb2b4b167ccfade1feed06b3ad8a3991e84bfc44f3
-
Filesize
334KB
MD5a1745cd5b49c5ca6b5b7f64f3adca526
SHA12f093fda0006d9f930f6fa99380af929238c6dd1
SHA256199c693d9ad59d5f9c1cccd1e10b3595f6cb10c36eb5df11a0225a6c10470569
SHA5128267ce01db9b310bc673c84dd29dd8a8316ab362d28be6c2bc74be9e6dc81b52f3ecb10a3353671c8c8433bb2b4b167ccfade1feed06b3ad8a3991e84bfc44f3
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD58ed2502d862db8aabae946fc1c99a996
SHA1b28eda7b6537c81116d4e5fe1f6dbb4e39c558bf
SHA2561ecf6213e70210e08019632939cabae1569a160dab78656140fc938d31dbfe1a
SHA512b31a8e4c0297d77e9dc0a68bda4f79642e7fa6c11eff91499991f47b058d051c937b31cdb69f5662a9bd05f808496d06589c9cc441161d43ec642e4739636ab5
-
Filesize
290KB
MD58ed2502d862db8aabae946fc1c99a996
SHA1b28eda7b6537c81116d4e5fe1f6dbb4e39c558bf
SHA2561ecf6213e70210e08019632939cabae1569a160dab78656140fc938d31dbfe1a
SHA512b31a8e4c0297d77e9dc0a68bda4f79642e7fa6c11eff91499991f47b058d051c937b31cdb69f5662a9bd05f808496d06589c9cc441161d43ec642e4739636ab5