Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe
Resource
win10v2004-20230220-en
General
-
Target
361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe
-
Size
866KB
-
MD5
c83218e70dbb9541577160e0d2dc423a
-
SHA1
240497c3f45113e1f0f0eb79930701602fdba79c
-
SHA256
361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6
-
SHA512
dc638948ec1cc2bbcb5d6c63b502531a2b9abf0a2ad2b10cce7423a3650eb02891697d85a3693622c8ef79ee325c7a7f9e055aeffe342638386547df20dada34
-
SSDEEP
24576:syOmU/08GrDn3+P6XQG/3fTpFGZj+W/5hspKU:bOs8EDn3+yAG/r2Zj+CIpK
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b2010rV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b2010rV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c94TC65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c94TC65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c94TC65.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b2010rV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b2010rV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b2010rV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b2010rV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c94TC65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c94TC65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c94TC65.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4156-207-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-210-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-208-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-212-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-214-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-216-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-218-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-220-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-222-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-224-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-226-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-228-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-230-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-232-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-234-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-236-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-238-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline behavioral1/memory/4156-240-0x0000000004C80000-0x0000000004CBE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2260 tice0212.exe 2876 tice6626.exe 3780 b2010rV.exe 3292 c94TC65.exe 4156 dusOn40.exe 404 e98cp12.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c94TC65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b2010rV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c94TC65.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice0212.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice0212.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice6626.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice6626.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4152 4156 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3780 b2010rV.exe 3780 b2010rV.exe 3292 c94TC65.exe 3292 c94TC65.exe 4156 dusOn40.exe 4156 dusOn40.exe 404 e98cp12.exe 404 e98cp12.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3780 b2010rV.exe Token: SeDebugPrivilege 3292 c94TC65.exe Token: SeDebugPrivilege 4156 dusOn40.exe Token: SeDebugPrivilege 404 e98cp12.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4520 wrote to memory of 2260 4520 361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe 86 PID 4520 wrote to memory of 2260 4520 361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe 86 PID 4520 wrote to memory of 2260 4520 361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe 86 PID 2260 wrote to memory of 2876 2260 tice0212.exe 87 PID 2260 wrote to memory of 2876 2260 tice0212.exe 87 PID 2260 wrote to memory of 2876 2260 tice0212.exe 87 PID 2876 wrote to memory of 3780 2876 tice6626.exe 88 PID 2876 wrote to memory of 3780 2876 tice6626.exe 88 PID 2876 wrote to memory of 3292 2876 tice6626.exe 93 PID 2876 wrote to memory of 3292 2876 tice6626.exe 93 PID 2876 wrote to memory of 3292 2876 tice6626.exe 93 PID 2260 wrote to memory of 4156 2260 tice0212.exe 97 PID 2260 wrote to memory of 4156 2260 tice0212.exe 97 PID 2260 wrote to memory of 4156 2260 tice0212.exe 97 PID 4520 wrote to memory of 404 4520 361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe 102 PID 4520 wrote to memory of 404 4520 361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe 102 PID 4520 wrote to memory of 404 4520 361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe"C:\Users\Admin\AppData\Local\Temp\361740fc7659a56bce2628a9f14f25369cceec3f5440aa4862951898cdf64ea6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice0212.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice0212.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6626.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice6626.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2010rV.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2010rV.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c94TC65.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c94TC65.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dusOn40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dusOn40.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 16644⤵
- Program crash
PID:4152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e98cp12.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e98cp12.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4156 -ip 41561⤵PID:1188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
721KB
MD5d23e867d07b9e9b4525326818f680389
SHA1beeafdeb957c0886d52e5f64f8d6e2d37b4b5617
SHA256a14a9cdcc327ec378f2425878b06a90da93a08829d4ece98df704c7ee551f339
SHA512c39f3b60cdcbac17ce19edd8f14fdc15fdac591a373a0f89fce859f99c36bb3525287246784c4be6415f04ee56701193a0a157fe75f62db8be5693daf9b03e29
-
Filesize
721KB
MD5d23e867d07b9e9b4525326818f680389
SHA1beeafdeb957c0886d52e5f64f8d6e2d37b4b5617
SHA256a14a9cdcc327ec378f2425878b06a90da93a08829d4ece98df704c7ee551f339
SHA512c39f3b60cdcbac17ce19edd8f14fdc15fdac591a373a0f89fce859f99c36bb3525287246784c4be6415f04ee56701193a0a157fe75f62db8be5693daf9b03e29
-
Filesize
391KB
MD5a3e89cd853ba3d955973ab35cfe492f1
SHA1f177ee3f9b087e92d7811d3a62b43bd5d6474762
SHA25696dd9153f262f38bc6bfa33deac2cb88294ad39f7ef7c337f27df28bc9bad8da
SHA512bdc4652154f9fdcf35b9a37d2563dcf2d1b82516e53600664efac4a917f2bbc719125d25e5087f9262381344d1e3b48b7552ad84e90e48acf24bbf69b3a630a0
-
Filesize
391KB
MD5a3e89cd853ba3d955973ab35cfe492f1
SHA1f177ee3f9b087e92d7811d3a62b43bd5d6474762
SHA25696dd9153f262f38bc6bfa33deac2cb88294ad39f7ef7c337f27df28bc9bad8da
SHA512bdc4652154f9fdcf35b9a37d2563dcf2d1b82516e53600664efac4a917f2bbc719125d25e5087f9262381344d1e3b48b7552ad84e90e48acf24bbf69b3a630a0
-
Filesize
368KB
MD55cc652d304a340b23a5a87c274efdff5
SHA1a4b4aacdcc113321309a84abd94c06e4a21eb3a0
SHA256cd4d8ed5b7892de7980290edaf54f82e502bc236c7121405d3622087730a4e62
SHA5128c2fb2ede42f9202e5e96eab014fa37ee547dcab7a5296e69bf0220f2fa2d35e6220707457793025be812ab20b9151494a6ebcdf2318a32fe5e276273bdeca9d
-
Filesize
368KB
MD55cc652d304a340b23a5a87c274efdff5
SHA1a4b4aacdcc113321309a84abd94c06e4a21eb3a0
SHA256cd4d8ed5b7892de7980290edaf54f82e502bc236c7121405d3622087730a4e62
SHA5128c2fb2ede42f9202e5e96eab014fa37ee547dcab7a5296e69bf0220f2fa2d35e6220707457793025be812ab20b9151494a6ebcdf2318a32fe5e276273bdeca9d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
371KB
MD5603e073218d96a5f4c9842ec6335f1ce
SHA1fe6979acc8621d5d7be3d0eb2ce91edb9c7fb6e5
SHA256c6d8f4c9e1792f08cbb338450c72af2be8a46bc0c2d3765f508f5aa932af9c4d
SHA5124321a004a891f0c08d4a26f0d6640452a281372619e8c0f84a40c571b76306ac3d19a84e4ddd40f44342eb3d6df90c4b820c8b07413577c0f0f819a1dd9f0faa
-
Filesize
371KB
MD5603e073218d96a5f4c9842ec6335f1ce
SHA1fe6979acc8621d5d7be3d0eb2ce91edb9c7fb6e5
SHA256c6d8f4c9e1792f08cbb338450c72af2be8a46bc0c2d3765f508f5aa932af9c4d
SHA5124321a004a891f0c08d4a26f0d6640452a281372619e8c0f84a40c571b76306ac3d19a84e4ddd40f44342eb3d6df90c4b820c8b07413577c0f0f819a1dd9f0faa