Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe
Resource
win10v2004-20230220-en
General
-
Target
4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe
-
Size
851KB
-
MD5
dd1c98a6ee3edc798f3acb4c5122a3f2
-
SHA1
f7ccf6f69b40208f16feaedc1faa923b003ede3d
-
SHA256
4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06
-
SHA512
6bd5c6361e770136a8d17a3576553879f42b7a3be294fe9b3664dae5de0f328e75e8dd1f84d5c778c409271981c433e1ae0583baad4f665ab72704c8af90c5c5
-
SSDEEP
12288:eMrGy90WgI3V9PBNHwqTw0+kVXKEFGNtIPzdjnJUXtQ9lnqk3vDb7xWmUQIWz9NM:sybV3XDwqT3VXKeQ0j8Kld3vD35v5G
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b1131Da.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b1131Da.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b1131Da.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c82nS76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b1131Da.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b1131Da.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b1131Da.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c82nS76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c82nS76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c82nS76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c82nS76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c82nS76.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
resource yara_rule behavioral1/memory/3652-206-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-207-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-211-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-213-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-215-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-217-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-219-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-221-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-223-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-225-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-227-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-229-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-233-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-231-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-235-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-237-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/3652-239-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1920 tice3827.exe 972 tice3655.exe 1664 b1131Da.exe 2612 c82nS76.exe 3652 dOejq88.exe 4092 e50QW41.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b1131Da.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c82nS76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c82nS76.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice3827.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice3655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice3655.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice3827.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2432 2612 WerFault.exe 92 1924 3652 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1664 b1131Da.exe 1664 b1131Da.exe 2612 c82nS76.exe 2612 c82nS76.exe 3652 dOejq88.exe 3652 dOejq88.exe 4092 e50QW41.exe 4092 e50QW41.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1664 b1131Da.exe Token: SeDebugPrivilege 2612 c82nS76.exe Token: SeDebugPrivilege 3652 dOejq88.exe Token: SeDebugPrivilege 4092 e50QW41.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3720 wrote to memory of 1920 3720 4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe 86 PID 3720 wrote to memory of 1920 3720 4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe 86 PID 3720 wrote to memory of 1920 3720 4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe 86 PID 1920 wrote to memory of 972 1920 tice3827.exe 87 PID 1920 wrote to memory of 972 1920 tice3827.exe 87 PID 1920 wrote to memory of 972 1920 tice3827.exe 87 PID 972 wrote to memory of 1664 972 tice3655.exe 88 PID 972 wrote to memory of 1664 972 tice3655.exe 88 PID 972 wrote to memory of 2612 972 tice3655.exe 92 PID 972 wrote to memory of 2612 972 tice3655.exe 92 PID 972 wrote to memory of 2612 972 tice3655.exe 92 PID 1920 wrote to memory of 3652 1920 tice3827.exe 95 PID 1920 wrote to memory of 3652 1920 tice3827.exe 95 PID 1920 wrote to memory of 3652 1920 tice3827.exe 95 PID 3720 wrote to memory of 4092 3720 4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe 104 PID 3720 wrote to memory of 4092 3720 4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe 104 PID 3720 wrote to memory of 4092 3720 4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe"C:\Users\Admin\AppData\Local\Temp\4757530ebbc0ef55ec6780e21f60e3cf996a07433d655fbd6413d4f087e44f06.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3827.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3827.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3655.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice3655.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1131Da.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1131Da.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c82nS76.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c82nS76.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 10805⤵
- Program crash
PID:2432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOejq88.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dOejq88.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 14724⤵
- Program crash
PID:1924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e50QW41.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e50QW41.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2612 -ip 26121⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3652 -ip 36521⤵PID:436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
707KB
MD53c530634cdd8500a0d14adbaf9b243d7
SHA13886688e35dff19c5622bc9c8615ea9771ff0eb9
SHA2563e4ca6314113495aa8df78fa1144f04868861e136bfddea4f987e19fe820ccb1
SHA5125556e1e96eb6a111eabd01eba31d653a55652dab3429da1ecb03e626fbc87c6ad9c6c4b0972745aa847385cca5c1fb79af24d679232a47f8939c43c6be6cdb7b
-
Filesize
707KB
MD53c530634cdd8500a0d14adbaf9b243d7
SHA13886688e35dff19c5622bc9c8615ea9771ff0eb9
SHA2563e4ca6314113495aa8df78fa1144f04868861e136bfddea4f987e19fe820ccb1
SHA5125556e1e96eb6a111eabd01eba31d653a55652dab3429da1ecb03e626fbc87c6ad9c6c4b0972745aa847385cca5c1fb79af24d679232a47f8939c43c6be6cdb7b
-
Filesize
391KB
MD57dfa412b95684bffd9ec29c87e53da16
SHA193780785f2bb326e42e67e10e1bc4b8d7f3ef00e
SHA2568156b52d041269aebff00f45b5a6bd9083f4607aad837ce3d2f678d198de1a90
SHA512c86685f27563482592fed62f2ab682884d8c67e18f98793595f4fcd18920bda58cf94eedb9e98e127dc6dc896d7f6608f68248201dee4ee7ef3a69d36ae29bac
-
Filesize
391KB
MD57dfa412b95684bffd9ec29c87e53da16
SHA193780785f2bb326e42e67e10e1bc4b8d7f3ef00e
SHA2568156b52d041269aebff00f45b5a6bd9083f4607aad837ce3d2f678d198de1a90
SHA512c86685f27563482592fed62f2ab682884d8c67e18f98793595f4fcd18920bda58cf94eedb9e98e127dc6dc896d7f6608f68248201dee4ee7ef3a69d36ae29bac
-
Filesize
353KB
MD55bd4f24f43b015d33290184c0a8222ab
SHA1489217149d3c56c43bec62b7d594140b9814707d
SHA25661d145cdf716577d93c3b5d0135cc43d17d2466f8f9744f1a75691ae4b8dee47
SHA5124a6a484b2667db849ad9590ab755b9d5dc2799b4fedcb78e2ecf9e9292009955b477098866a3cbf5fe47507249d33335eb20bd0b6ae1ad53e8dd30066c4de929
-
Filesize
353KB
MD55bd4f24f43b015d33290184c0a8222ab
SHA1489217149d3c56c43bec62b7d594140b9814707d
SHA25661d145cdf716577d93c3b5d0135cc43d17d2466f8f9744f1a75691ae4b8dee47
SHA5124a6a484b2667db849ad9590ab755b9d5dc2799b4fedcb78e2ecf9e9292009955b477098866a3cbf5fe47507249d33335eb20bd0b6ae1ad53e8dd30066c4de929
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
333KB
MD545c0300848a95cf4290e29539f6aa8bb
SHA1d4b99653cd406d72b91ba0119453deb033fe88f8
SHA256e15008f7db24f36c7ea52a6ebfa9dae8cd73742defa916d924efe7d65d372bed
SHA512238128c66943bf6e4f77656ef08e7baa64b503015a21330f91b3361743eb0fe49765966a1329e89f6544dbe95d780f61cec81b6ac9af4eca78652be075c4b6e3
-
Filesize
333KB
MD545c0300848a95cf4290e29539f6aa8bb
SHA1d4b99653cd406d72b91ba0119453deb033fe88f8
SHA256e15008f7db24f36c7ea52a6ebfa9dae8cd73742defa916d924efe7d65d372bed
SHA512238128c66943bf6e4f77656ef08e7baa64b503015a21330f91b3361743eb0fe49765966a1329e89f6544dbe95d780f61cec81b6ac9af4eca78652be075c4b6e3