Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe
Resource
win10v2004-20230220-en
General
-
Target
f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe
-
Size
836KB
-
MD5
e1f92a580e22e966c2a0c69c9efbfd6c
-
SHA1
f1531bec55565b87ce7d8cc47a6f42e06b05331d
-
SHA256
f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd
-
SHA512
b56ed9390f7bc68f192dbfa28fe7979a4d97c3e0faf7e7e2d884bc2f56681313c67916c5071edc3f8c557b4d40dfa122b1203190bea0b2522245dbe3a0b57d7f
-
SSDEEP
12288:RMrLy90G7M9NRzEuS30G6MgCLJKZ4BEChMFgGFtgTmlm4Hmh8UaAHR+12zAM9:yyMqIGH1YfChMFgggrh8UaIR9
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f3123bC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h33ES72.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f3123bC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f3123bC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f3123bC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f3123bC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f3123bC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h33ES72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h33ES72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h33ES72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h33ES72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h33ES72.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3468-202-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-203-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-205-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-207-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-209-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-213-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-211-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-215-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-217-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-219-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-221-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-223-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-225-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-227-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-229-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-231-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-236-0x0000000004AA0000-0x0000000004AB0000-memory.dmp family_redline behavioral1/memory/3468-239-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline behavioral1/memory/3468-235-0x00000000076B0000-0x00000000076EE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2036 niba3700.exe 3744 niba6456.exe 1784 f3123bC.exe 3752 h33ES72.exe 3468 irREB44.exe 1620 l33Dd96.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f3123bC.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h33ES72.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h33ES72.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba6456.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba3700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba3700.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba6456.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 544 3752 WerFault.exe 98 4036 3468 WerFault.exe 101 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1784 f3123bC.exe 1784 f3123bC.exe 3752 h33ES72.exe 3752 h33ES72.exe 3468 irREB44.exe 3468 irREB44.exe 1620 l33Dd96.exe 1620 l33Dd96.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1784 f3123bC.exe Token: SeDebugPrivilege 3752 h33ES72.exe Token: SeDebugPrivilege 3468 irREB44.exe Token: SeDebugPrivilege 1620 l33Dd96.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2036 2384 f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe 87 PID 2384 wrote to memory of 2036 2384 f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe 87 PID 2384 wrote to memory of 2036 2384 f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe 87 PID 2036 wrote to memory of 3744 2036 niba3700.exe 88 PID 2036 wrote to memory of 3744 2036 niba3700.exe 88 PID 2036 wrote to memory of 3744 2036 niba3700.exe 88 PID 3744 wrote to memory of 1784 3744 niba6456.exe 89 PID 3744 wrote to memory of 1784 3744 niba6456.exe 89 PID 3744 wrote to memory of 3752 3744 niba6456.exe 98 PID 3744 wrote to memory of 3752 3744 niba6456.exe 98 PID 3744 wrote to memory of 3752 3744 niba6456.exe 98 PID 2036 wrote to memory of 3468 2036 niba3700.exe 101 PID 2036 wrote to memory of 3468 2036 niba3700.exe 101 PID 2036 wrote to memory of 3468 2036 niba3700.exe 101 PID 2384 wrote to memory of 1620 2384 f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe 110 PID 2384 wrote to memory of 1620 2384 f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe 110 PID 2384 wrote to memory of 1620 2384 f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe"C:\Users\Admin\AppData\Local\Temp\f1c4a996b54c308112a1828f1a7a69bcd6bd197ce6735802c98113e58518f3cd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3700.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba3700.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba6456.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba6456.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3123bC.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3123bC.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h33ES72.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h33ES72.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 10805⤵
- Program crash
PID:544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\irREB44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\irREB44.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 13484⤵
- Program crash
PID:4036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l33Dd96.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l33Dd96.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3752 -ip 37521⤵PID:3360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3468 -ip 34681⤵PID:3224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
694KB
MD5025b7bddd60721ec5d2f00ab5d8484bf
SHA12f6f2b031613a36f929104d6ebeb37edc3cb7a5b
SHA25619513f448836d5479d95dfd010462fdaf73ed35494bfff429154e59f82873fb9
SHA512ecc26f06822de89e4e353307429abea034f654d92d94ae909ea86db9e9327b8f77a1ca69b9b6080cf0d6251bd85859fb86738566ded025ce6a117aa0f93bf48b
-
Filesize
694KB
MD5025b7bddd60721ec5d2f00ab5d8484bf
SHA12f6f2b031613a36f929104d6ebeb37edc3cb7a5b
SHA25619513f448836d5479d95dfd010462fdaf73ed35494bfff429154e59f82873fb9
SHA512ecc26f06822de89e4e353307429abea034f654d92d94ae909ea86db9e9327b8f77a1ca69b9b6080cf0d6251bd85859fb86738566ded025ce6a117aa0f93bf48b
-
Filesize
391KB
MD5640a88392196148a365f8739edebf6e1
SHA11dffc640aeca49cdd93c4701fa5492368f136240
SHA2567c9de89415ac1d49495b00bdadbc86ea5caf34430d722816ec2e01ee0ab5bdbb
SHA51224f58b8211637c318dd3fc43a6409ee5fa542d81060827d362f5c49e01975327683fabdc7421aa6900ee960ce6588ad7d698bb4e21d4b822381d23c18e629809
-
Filesize
391KB
MD5640a88392196148a365f8739edebf6e1
SHA11dffc640aeca49cdd93c4701fa5492368f136240
SHA2567c9de89415ac1d49495b00bdadbc86ea5caf34430d722816ec2e01ee0ab5bdbb
SHA51224f58b8211637c318dd3fc43a6409ee5fa542d81060827d362f5c49e01975327683fabdc7421aa6900ee960ce6588ad7d698bb4e21d4b822381d23c18e629809
-
Filesize
344KB
MD54bfb36de55bb188974d1a1faeca4856d
SHA1ff89bfe281be5704e78ddc1f776443829ba3c5eb
SHA25686ad6212f2a75ae5f0e3829f911031b1e534937d5063ad0975ebf694755d7cf5
SHA512f8638672fe87164c1b60c93f1f387c0c2bae1306cfcb00a807f86c4ac9d5479b319b82230618ce4abe66bf13ee6e9e48c075e923f163a397af8870217f3e87fc
-
Filesize
344KB
MD54bfb36de55bb188974d1a1faeca4856d
SHA1ff89bfe281be5704e78ddc1f776443829ba3c5eb
SHA25686ad6212f2a75ae5f0e3829f911031b1e534937d5063ad0975ebf694755d7cf5
SHA512f8638672fe87164c1b60c93f1f387c0c2bae1306cfcb00a807f86c4ac9d5479b319b82230618ce4abe66bf13ee6e9e48c075e923f163a397af8870217f3e87fc
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
333KB
MD5d1202fcbec73c12a417345e406f90e23
SHA1a5f6a2f30758c79e79bfb4c6161102a4ca2c8155
SHA2564c7137c31cfc44e3add3c8b182bf0e94e630799ca9a41e97341f6ebfcbe946c8
SHA512c0f83dfb9d6fdc4dfe2eecc670daef4600d2befe6513205bda08772bebf411c259f24580e168edb95d22efa66b0ca78c5d0f3d35e16a6a13ed9b5e919b73da6d
-
Filesize
333KB
MD5d1202fcbec73c12a417345e406f90e23
SHA1a5f6a2f30758c79e79bfb4c6161102a4ca2c8155
SHA2564c7137c31cfc44e3add3c8b182bf0e94e630799ca9a41e97341f6ebfcbe946c8
SHA512c0f83dfb9d6fdc4dfe2eecc670daef4600d2befe6513205bda08772bebf411c259f24580e168edb95d22efa66b0ca78c5d0f3d35e16a6a13ed9b5e919b73da6d