Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe
Resource
win10v2004-20230220-en
General
-
Target
ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe
-
Size
818KB
-
MD5
df7507021f4eff06828c9bd74cdfb558
-
SHA1
3139b14114b5075b64041527bbb9ffc7cba14ee5
-
SHA256
ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e
-
SHA512
07773c402e3cd10fe8171e1a9a16df701ad8b0380e5b2bf59ed3f3bfb89b6c321ca4f884932101de5fbffd5aad851f51944415e112f1cbbe4a5b30db67dad1ad
-
SSDEEP
24576:ayRm2a3L1yyoIWKUVDoakCv8U4ukzEdS:h+t5AoakMGE
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f4177ET.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f4177ET.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f4177ET.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h63ji63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h63ji63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h63ji63.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f4177ET.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f4177ET.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h63ji63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h63ji63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f4177ET.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h63ji63.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4816-204-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-203-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-210-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-208-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-212-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-206-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-214-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-218-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-216-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-220-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-222-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-224-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-226-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-232-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-236-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-234-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-230-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-228-0x0000000004DF0000-0x0000000004E2E000-memory.dmp family_redline behavioral1/memory/4816-301-0x0000000004EA0000-0x0000000004EB0000-memory.dmp family_redline behavioral1/memory/4816-303-0x0000000004EA0000-0x0000000004EB0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2044 niba6532.exe 2068 niba5565.exe 1852 f4177ET.exe 968 h63ji63.exe 4816 iYZlw29.exe 3836 l05sK25.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f4177ET.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h63ji63.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h63ji63.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba6532.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba6532.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba5565.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba5565.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1396 968 WerFault.exe 92 3728 4816 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1852 f4177ET.exe 1852 f4177ET.exe 968 h63ji63.exe 968 h63ji63.exe 4816 iYZlw29.exe 4816 iYZlw29.exe 3836 l05sK25.exe 3836 l05sK25.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1852 f4177ET.exe Token: SeDebugPrivilege 968 h63ji63.exe Token: SeDebugPrivilege 4816 iYZlw29.exe Token: SeDebugPrivilege 3836 l05sK25.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4684 wrote to memory of 2044 4684 ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe 86 PID 4684 wrote to memory of 2044 4684 ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe 86 PID 4684 wrote to memory of 2044 4684 ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe 86 PID 2044 wrote to memory of 2068 2044 niba6532.exe 87 PID 2044 wrote to memory of 2068 2044 niba6532.exe 87 PID 2044 wrote to memory of 2068 2044 niba6532.exe 87 PID 2068 wrote to memory of 1852 2068 niba5565.exe 88 PID 2068 wrote to memory of 1852 2068 niba5565.exe 88 PID 2068 wrote to memory of 968 2068 niba5565.exe 92 PID 2068 wrote to memory of 968 2068 niba5565.exe 92 PID 2068 wrote to memory of 968 2068 niba5565.exe 92 PID 2044 wrote to memory of 4816 2044 niba6532.exe 96 PID 2044 wrote to memory of 4816 2044 niba6532.exe 96 PID 2044 wrote to memory of 4816 2044 niba6532.exe 96 PID 4684 wrote to memory of 3836 4684 ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe 110 PID 4684 wrote to memory of 3836 4684 ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe 110 PID 4684 wrote to memory of 3836 4684 ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe"C:\Users\Admin\AppData\Local\Temp\ba7b5b60ef38b75add22d318c43b7d0be9f58fb6f8767da349c5853dd9b8a39e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6532.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6532.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba5565.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba5565.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4177ET.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4177ET.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h63ji63.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h63ji63.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 10805⤵
- Program crash
PID:1396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iYZlw29.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iYZlw29.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 13324⤵
- Program crash
PID:3728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l05sK25.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l05sK25.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 968 -ip 9681⤵PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4816 -ip 48161⤵PID:1056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
676KB
MD5c780b6e000e5781df71814e47fcd982c
SHA1fa379d635c1c6ba3fec717cabbe6b93208b0774b
SHA25631a726d51dd573720c211f9332da2ec294e6da1a325467242ec4c4a998480191
SHA512651907edc1e15991fa551e7e8c72083f109aef3ba3bf4090a26dc28f53c20f8cfaa818ab4712d2bc0d5e29ff005b0c6457a61d521c0a4f4fabe9e5ff79704a1a
-
Filesize
676KB
MD5c780b6e000e5781df71814e47fcd982c
SHA1fa379d635c1c6ba3fec717cabbe6b93208b0774b
SHA25631a726d51dd573720c211f9332da2ec294e6da1a325467242ec4c4a998480191
SHA512651907edc1e15991fa551e7e8c72083f109aef3ba3bf4090a26dc28f53c20f8cfaa818ab4712d2bc0d5e29ff005b0c6457a61d521c0a4f4fabe9e5ff79704a1a
-
Filesize
349KB
MD54ccd8480fca39ab6d4af92abebe3c6e4
SHA1a0326ebe17d1d5d1ca36e659eefe00efd2ab769b
SHA25666b96305dfa726d3d32e36b153a215400b9906e2008c8e1b3a7dcfc89489119a
SHA512437dc183217840d7daeffd8e9854f62493307633dd9a3de8254cd46e0934d8082b08acf1e38aa03f402aa1b08321a9a9025e09d3b94cb4b42091313b8160d17e
-
Filesize
349KB
MD54ccd8480fca39ab6d4af92abebe3c6e4
SHA1a0326ebe17d1d5d1ca36e659eefe00efd2ab769b
SHA25666b96305dfa726d3d32e36b153a215400b9906e2008c8e1b3a7dcfc89489119a
SHA512437dc183217840d7daeffd8e9854f62493307633dd9a3de8254cd46e0934d8082b08acf1e38aa03f402aa1b08321a9a9025e09d3b94cb4b42091313b8160d17e
-
Filesize
334KB
MD515840386e27dd13da1a569502f02b805
SHA18b218ea021549c66478cc93bda93e3f35d593900
SHA256611cce3476373a22fd1ef74db02e7df23eabaae38652f14a1e1484d33994e5ff
SHA51218500918a62f59733406c1eae43da820635dbd424691362d001ca09cf11d893f1b959241c5756e64633bc69fc68c118be47e34c8b2c89cc24b803607614da06b
-
Filesize
334KB
MD515840386e27dd13da1a569502f02b805
SHA18b218ea021549c66478cc93bda93e3f35d593900
SHA256611cce3476373a22fd1ef74db02e7df23eabaae38652f14a1e1484d33994e5ff
SHA51218500918a62f59733406c1eae43da820635dbd424691362d001ca09cf11d893f1b959241c5756e64633bc69fc68c118be47e34c8b2c89cc24b803607614da06b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD5df4d375592d956ab758bf607a9620f61
SHA151471aa4069900e4d47c36840da5df969b734e29
SHA25660d91e8c1cd936b2fbf3de067de20fa5ce7e033f1a52762e4fa7dec4bdd10af3
SHA512ce98099f9fe3d7afa300c2fe70812c3a53e331e17dc158ab9bb279744694802f98c60e526fdd5d2612d9681f89edbb25e14e4f186ec2aa9c24f2a1639138648a
-
Filesize
290KB
MD5df4d375592d956ab758bf607a9620f61
SHA151471aa4069900e4d47c36840da5df969b734e29
SHA25660d91e8c1cd936b2fbf3de067de20fa5ce7e033f1a52762e4fa7dec4bdd10af3
SHA512ce98099f9fe3d7afa300c2fe70812c3a53e331e17dc158ab9bb279744694802f98c60e526fdd5d2612d9681f89edbb25e14e4f186ec2aa9c24f2a1639138648a