Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe
Resource
win10v2004-20230220-en
General
-
Target
23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe
-
Size
777KB
-
MD5
e194421aab5b3a3fb3454942a77f9a3d
-
SHA1
5f21b01797446cb1f59eae1fafd2a754fa66f9ee
-
SHA256
23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62
-
SHA512
f8409691d5a939e13f44f8e13ac05e4cccec511e1f37bbc904572e908781de9b43cbeef6848e1d753b01a5b5d55447867ca80663e9f65c5c5b196bbdff54f61f
-
SSDEEP
12288:RMrXy90jUw7FbtdDpKVxMr438uUJGTnKU50M5NUdT3fJeyJjcAgbt:KyOUwVH89suuGbKU50M58TheyJwA2
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f3653YL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f3653YL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f3653YL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f3653YL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h04OJ84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h04OJ84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f3653YL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f3653YL.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h04OJ84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h04OJ84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h04OJ84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h04OJ84.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3516-204-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-206-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-203-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-208-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-210-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-212-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-214-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-216-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-218-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-220-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-224-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-222-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-226-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-228-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-230-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-232-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-234-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-236-0x0000000002410000-0x000000000244E000-memory.dmp family_redline behavioral1/memory/3516-541-0x0000000004C40000-0x0000000004C50000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2720 niba6626.exe 2888 niba1712.exe 2804 f3653YL.exe 224 h04OJ84.exe 3516 iXfDp58.exe 3092 l00ao75.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f3653YL.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h04OJ84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h04OJ84.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba6626.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba6626.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba1712.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba1712.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4228 224 WerFault.exe 89 4320 3516 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2804 f3653YL.exe 2804 f3653YL.exe 224 h04OJ84.exe 224 h04OJ84.exe 3516 iXfDp58.exe 3516 iXfDp58.exe 3092 l00ao75.exe 3092 l00ao75.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2804 f3653YL.exe Token: SeDebugPrivilege 224 h04OJ84.exe Token: SeDebugPrivilege 3516 iXfDp58.exe Token: SeDebugPrivilege 3092 l00ao75.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4436 wrote to memory of 2720 4436 23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe 86 PID 4436 wrote to memory of 2720 4436 23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe 86 PID 4436 wrote to memory of 2720 4436 23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe 86 PID 2720 wrote to memory of 2888 2720 niba6626.exe 87 PID 2720 wrote to memory of 2888 2720 niba6626.exe 87 PID 2720 wrote to memory of 2888 2720 niba6626.exe 87 PID 2888 wrote to memory of 2804 2888 niba1712.exe 88 PID 2888 wrote to memory of 2804 2888 niba1712.exe 88 PID 2888 wrote to memory of 224 2888 niba1712.exe 89 PID 2888 wrote to memory of 224 2888 niba1712.exe 89 PID 2888 wrote to memory of 224 2888 niba1712.exe 89 PID 2720 wrote to memory of 3516 2720 niba6626.exe 92 PID 2720 wrote to memory of 3516 2720 niba6626.exe 92 PID 2720 wrote to memory of 3516 2720 niba6626.exe 92 PID 4436 wrote to memory of 3092 4436 23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe 103 PID 4436 wrote to memory of 3092 4436 23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe 103 PID 4436 wrote to memory of 3092 4436 23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe"C:\Users\Admin\AppData\Local\Temp\23e2acb255b33dc3dbdc49b5437f500d35ea8586e70dd8e9668247e0c6ba5c62.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6626.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba6626.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba1712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba1712.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3653YL.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3653YL.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h04OJ84.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h04OJ84.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 10925⤵
- Program crash
PID:4228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iXfDp58.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iXfDp58.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 13484⤵
- Program crash
PID:4320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l00ao75.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l00ao75.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 224 -ip 2241⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3516 -ip 35161⤵PID:2132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
634KB
MD5fe52224db50cf99c987da022061e13e6
SHA1542db922a00e7892b12aa7af9e05afa98bde54a5
SHA25621b9036578d8aec406865c44a92044093732ccc04d2639478881c86c2ba44772
SHA512dd91c1a5e7ccd0564df77a9aeabb3b87dc61269a785731a945c044511639b3a45610f5db186f9700eb85d66d08a654ecdd6399f2bd39c7617a95b57c32388998
-
Filesize
634KB
MD5fe52224db50cf99c987da022061e13e6
SHA1542db922a00e7892b12aa7af9e05afa98bde54a5
SHA25621b9036578d8aec406865c44a92044093732ccc04d2639478881c86c2ba44772
SHA512dd91c1a5e7ccd0564df77a9aeabb3b87dc61269a785731a945c044511639b3a45610f5db186f9700eb85d66d08a654ecdd6399f2bd39c7617a95b57c32388998
-
Filesize
287KB
MD53e431ab98ca3ea6f250bc9783fdc127a
SHA167fa0907bfa6ef540894b965fdc7df3b5fa7a1f9
SHA2562b0075dbb6bc5bba836a67c04baf06b2e8f16d177f5f44df5e17607108265aff
SHA512a9de7a2f2f95793be837e93487f02748d79cfe2e5222abf564b344ab1db648eeb605be24e1fc317401d3ea1348d12ee0f9a309d220d73e57169fcbe2a7cc005c
-
Filesize
287KB
MD53e431ab98ca3ea6f250bc9783fdc127a
SHA167fa0907bfa6ef540894b965fdc7df3b5fa7a1f9
SHA2562b0075dbb6bc5bba836a67c04baf06b2e8f16d177f5f44df5e17607108265aff
SHA512a9de7a2f2f95793be837e93487f02748d79cfe2e5222abf564b344ab1db648eeb605be24e1fc317401d3ea1348d12ee0f9a309d220d73e57169fcbe2a7cc005c
-
Filesize
314KB
MD5e8f0a1d1ac605b6e3591ff8c46db077a
SHA13e40a38ff3fcb2b6181567e598e5a3c1dd0602bc
SHA256716558e3559671e29dace4e3277f39acd4cf9cf2a3ab245c8448ec316fb77db4
SHA5125f45daf877faf9cbfe30fdba23f6252e272f5e292f5b7ff7d05d0d574ca8938c9506c3f140b313bdb9dddcb69a1ab2cea7782f890868fdb64c2a87164d535448
-
Filesize
314KB
MD5e8f0a1d1ac605b6e3591ff8c46db077a
SHA13e40a38ff3fcb2b6181567e598e5a3c1dd0602bc
SHA256716558e3559671e29dace4e3277f39acd4cf9cf2a3ab245c8448ec316fb77db4
SHA5125f45daf877faf9cbfe30fdba23f6252e272f5e292f5b7ff7d05d0d574ca8938c9506c3f140b313bdb9dddcb69a1ab2cea7782f890868fdb64c2a87164d535448
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
229KB
MD5ac125bb2f42358fc227e7b771fce7b6b
SHA115fe6f2c7e1bfd39f7324dd0687ec4075082f91c
SHA2564c52ef47f87339edbe4bd366c76936501c3f154648316f741964aae061e3ca7d
SHA512dbea5c47628680892c86138e4af97407d280d0f48be3f77d9dee3e8825a7048cdeb5544d32fb9fd918856eed607d56f937c19a25801e14887c9d431ad05ca6e5
-
Filesize
229KB
MD5ac125bb2f42358fc227e7b771fce7b6b
SHA115fe6f2c7e1bfd39f7324dd0687ec4075082f91c
SHA2564c52ef47f87339edbe4bd366c76936501c3f154648316f741964aae061e3ca7d
SHA512dbea5c47628680892c86138e4af97407d280d0f48be3f77d9dee3e8825a7048cdeb5544d32fb9fd918856eed607d56f937c19a25801e14887c9d431ad05ca6e5