Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe
Resource
win10v2004-20230220-en
General
-
Target
3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe
-
Size
776KB
-
MD5
5339c155ce93c8d4fe7e5d360270bf60
-
SHA1
4bb54ba80e655c01fa7db55ee3dbac8f3ee4bd92
-
SHA256
3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac
-
SHA512
aca064dd0804c4fce3d8583fe70a949839d014eecfd17e1bed18ab7c006c129135e51fb8706237d720cea2ac878042fe27eda23b8f6c801751d60528ba13c31b
-
SSDEEP
24576:cyWm1EXjVtBcnO7XmabwiTs5IlOg+RAoN:LWrX7sS3EiSqCA
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h19Db97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h19Db97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h19Db97.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f3523OP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f3523OP.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h19Db97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f3523OP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h19Db97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h19Db97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f3523OP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f3523OP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f3523OP.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3856-203-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-204-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-206-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-208-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-210-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-212-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-214-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-216-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-218-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-220-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-224-0x0000000004CC0000-0x0000000004CD0000-memory.dmp family_redline behavioral1/memory/3856-223-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-230-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-227-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-232-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-234-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-236-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-238-0x0000000002660000-0x000000000269E000-memory.dmp family_redline behavioral1/memory/3856-240-0x0000000002660000-0x000000000269E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1768 niba2092.exe 3784 niba7565.exe 1224 f3523OP.exe 4908 h19Db97.exe 3856 imfin41.exe 3384 l80HT60.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f3523OP.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h19Db97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h19Db97.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba2092.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba2092.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba7565.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba7565.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 776 4908 WerFault.exe 93 4680 3856 WerFault.exe 99 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1224 f3523OP.exe 1224 f3523OP.exe 4908 h19Db97.exe 4908 h19Db97.exe 3856 imfin41.exe 3856 imfin41.exe 3384 l80HT60.exe 3384 l80HT60.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1224 f3523OP.exe Token: SeDebugPrivilege 4908 h19Db97.exe Token: SeDebugPrivilege 3856 imfin41.exe Token: SeDebugPrivilege 3384 l80HT60.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4596 wrote to memory of 1768 4596 3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe 85 PID 4596 wrote to memory of 1768 4596 3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe 85 PID 4596 wrote to memory of 1768 4596 3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe 85 PID 1768 wrote to memory of 3784 1768 niba2092.exe 86 PID 1768 wrote to memory of 3784 1768 niba2092.exe 86 PID 1768 wrote to memory of 3784 1768 niba2092.exe 86 PID 3784 wrote to memory of 1224 3784 niba7565.exe 87 PID 3784 wrote to memory of 1224 3784 niba7565.exe 87 PID 3784 wrote to memory of 4908 3784 niba7565.exe 93 PID 3784 wrote to memory of 4908 3784 niba7565.exe 93 PID 3784 wrote to memory of 4908 3784 niba7565.exe 93 PID 1768 wrote to memory of 3856 1768 niba2092.exe 99 PID 1768 wrote to memory of 3856 1768 niba2092.exe 99 PID 1768 wrote to memory of 3856 1768 niba2092.exe 99 PID 4596 wrote to memory of 3384 4596 3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe 103 PID 4596 wrote to memory of 3384 4596 3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe 103 PID 4596 wrote to memory of 3384 4596 3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe"C:\Users\Admin\AppData\Local\Temp\3060a915a0de999f02be41d938ad086ccc0c9785173f4e7b7496440a8f0a9cac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba2092.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba2092.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7565.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba7565.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3523OP.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3523OP.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h19Db97.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h19Db97.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 10805⤵
- Program crash
PID:776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\imfin41.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\imfin41.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 18244⤵
- Program crash
PID:4680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l80HT60.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l80HT60.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4908 -ip 49081⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3856 -ip 38561⤵PID:4720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
Filesize
634KB
MD5bcbd35e5289b3790b7dba2e4acf543e5
SHA156444bb63721d14c937fda4ccab0e5d50b3c5368
SHA2563ee03365bcc68fec412f67bdc69ab0a34aea9ff84b22a3d150f6744734ee59b8
SHA5122314ed834fad795b129de6f27b45bd28a204138a0ff99ea625fb3c1d8cf7ab48be3cba35074b0e81f97579288ad35cb2b2c668f113433196425269ac6c30343e
-
Filesize
634KB
MD5bcbd35e5289b3790b7dba2e4acf543e5
SHA156444bb63721d14c937fda4ccab0e5d50b3c5368
SHA2563ee03365bcc68fec412f67bdc69ab0a34aea9ff84b22a3d150f6744734ee59b8
SHA5122314ed834fad795b129de6f27b45bd28a204138a0ff99ea625fb3c1d8cf7ab48be3cba35074b0e81f97579288ad35cb2b2c668f113433196425269ac6c30343e
-
Filesize
288KB
MD51ec4bff0d6d26ab15311405e669ce517
SHA12573381f261b317ff45b9e83028546d5d27316de
SHA256f26730ff54dbb24307812804c93d90a02ea60873d63f4df7f839a48cde4bb0fb
SHA5127ed8576d42ee8e8d9f77ff7f0aa78f3522a78a7b9550af5decec779943e12dfcc4957ee51691c7926649d8a64593b1652a67a9f49628da186748b5912bd80d7b
-
Filesize
288KB
MD51ec4bff0d6d26ab15311405e669ce517
SHA12573381f261b317ff45b9e83028546d5d27316de
SHA256f26730ff54dbb24307812804c93d90a02ea60873d63f4df7f839a48cde4bb0fb
SHA5127ed8576d42ee8e8d9f77ff7f0aa78f3522a78a7b9550af5decec779943e12dfcc4957ee51691c7926649d8a64593b1652a67a9f49628da186748b5912bd80d7b
-
Filesize
314KB
MD55bd1dcc55729344e4d752ebb0d606cd0
SHA17cf1320246bdb5d98e0e0ef68a13fc39bd835e07
SHA2565ddc3308956ed80bf62006295e7c276ea6a31b20eb2ff95da654b1d0f71ddc61
SHA5122dbb06687285356672281a6c8ccb825ae74352a6069048368a357a0836732efd0af5d90f7fb3b4c31a22cbbc7dfd593d5a78dab570d307db6fa1182923ef0e6f
-
Filesize
314KB
MD55bd1dcc55729344e4d752ebb0d606cd0
SHA17cf1320246bdb5d98e0e0ef68a13fc39bd835e07
SHA2565ddc3308956ed80bf62006295e7c276ea6a31b20eb2ff95da654b1d0f71ddc61
SHA5122dbb06687285356672281a6c8ccb825ae74352a6069048368a357a0836732efd0af5d90f7fb3b4c31a22cbbc7dfd593d5a78dab570d307db6fa1182923ef0e6f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
230KB
MD5570f37fde7295683541bf11674e6d8f1
SHA1190276527c427cd7180c1df378a9947b70983196
SHA25684b8d5269670ee281c53f4710774e7b3cf55639414df97ef370ab01f8edab0ba
SHA512ba26c90e7a73e853ddac3a284491b04f80691eab13dca227ed378c817c7cd20c31f019d26567a2ec5779f89f85522e7abbd45689cebb8bb5985b216711b1eafa
-
Filesize
230KB
MD5570f37fde7295683541bf11674e6d8f1
SHA1190276527c427cd7180c1df378a9947b70983196
SHA25684b8d5269670ee281c53f4710774e7b3cf55639414df97ef370ab01f8edab0ba
SHA512ba26c90e7a73e853ddac3a284491b04f80691eab13dca227ed378c817c7cd20c31f019d26567a2ec5779f89f85522e7abbd45689cebb8bb5985b216711b1eafa