Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe
Resource
win10v2004-20230220-en
General
-
Target
ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe
-
Size
779KB
-
MD5
4159476f24ce734df27a92464189dd1c
-
SHA1
79c42b1b72cc772c8a073044acfd72c5eaff8ac2
-
SHA256
ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d
-
SHA512
459223b02069de1693422726f5ffd665aa089cee3813b11cc150de5df2dfd9fd4d42896dd36af4d7fdb19c79ae11a6b06f8f443ae2381b72bed79d0143cdb3ac
-
SSDEEP
12288:vMr3y90/V6fE6iJs2irY1oju4F3YNc6ppAxfdBLk2H8z014Z79pcygN+dtWHf:My9E6JrYGjpCf3AxfdBLk+4h92
Malware Config
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro3087.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3087.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3087.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3087.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3087.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu9556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3087.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection qu9556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu9556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu9556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu9556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu9556.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2776 unio4043.exe 4704 unio2956.exe 3884 pro3087.exe 1008 qu9556.exe 936 rLA59s05.exe 1856 si608734.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3087.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu9556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu9556.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio4043.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio4043.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio2956.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio2956.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5064 1008 WerFault.exe 93 4436 936 WerFault.exe 101 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3884 pro3087.exe 3884 pro3087.exe 1008 qu9556.exe 1008 qu9556.exe 1856 si608734.exe 1856 si608734.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3884 pro3087.exe Token: SeDebugPrivilege 1008 qu9556.exe Token: SeDebugPrivilege 1856 si608734.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2776 2548 ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe 85 PID 2548 wrote to memory of 2776 2548 ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe 85 PID 2548 wrote to memory of 2776 2548 ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe 85 PID 2776 wrote to memory of 4704 2776 unio4043.exe 86 PID 2776 wrote to memory of 4704 2776 unio4043.exe 86 PID 2776 wrote to memory of 4704 2776 unio4043.exe 86 PID 4704 wrote to memory of 3884 4704 unio2956.exe 87 PID 4704 wrote to memory of 3884 4704 unio2956.exe 87 PID 4704 wrote to memory of 1008 4704 unio2956.exe 93 PID 4704 wrote to memory of 1008 4704 unio2956.exe 93 PID 4704 wrote to memory of 1008 4704 unio2956.exe 93 PID 2776 wrote to memory of 936 2776 unio4043.exe 101 PID 2776 wrote to memory of 936 2776 unio4043.exe 101 PID 2776 wrote to memory of 936 2776 unio4043.exe 101 PID 2548 wrote to memory of 1856 2548 ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe 109 PID 2548 wrote to memory of 1856 2548 ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe 109 PID 2548 wrote to memory of 1856 2548 ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe"C:\Users\Admin\AppData\Local\Temp\ce7e7a2fa5c896adb619898290dab367e34fcffceaa332f5810ceaaa7570c76d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4043.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4043.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio2956.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio2956.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro3087.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro3087.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu9556.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu9556.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 10925⤵
- Program crash
PID:5064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rLA59s05.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rLA59s05.exe3⤵
- Executes dropped EXE
PID:936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 19044⤵
- Program crash
PID:4436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si608734.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si608734.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1008 -ip 10081⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 936 -ip 9361⤵PID:4756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
637KB
MD57f79c8a1c86a55b8e71bb365c7650800
SHA19b4dc79682c001433ac63454382906e26d493fdf
SHA2565976a20d792b3178af22283cef40aa74cd10e10e17924ae3af126b1d9022b8bb
SHA512b860ee5d4cf63d9b3cf8a19c2efa6774b89df6026c7b2088d2257bf07daf021d18bfb54d2f17d50ffac61298e3ad2e5c3db09312770da25c1b204b8d3ac9eb5e
-
Filesize
637KB
MD57f79c8a1c86a55b8e71bb365c7650800
SHA19b4dc79682c001433ac63454382906e26d493fdf
SHA2565976a20d792b3178af22283cef40aa74cd10e10e17924ae3af126b1d9022b8bb
SHA512b860ee5d4cf63d9b3cf8a19c2efa6774b89df6026c7b2088d2257bf07daf021d18bfb54d2f17d50ffac61298e3ad2e5c3db09312770da25c1b204b8d3ac9eb5e
-
Filesize
290KB
MD5f5163edd0232c7f71e386d071b596876
SHA1181776a49d12ffc8097f7e8bd992e6f964610cc4
SHA256aa119c5234159b0ec2ed9f6f0fbf6de79f2c8f8477f8dab79c025d49be7c941c
SHA51236b97d30d0ed5390892d827c4412f31f63401a786a2c00393e8cc79cc54e3b033eeb7700d37d6b7580c85c94cbbf32d3c84c81eb5f5eaf38312a04e5cd48a3c6
-
Filesize
315KB
MD5b6f7e9610f43764815c1c44bb66be834
SHA1294347ca623eead2e5041dfb743cb692871888ab
SHA2560744dc5efac5024f179d24debd8fc481c75cb3ee8e4a69d84382b3dd9776b9d7
SHA5127a6e342464ce03225529cf6c0487fb46b95d4f156dcccc61926e49bd59947b2dac50bfe21f03152e4d5617d25caf89d1476cfe6a671e864eb102fcafdb865b4f
-
Filesize
315KB
MD5b6f7e9610f43764815c1c44bb66be834
SHA1294347ca623eead2e5041dfb743cb692871888ab
SHA2560744dc5efac5024f179d24debd8fc481c75cb3ee8e4a69d84382b3dd9776b9d7
SHA5127a6e342464ce03225529cf6c0487fb46b95d4f156dcccc61926e49bd59947b2dac50bfe21f03152e4d5617d25caf89d1476cfe6a671e864eb102fcafdb865b4f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
232KB
MD59d31d891af7f9be3fcbf31fcedc22b13
SHA1631d0c57c22a1f5f0f72921c05fd7edcc27c2dd6
SHA256fb683eacd43cc2d482d7f4b633ab4d6d3613caf41d689767d52507fd462d79a6
SHA512fca3a47c7fb64e44f6f5c320745c9cd663d04a2dfb4173057a4570d15e3f0a29656ecfca21f4e57920ff63ab3283885a5d65696747511fe9bd8fb97af2cda6b5
-
Filesize
232KB
MD59d31d891af7f9be3fcbf31fcedc22b13
SHA1631d0c57c22a1f5f0f72921c05fd7edcc27c2dd6
SHA256fb683eacd43cc2d482d7f4b633ab4d6d3613caf41d689767d52507fd462d79a6
SHA512fca3a47c7fb64e44f6f5c320745c9cd663d04a2dfb4173057a4570d15e3f0a29656ecfca21f4e57920ff63ab3283885a5d65696747511fe9bd8fb97af2cda6b5