Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe
Resource
win10v2004-20230220-en
General
-
Target
bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe
-
Size
907KB
-
MD5
9fc7df2bc0830ceed8c5ab0f0c02cd42
-
SHA1
df4e1d3bb69fffb355b1f5cfb83a759a4bf0ca87
-
SHA256
bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974
-
SHA512
78f22abf093256fc294c8c728ce5b26f70f1fecb517863a1cb443cf8946de45dc40e25c5a18a4fe7d7963fb86d6598c2c899738d6b38fdf0391896817c6a29c1
-
SSDEEP
24576:2yB6MQ4oUart8djt0wzbV2cgVbcqNmzvBCp2bg:FB6MeUazKV29cOm
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu1537.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4994.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection qu1537.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu1537.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu1537.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu1537.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu1537.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4994.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1852-203-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-204-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-206-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-208-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-210-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-212-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-214-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-216-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-218-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-223-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-226-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-228-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-230-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-232-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-234-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-238-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-236-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1852-240-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1560 unio3857.exe 1724 unio3045.exe 2556 pro4994.exe 3964 qu1537.exe 1852 rWF08s59.exe 4632 si699984.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4994.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu1537.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu1537.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio3857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio3857.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio3045.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio3045.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4620 1852 WerFault.exe 100 1948 1852 WerFault.exe 100 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2556 pro4994.exe 2556 pro4994.exe 3964 qu1537.exe 3964 qu1537.exe 1852 rWF08s59.exe 1852 rWF08s59.exe 4632 si699984.exe 4632 si699984.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2556 pro4994.exe Token: SeDebugPrivilege 3964 qu1537.exe Token: SeDebugPrivilege 1852 rWF08s59.exe Token: SeDebugPrivilege 4632 si699984.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4268 wrote to memory of 1560 4268 bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe 84 PID 4268 wrote to memory of 1560 4268 bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe 84 PID 4268 wrote to memory of 1560 4268 bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe 84 PID 1560 wrote to memory of 1724 1560 unio3857.exe 85 PID 1560 wrote to memory of 1724 1560 unio3857.exe 85 PID 1560 wrote to memory of 1724 1560 unio3857.exe 85 PID 1724 wrote to memory of 2556 1724 unio3045.exe 86 PID 1724 wrote to memory of 2556 1724 unio3045.exe 86 PID 1724 wrote to memory of 3964 1724 unio3045.exe 96 PID 1724 wrote to memory of 3964 1724 unio3045.exe 96 PID 1724 wrote to memory of 3964 1724 unio3045.exe 96 PID 1560 wrote to memory of 1852 1560 unio3857.exe 100 PID 1560 wrote to memory of 1852 1560 unio3857.exe 100 PID 1560 wrote to memory of 1852 1560 unio3857.exe 100 PID 4268 wrote to memory of 4632 4268 bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe 107 PID 4268 wrote to memory of 4632 4268 bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe 107 PID 4268 wrote to memory of 4632 4268 bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe"C:\Users\Admin\AppData\Local\Temp\bbe2d9fbf01e4ec299f6d63849eea6e4a621ec26a8455b5bd5680c920b1ec974.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3857.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3857.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio3045.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio3045.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro4994.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro4994.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu1537.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu1537.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rWF08s59.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rWF08s59.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 8844⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 15524⤵
- Program crash
PID:1948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si699984.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si699984.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1852 -ip 18521⤵PID:676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1852 -ip 18521⤵PID:4940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
765KB
MD5566c97e4a22a24f625e549ce22e12562
SHA1b78d41e0332db05bd54514edc46730bf80022b77
SHA2563aa55eef19ba509c003648150e5f2983869e94c0800682ac7046c29472cc9d06
SHA51272ba4259262864be21577d20db7f41f7d6abf4db2c6dbc71e0c13169f67af6bbf523bd23ff24466e7704815c9d79ccc91b109d873ecf99593af3fd932c505693
-
Filesize
765KB
MD5566c97e4a22a24f625e549ce22e12562
SHA1b78d41e0332db05bd54514edc46730bf80022b77
SHA2563aa55eef19ba509c003648150e5f2983869e94c0800682ac7046c29472cc9d06
SHA51272ba4259262864be21577d20db7f41f7d6abf4db2c6dbc71e0c13169f67af6bbf523bd23ff24466e7704815c9d79ccc91b109d873ecf99593af3fd932c505693
-
Filesize
456KB
MD571f0b79509f5fcbae791b735fdad25c2
SHA16f0421e6a9b9ee9cd8000252b06168ba811a1db4
SHA256a7d1579275f3a33e402424afdf329fc4206baa6bb05997f1c40d9e14d3129d20
SHA51290aa4273a50d5a9b2444a313ed4664043a022acf06e81d8d75bce57ed8c98406d9caeb522b3981b67eb4e60e581f97154ccee6654b769c3986b3d9e51b90af7b
-
Filesize
456KB
MD571f0b79509f5fcbae791b735fdad25c2
SHA16f0421e6a9b9ee9cd8000252b06168ba811a1db4
SHA256a7d1579275f3a33e402424afdf329fc4206baa6bb05997f1c40d9e14d3129d20
SHA51290aa4273a50d5a9b2444a313ed4664043a022acf06e81d8d75bce57ed8c98406d9caeb522b3981b67eb4e60e581f97154ccee6654b769c3986b3d9e51b90af7b
-
Filesize
379KB
MD5b8027d170be1f75886f0c80821b66b97
SHA15d326fb7242452b5a1bd56d314023fb848ecb470
SHA2566fc26c09dc18b4755ea03223f507acaad5bb4a7b52eb9eb4dae37d85dd32e6ed
SHA5121a3a49fcbd9d14247f57e7ea7f259479a257c6b7b6bcc9c6c77947838e200e83650d273cd1ceafb66f7ab40b9052a59025d426104bec5c3f45a0d54e616a0ff8
-
Filesize
379KB
MD5b8027d170be1f75886f0c80821b66b97
SHA15d326fb7242452b5a1bd56d314023fb848ecb470
SHA2566fc26c09dc18b4755ea03223f507acaad5bb4a7b52eb9eb4dae37d85dd32e6ed
SHA5121a3a49fcbd9d14247f57e7ea7f259479a257c6b7b6bcc9c6c77947838e200e83650d273cd1ceafb66f7ab40b9052a59025d426104bec5c3f45a0d54e616a0ff8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
398KB
MD541e162406ca689cc7a29b71e5872445b
SHA17d98aef667a410bdae9d728428fe0e56e2eccb92
SHA25676cf6c0093db9b9bdb8e11e8aa5c0a561c9786c0eeb630d032c3a6f015ae8b8a
SHA512724a46e2c9d5af892f0a6451e7e91c2966b01d4b225876a623b6d47a00bfd03446bd61c45569f359e05d51428a681be5219e516eb29b0c28c2f1e9eb01dca070
-
Filesize
398KB
MD541e162406ca689cc7a29b71e5872445b
SHA17d98aef667a410bdae9d728428fe0e56e2eccb92
SHA25676cf6c0093db9b9bdb8e11e8aa5c0a561c9786c0eeb630d032c3a6f015ae8b8a
SHA512724a46e2c9d5af892f0a6451e7e91c2966b01d4b225876a623b6d47a00bfd03446bd61c45569f359e05d51428a681be5219e516eb29b0c28c2f1e9eb01dca070