Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe
Resource
win10v2004-20230220-en
General
-
Target
e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe
-
Size
546KB
-
MD5
8a9c2da2de631bc80d5787ac672fd0a7
-
SHA1
557735593cf9b069b7b8c0adeda5220dbca261eb
-
SHA256
e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d
-
SHA512
173c28bc9d23c8ae479dd78df0e87f4c7461631a67b153c21daed2de42b0bd5af3c664079d82af9100f8ecbcb3f339a59d1c3378078e6374d550814f46ae6bb9
-
SSDEEP
12288:/Mroy90qy5TT1Z+azoGuhTDizbPXst8wLXwa5Kv/9Q:vylydJZvzoGuhTDSgnXwmg1Q
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
hero
193.233.20.31:4125
-
auth_value
11f3c75a88ca461bcc8d6bf60a1193e3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3825.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro3825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3825.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3164-158-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-159-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-161-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-163-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-165-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-167-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-169-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-171-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-173-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-175-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-177-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-179-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-181-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-183-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-185-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-187-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-189-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-213-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-215-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-217-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-219-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/3164-221-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 460 unio3234.exe 4264 pro3825.exe 3164 qu5593.exe 4664 si504727.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3825.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio3234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio3234.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1264 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4952 3164 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4264 pro3825.exe 4264 pro3825.exe 3164 qu5593.exe 3164 qu5593.exe 4664 si504727.exe 4664 si504727.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4264 pro3825.exe Token: SeDebugPrivilege 3164 qu5593.exe Token: SeDebugPrivilege 4664 si504727.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2084 wrote to memory of 460 2084 e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe 85 PID 2084 wrote to memory of 460 2084 e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe 85 PID 2084 wrote to memory of 460 2084 e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe 85 PID 460 wrote to memory of 4264 460 unio3234.exe 86 PID 460 wrote to memory of 4264 460 unio3234.exe 86 PID 460 wrote to memory of 3164 460 unio3234.exe 95 PID 460 wrote to memory of 3164 460 unio3234.exe 95 PID 460 wrote to memory of 3164 460 unio3234.exe 95 PID 2084 wrote to memory of 4664 2084 e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe 98 PID 2084 wrote to memory of 4664 2084 e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe 98 PID 2084 wrote to memory of 4664 2084 e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe"C:\Users\Admin\AppData\Local\Temp\e38ab95d0553a83eb4fde76e66fbabaa1a45dfe2a9f4a7266cf7a06faf8b1c5d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3234.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3234.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3825.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3825.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5593.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5593.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3164 -s 13204⤵
- Program crash
PID:4952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504727.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504727.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3164 -ip 31641⤵PID:1372
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
175KB
MD57c11dfe7837f2079d50113de0e973682
SHA1fae072addd4d56ab67d08ab82da4aac5d7223960
SHA256442d9cc0073a6d45abbed64eb9891912091d444fe4dd368924d1b8cf7c59e65b
SHA51206085d23ead5955185736af64754c343a796af98b68c8013ba20b19a5c52eb92066698b86633d54438fe6ad5455c3c3c4625cf03d15439ab486e22388bd8cab7
-
Filesize
404KB
MD5d43c484895db3a23bc42cb5260a3c844
SHA12987abe00d94f813d790b8e0b8efb8352e9dd9f5
SHA256b8e7817243d52db7a823ecbc160ff8a761bbf6244c3aef2189206b237fb7fd3f
SHA512944471c389b0a862bcddc711f615c36630d70f8c2d943eccb84313c3df21c5db3ab23a84ef0e5c66536daa982afc0a309402615c268ed945aba30a36d71d5081
-
Filesize
404KB
MD5d43c484895db3a23bc42cb5260a3c844
SHA12987abe00d94f813d790b8e0b8efb8352e9dd9f5
SHA256b8e7817243d52db7a823ecbc160ff8a761bbf6244c3aef2189206b237fb7fd3f
SHA512944471c389b0a862bcddc711f615c36630d70f8c2d943eccb84313c3df21c5db3ab23a84ef0e5c66536daa982afc0a309402615c268ed945aba30a36d71d5081
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
358KB
MD5b94900b3af65b01a2d0333d6bc84f42e
SHA1e5900434d7b96fafc0bec54841d9fdaacc8b42f1
SHA25637aba15c75c4b85823e02e4373dfa113a68fb25dcdd78d59ce2d020418f09343
SHA512fade0c06af16517df1576d0e137807db7cab1bddc1f2621e8fdc305c26a1f7e0ac0c8cf94103a71fbca7aa295e2d18bb5e603d4e165517ed22369860f365128f
-
Filesize
358KB
MD5b94900b3af65b01a2d0333d6bc84f42e
SHA1e5900434d7b96fafc0bec54841d9fdaacc8b42f1
SHA25637aba15c75c4b85823e02e4373dfa113a68fb25dcdd78d59ce2d020418f09343
SHA512fade0c06af16517df1576d0e137807db7cab1bddc1f2621e8fdc305c26a1f7e0ac0c8cf94103a71fbca7aa295e2d18bb5e603d4e165517ed22369860f365128f