Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
77s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe
Resource
win10v2004-20230220-en
General
-
Target
4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe
-
Size
689KB
-
MD5
f8f769d2a9b7243f44dc43e6ccb66ac8
-
SHA1
bde46def7936c5468efda9f23a62965163002476
-
SHA256
4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67
-
SHA512
3605365244c7360d71d7ff423a4818f8eb0e113461bbb2892d5a5b5e65c536913ed1116f8f824a418c1968aca0a3f97f3a74dfdcc9bf39bb803c690b9f2f9c67
-
SSDEEP
12288:EMriy90Qaebeiuf53LZCzRu2uDV+sI0fMll0b7N4gFRV7597wfu:eyjzuhUzwnkW14ot
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6209.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6209.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4468-193-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-195-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-197-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-199-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-201-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-203-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-205-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-207-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-209-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-211-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-213-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-215-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-217-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-219-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-221-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-223-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-225-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4468-227-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4712 unio2055.exe 3492 pro6209.exe 4468 qu0575.exe 3660 si066117.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6209.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio2055.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio2055.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3024 3492 WerFault.exe 86 4276 4468 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3492 pro6209.exe 3492 pro6209.exe 4468 qu0575.exe 4468 qu0575.exe 3660 si066117.exe 3660 si066117.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3492 pro6209.exe Token: SeDebugPrivilege 4468 qu0575.exe Token: SeDebugPrivilege 3660 si066117.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1800 wrote to memory of 4712 1800 4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe 85 PID 1800 wrote to memory of 4712 1800 4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe 85 PID 1800 wrote to memory of 4712 1800 4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe 85 PID 4712 wrote to memory of 3492 4712 unio2055.exe 86 PID 4712 wrote to memory of 3492 4712 unio2055.exe 86 PID 4712 wrote to memory of 3492 4712 unio2055.exe 86 PID 4712 wrote to memory of 4468 4712 unio2055.exe 98 PID 4712 wrote to memory of 4468 4712 unio2055.exe 98 PID 4712 wrote to memory of 4468 4712 unio2055.exe 98 PID 1800 wrote to memory of 3660 1800 4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe 103 PID 1800 wrote to memory of 3660 1800 4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe 103 PID 1800 wrote to memory of 3660 1800 4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe"C:\Users\Admin\AppData\Local\Temp\4beda4d2e8d229fadee52954cd9df273b2f011116c02f187d8829388ce874b67.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2055.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2055.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6209.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6209.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 10804⤵
- Program crash
PID:3024
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0575.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0575.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 17964⤵
- Program crash
PID:4276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si066117.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si066117.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3492 -ip 34921⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4468 -ip 44681⤵PID:4016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD550f6137ec9d973e221f78e6c260dbe9a
SHA1efd6bcbc7648d0128c5e1c7641815dc181d3430b
SHA25646996f58cd9d4e9d5c1f3a5c850851bbace3333d9571ccce1a322d7f2da29d0e
SHA5129901fc267e46484fc3838ce6f2ee4148cb3550bacb0a0d6705b242ac366689ebe17aeb2ada5283da7cecad74b12c1811eb4ffb85acb6004d1d1b6a4787fca14d
-
Filesize
175KB
MD550f6137ec9d973e221f78e6c260dbe9a
SHA1efd6bcbc7648d0128c5e1c7641815dc181d3430b
SHA25646996f58cd9d4e9d5c1f3a5c850851bbace3333d9571ccce1a322d7f2da29d0e
SHA5129901fc267e46484fc3838ce6f2ee4148cb3550bacb0a0d6705b242ac366689ebe17aeb2ada5283da7cecad74b12c1811eb4ffb85acb6004d1d1b6a4787fca14d
-
Filesize
547KB
MD50c4682425611fe878bebd4f33f6ba238
SHA1f35eed6980f71a9b99253b672d8894d48ea80426
SHA256489ce5a96be019fa35c9db58fa9b99a1995d4dfe1024d1785c97ea3175ec91b6
SHA5127a0658ea2b795f8d77500b5110fd75a919a0e04f5b8f7ca58d43a487dda4e619d3327504914f829f51e8a93db0d7de1d523f5779ea995f09d288ded470979cbd
-
Filesize
547KB
MD50c4682425611fe878bebd4f33f6ba238
SHA1f35eed6980f71a9b99253b672d8894d48ea80426
SHA256489ce5a96be019fa35c9db58fa9b99a1995d4dfe1024d1785c97ea3175ec91b6
SHA5127a0658ea2b795f8d77500b5110fd75a919a0e04f5b8f7ca58d43a487dda4e619d3327504914f829f51e8a93db0d7de1d523f5779ea995f09d288ded470979cbd
-
Filesize
329KB
MD5b7c58dfebb01115671bfb505f0b4d1a2
SHA1c1762c7cec67ba31a0ecab6d76d83aeacb7e407b
SHA2567834ecf58b3e6940620aad05920505743e339577bc6a327dc2bb2e259bec9bbd
SHA5120ec054790d3a27a56b713fc5dd15a0d9fde89642d024831a54617efc9ba3e930668f3e838bb443faa8ebda4d43640afb05a6d5f022fe82fe0674a2cc95e837c7
-
Filesize
329KB
MD5b7c58dfebb01115671bfb505f0b4d1a2
SHA1c1762c7cec67ba31a0ecab6d76d83aeacb7e407b
SHA2567834ecf58b3e6940620aad05920505743e339577bc6a327dc2bb2e259bec9bbd
SHA5120ec054790d3a27a56b713fc5dd15a0d9fde89642d024831a54617efc9ba3e930668f3e838bb443faa8ebda4d43640afb05a6d5f022fe82fe0674a2cc95e837c7
-
Filesize
387KB
MD5fd9a2d86f3cc6bf5d15ef338644eee5a
SHA12e9e1e242080ad5e7b4c0f8e8e4046dfa35cd395
SHA256074c9cdba2bf454d6c6a1a7cb4db8012848d35967d63048a3078f13fd6154e2e
SHA512098248939e457f25e13c46d9127fc2263a2b65a5ce6d6a4d43c7ee6076cf5714d71cae45740911c39ff012fbb4cb8164d9a19be1ce8952b1f9af4db07673a27f
-
Filesize
387KB
MD5fd9a2d86f3cc6bf5d15ef338644eee5a
SHA12e9e1e242080ad5e7b4c0f8e8e4046dfa35cd395
SHA256074c9cdba2bf454d6c6a1a7cb4db8012848d35967d63048a3078f13fd6154e2e
SHA512098248939e457f25e13c46d9127fc2263a2b65a5ce6d6a4d43c7ee6076cf5714d71cae45740911c39ff012fbb4cb8164d9a19be1ce8952b1f9af4db07673a27f