Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe
Resource
win10v2004-20230220-en
General
-
Target
0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe
-
Size
688KB
-
MD5
f405062d2e33296a7d2a402397f2f57d
-
SHA1
f21f6973882d755b0661b3a05c6e55f069f118ca
-
SHA256
0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b
-
SHA512
66db26a04ecea44c124b9abe69fac7859a98d721ebe30bfce7474125ca4094f09e304d2b421e1791ee3de7bb393104359de99f52642ee7ad76f0e30e8eeca10e
-
SSDEEP
12288:0Mrqy90rjAoem2BaxQGjDTZiI5VVmMVFxf43xDYM7KbZx2/lf+IGNjN:ey8A82Ba5bZpmM/p4h8MW1xgm
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6255.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6255.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2460-191-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-194-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-196-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-192-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-198-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-200-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-202-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-204-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-206-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-209-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-213-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-216-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-218-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-220-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-222-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-226-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-224-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline behavioral1/memory/2460-228-0x0000000004C60000-0x0000000004C9F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1456 unio9296.exe 4048 pro6255.exe 2460 qu2483.exe 4568 si289728.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6255.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6255.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio9296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio9296.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3972 4048 WerFault.exe 87 4152 2460 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4048 pro6255.exe 4048 pro6255.exe 2460 qu2483.exe 2460 qu2483.exe 4568 si289728.exe 4568 si289728.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4048 pro6255.exe Token: SeDebugPrivilege 2460 qu2483.exe Token: SeDebugPrivilege 4568 si289728.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2892 wrote to memory of 1456 2892 0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe 86 PID 2892 wrote to memory of 1456 2892 0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe 86 PID 2892 wrote to memory of 1456 2892 0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe 86 PID 1456 wrote to memory of 4048 1456 unio9296.exe 87 PID 1456 wrote to memory of 4048 1456 unio9296.exe 87 PID 1456 wrote to memory of 4048 1456 unio9296.exe 87 PID 1456 wrote to memory of 2460 1456 unio9296.exe 93 PID 1456 wrote to memory of 2460 1456 unio9296.exe 93 PID 1456 wrote to memory of 2460 1456 unio9296.exe 93 PID 2892 wrote to memory of 4568 2892 0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe 98 PID 2892 wrote to memory of 4568 2892 0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe 98 PID 2892 wrote to memory of 4568 2892 0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe"C:\Users\Admin\AppData\Local\Temp\0c8c8c224f60bdd12744dd0f0a04bcfb7a5720bdd37ddbdc00ec5a90fc9fad1b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9296.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9296.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6255.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6255.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 10844⤵
- Program crash
PID:3972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2483.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2483.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 13484⤵
- Program crash
PID:4152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si289728.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si289728.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4048 -ip 40481⤵PID:1284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2460 -ip 24601⤵PID:4320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50890777a2dbdf29d1d92d89e4f4d2a44
SHA1dd708334f6293fe343dbc1f63bcc1d253405e700
SHA256d6c35c09540e02c25a6f4f2f95f10d7d86715865c1d78e689fa8d73db18d4118
SHA512dd5d6c623f7097d2f6f55e7df4ab23a64abb09048c072974d2337f5c8096a7fdaba2e1a06cf53aee2bc547f88aa92451d120252fc7b3e29733b3e2d1f17e4f5c
-
Filesize
175KB
MD50890777a2dbdf29d1d92d89e4f4d2a44
SHA1dd708334f6293fe343dbc1f63bcc1d253405e700
SHA256d6c35c09540e02c25a6f4f2f95f10d7d86715865c1d78e689fa8d73db18d4118
SHA512dd5d6c623f7097d2f6f55e7df4ab23a64abb09048c072974d2337f5c8096a7fdaba2e1a06cf53aee2bc547f88aa92451d120252fc7b3e29733b3e2d1f17e4f5c
-
Filesize
546KB
MD5187e64f263812e63a3846bd352b3b37f
SHA135ac69f976fc0dc151683f077484b5f5117590ee
SHA256c79f65242a950a9de7b7895ece0aa2c2b1ee43ac44dca00b9d175dfecbee3f5f
SHA5121338e7942136a12ff510e3032879b7d79765288a445cdb0f6d385441f7ef789d0dd1648e0eb5dba21ccfeb585bce0f153bbd0832f9957652ae1572fa5b5ff08d
-
Filesize
546KB
MD5187e64f263812e63a3846bd352b3b37f
SHA135ac69f976fc0dc151683f077484b5f5117590ee
SHA256c79f65242a950a9de7b7895ece0aa2c2b1ee43ac44dca00b9d175dfecbee3f5f
SHA5121338e7942136a12ff510e3032879b7d79765288a445cdb0f6d385441f7ef789d0dd1648e0eb5dba21ccfeb585bce0f153bbd0832f9957652ae1572fa5b5ff08d
-
Filesize
329KB
MD55eedfbd045d4c3e1600101ec009573b3
SHA16ff28ed274b0638fcd74c6b1c7cb243da83f4fcf
SHA25606210dc8cecd21ff3dec2883071f15ba010843ea2c94b4a5397764f036a396c0
SHA5122e47068b855070332a583cb081c20dfa733c7792b66a0cf01f47f9aef550dc21bb9a164431510aa9329801ecd48a7ca88905b35bdb4eabd17583ce568ec76b94
-
Filesize
329KB
MD55eedfbd045d4c3e1600101ec009573b3
SHA16ff28ed274b0638fcd74c6b1c7cb243da83f4fcf
SHA25606210dc8cecd21ff3dec2883071f15ba010843ea2c94b4a5397764f036a396c0
SHA5122e47068b855070332a583cb081c20dfa733c7792b66a0cf01f47f9aef550dc21bb9a164431510aa9329801ecd48a7ca88905b35bdb4eabd17583ce568ec76b94
-
Filesize
386KB
MD5c0e5ba1768ee6c7b0535f648b99b9f2c
SHA1a96f2d96e70a91922845bf59ddcfb2b9da042f68
SHA2564b75aec98ba419f9011a7684f2bda8395a1efb8c6155822b52ab47aa1c7d38a7
SHA5122f64733fc94983a54e8821eeeefe3a697d4a3002280eb461810f931e4de2238d85cc0305f9c8a495dbbbb6c7fa85b9fdd2309e0161311d6561d2ad411dfea979
-
Filesize
386KB
MD5c0e5ba1768ee6c7b0535f648b99b9f2c
SHA1a96f2d96e70a91922845bf59ddcfb2b9da042f68
SHA2564b75aec98ba419f9011a7684f2bda8395a1efb8c6155822b52ab47aa1c7d38a7
SHA5122f64733fc94983a54e8821eeeefe3a697d4a3002280eb461810f931e4de2238d85cc0305f9c8a495dbbbb6c7fa85b9fdd2309e0161311d6561d2ad411dfea979