Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
86s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe
Resource
win10v2004-20230221-en
General
-
Target
1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe
-
Size
688KB
-
MD5
0b8c3368818abee20d625e7f1174654f
-
SHA1
b994046bc149b4c33c89d5c2001babef1520df01
-
SHA256
1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935
-
SHA512
2441dc1ea9af8ac88a98b0d85c41b4f9f596caba030cf29d4072f5c008007d72adb9616430dfac8dbe782a8e7fbbc953965e246ce5a618e3fa498ba3bf660058
-
SSDEEP
12288:CMrmy90n3lVKfGSUobxW0k/jHQB6zx1MsY3+hm24f43xqYMpKbvZTItBOl5E:Yye3lEeRobxDcjvIOhm2+4hZMYDtIXOw
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7134.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7134.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4040-193-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-194-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-196-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-198-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-200-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-204-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-202-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-206-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-208-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-210-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-212-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-214-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-216-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-218-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-220-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-222-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-224-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4040-226-0x0000000007160000-0x000000000719F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3728 unio6141.exe 2092 pro7134.exe 4040 qu1019.exe 1532 si248601.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7134.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio6141.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio6141.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3804 2092 WerFault.exe 85 4820 4040 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2092 pro7134.exe 2092 pro7134.exe 4040 qu1019.exe 4040 qu1019.exe 1532 si248601.exe 1532 si248601.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2092 pro7134.exe Token: SeDebugPrivilege 4040 qu1019.exe Token: SeDebugPrivilege 1532 si248601.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2624 wrote to memory of 3728 2624 1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe 84 PID 2624 wrote to memory of 3728 2624 1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe 84 PID 2624 wrote to memory of 3728 2624 1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe 84 PID 3728 wrote to memory of 2092 3728 unio6141.exe 85 PID 3728 wrote to memory of 2092 3728 unio6141.exe 85 PID 3728 wrote to memory of 2092 3728 unio6141.exe 85 PID 3728 wrote to memory of 4040 3728 unio6141.exe 90 PID 3728 wrote to memory of 4040 3728 unio6141.exe 90 PID 3728 wrote to memory of 4040 3728 unio6141.exe 90 PID 2624 wrote to memory of 1532 2624 1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe 95 PID 2624 wrote to memory of 1532 2624 1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe 95 PID 2624 wrote to memory of 1532 2624 1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe"C:\Users\Admin\AppData\Local\Temp\1536e6a97996a93dba9afc38dcca85195d4f0138b0bd978c005d199e0c009935.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6141.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6141.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7134.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 10844⤵
- Program crash
PID:3804
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1019.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1019.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 13484⤵
- Program crash
PID:4820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si248601.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si248601.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2092 -ip 20921⤵PID:948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4040 -ip 40401⤵PID:508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD54128c254670de24789abdd148ba54cca
SHA1bf8282c88922fb22a84a5eca9485d72316a074c3
SHA25674b7316b9c7d538f879cd3e4440626f075346e38b0f46c702b1d055649e8998a
SHA512eca30cc97a62988b78587497161c2fc29a05bbc0235557be57b5b36a842275cd1d481369eb4449e8c9ef6b39d12b7b42a0c9144253d006fb57bd8e2f2ef7f606
-
Filesize
175KB
MD54128c254670de24789abdd148ba54cca
SHA1bf8282c88922fb22a84a5eca9485d72316a074c3
SHA25674b7316b9c7d538f879cd3e4440626f075346e38b0f46c702b1d055649e8998a
SHA512eca30cc97a62988b78587497161c2fc29a05bbc0235557be57b5b36a842275cd1d481369eb4449e8c9ef6b39d12b7b42a0c9144253d006fb57bd8e2f2ef7f606
-
Filesize
546KB
MD5f10b3c9023d53967bc6e6a755cb8133c
SHA153eef0c27bb2e8155bd5bbdb00281692fba4cb40
SHA256f78e048ce3531871faa9c2341311246adfcaff90f9a7069c09335920cca2757f
SHA51233c03f3804aff68c964a992fbcc23d819cb78a99c810485dc9f55e0920972fe642ea8afd64b329f27d6b8da664741b89ddfaaaea9f3b2ae25962fd0320cba40c
-
Filesize
546KB
MD5f10b3c9023d53967bc6e6a755cb8133c
SHA153eef0c27bb2e8155bd5bbdb00281692fba4cb40
SHA256f78e048ce3531871faa9c2341311246adfcaff90f9a7069c09335920cca2757f
SHA51233c03f3804aff68c964a992fbcc23d819cb78a99c810485dc9f55e0920972fe642ea8afd64b329f27d6b8da664741b89ddfaaaea9f3b2ae25962fd0320cba40c
-
Filesize
329KB
MD59115d5f4a39cd2d4d7b3cc7fe4efb31c
SHA12f3fa8a7155a19385de8c8ed84d8bf4d9d030c1a
SHA256413b2b61750a7ba0f0f5828150d975993cfef494e7a9028720040f87d2748107
SHA512679c80b714ad97d26cdb963f91fb3c932cce7d6dd10c16d9239b6d0eea0d9db38216ab9442e01d9faff5184c12146a8c87649f88fe4f5c8102748e137f668b49
-
Filesize
329KB
MD59115d5f4a39cd2d4d7b3cc7fe4efb31c
SHA12f3fa8a7155a19385de8c8ed84d8bf4d9d030c1a
SHA256413b2b61750a7ba0f0f5828150d975993cfef494e7a9028720040f87d2748107
SHA512679c80b714ad97d26cdb963f91fb3c932cce7d6dd10c16d9239b6d0eea0d9db38216ab9442e01d9faff5184c12146a8c87649f88fe4f5c8102748e137f668b49
-
Filesize
386KB
MD58bfe29edad927fdceb21ad091c2fbb78
SHA1912c9669954333a352f123b241cfb115fd62e3dc
SHA25624a2b29ad9ef045f4ff5402d3328847c192702dd2ccc8fe62507ec4fdfd24838
SHA512b813710f4acc799325ef9055ab261d55b7032a29d49be5fe7ad41f614205a4709b2ecd965c9c1ca3243f742b108ab39d55cc169787a8a923844d7efde0572a09
-
Filesize
386KB
MD58bfe29edad927fdceb21ad091c2fbb78
SHA1912c9669954333a352f123b241cfb115fd62e3dc
SHA25624a2b29ad9ef045f4ff5402d3328847c192702dd2ccc8fe62507ec4fdfd24838
SHA512b813710f4acc799325ef9055ab261d55b7032a29d49be5fe7ad41f614205a4709b2ecd965c9c1ca3243f742b108ab39d55cc169787a8a923844d7efde0572a09