Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe
Resource
win10v2004-20230220-en
General
-
Target
062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe
-
Size
688KB
-
MD5
c8905450b65f99ae405bf621a149acc5
-
SHA1
ad70b0701d6d50537476ebb5147fba617ebe0102
-
SHA256
062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a
-
SHA512
93544d2527f2143d8bb03943d646df52e642647f8311c180e532503601b2bf223c7a0aef2c2e48e62f076712d0a5ad2c21c67eff63ca75b41f53304bc1dfc7a5
-
SSDEEP
12288:jMrEy90J8Slz8Do/o5uUH4hlpnKXI5VVmYxSeYy+zB43xXYMhKbvxGdDWXu2:XyM8Slyo/le2l9PmYxSjR4hIMA7xGVw7
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6282.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6282.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1468-191-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-192-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-194-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-196-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-198-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-200-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-202-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-204-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-206-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-208-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-215-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-218-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-220-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-211-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-222-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-224-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-226-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-228-0x0000000004BC0000-0x0000000004BFF000-memory.dmp family_redline behavioral1/memory/1468-1111-0x00000000073C0000-0x00000000073D0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3044 unio4666.exe 4040 pro6282.exe 1468 qu7454.exe 3292 si212664.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6282.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio4666.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio4666.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3644 4040 WerFault.exe 87 3684 1468 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4040 pro6282.exe 4040 pro6282.exe 1468 qu7454.exe 1468 qu7454.exe 3292 si212664.exe 3292 si212664.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4040 pro6282.exe Token: SeDebugPrivilege 1468 qu7454.exe Token: SeDebugPrivilege 3292 si212664.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4380 wrote to memory of 3044 4380 062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe 86 PID 4380 wrote to memory of 3044 4380 062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe 86 PID 4380 wrote to memory of 3044 4380 062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe 86 PID 3044 wrote to memory of 4040 3044 unio4666.exe 87 PID 3044 wrote to memory of 4040 3044 unio4666.exe 87 PID 3044 wrote to memory of 4040 3044 unio4666.exe 87 PID 3044 wrote to memory of 1468 3044 unio4666.exe 93 PID 3044 wrote to memory of 1468 3044 unio4666.exe 93 PID 3044 wrote to memory of 1468 3044 unio4666.exe 93 PID 4380 wrote to memory of 3292 4380 062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe 102 PID 4380 wrote to memory of 3292 4380 062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe 102 PID 4380 wrote to memory of 3292 4380 062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe"C:\Users\Admin\AppData\Local\Temp\062776ef7a20d08c9e92343d49872bf7e002ca33beddc186062264c16e43f39a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4666.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4666.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6282.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6282.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 10844⤵
- Program crash
PID:3644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7454.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7454.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 14764⤵
- Program crash
PID:3684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si212664.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si212664.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4040 -ip 40401⤵PID:2600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1468 -ip 14681⤵PID:3264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50bc616c444f764d45037b834db7c2527
SHA16aa3a885869dda498a54849e71625cdc9c9e8ae6
SHA25608f54ed93bed9d3e9994f1a850a57d0c704b0dda5f92d431b9a11414916102a3
SHA512f27e9f72d5669a2aad57cbb7b5e40b5bfd0ee34720927ff9024df699e6349b5f372a5b2c7c2cd6e2aa0797d8ec17f3762b6e3f4ee99b92f1877dfa21390e9eac
-
Filesize
175KB
MD50bc616c444f764d45037b834db7c2527
SHA16aa3a885869dda498a54849e71625cdc9c9e8ae6
SHA25608f54ed93bed9d3e9994f1a850a57d0c704b0dda5f92d431b9a11414916102a3
SHA512f27e9f72d5669a2aad57cbb7b5e40b5bfd0ee34720927ff9024df699e6349b5f372a5b2c7c2cd6e2aa0797d8ec17f3762b6e3f4ee99b92f1877dfa21390e9eac
-
Filesize
546KB
MD50b7b6d6cd58ba2ac0c32ac5d10515250
SHA110d204a902bd865c415279ffc5ebf627146e75d7
SHA2566a42b854ea79bbebb5a7734fd18374a3ebf3c9b463c7b33b8207803cb37ee060
SHA5120fab8321068c5eb6ebbdfdbe4e05b5494111ba50486c87962fe1888d6c4f4407cdf7905fb919e68d90dfe3da025b9a95edfbbea64fde6640055e1265cef263d4
-
Filesize
546KB
MD50b7b6d6cd58ba2ac0c32ac5d10515250
SHA110d204a902bd865c415279ffc5ebf627146e75d7
SHA2566a42b854ea79bbebb5a7734fd18374a3ebf3c9b463c7b33b8207803cb37ee060
SHA5120fab8321068c5eb6ebbdfdbe4e05b5494111ba50486c87962fe1888d6c4f4407cdf7905fb919e68d90dfe3da025b9a95edfbbea64fde6640055e1265cef263d4
-
Filesize
329KB
MD5feccfab0368b2931d10e445764382573
SHA1a8aca5eb3cd31cc940b1a085a57adf64285dea0c
SHA25638a612feef0258d911c8f2fd7c982010c5c8f9f0a1921f7a81c63f37e7ad877a
SHA5127e327f832faf0ae1b1a210a92cfa29d4dd84e36c59133736770b645cab735f52515b918df1b34e20a5748d4a46155401617f7b5d3fc86dddbbc3c0d9b901751c
-
Filesize
329KB
MD5feccfab0368b2931d10e445764382573
SHA1a8aca5eb3cd31cc940b1a085a57adf64285dea0c
SHA25638a612feef0258d911c8f2fd7c982010c5c8f9f0a1921f7a81c63f37e7ad877a
SHA5127e327f832faf0ae1b1a210a92cfa29d4dd84e36c59133736770b645cab735f52515b918df1b34e20a5748d4a46155401617f7b5d3fc86dddbbc3c0d9b901751c
-
Filesize
386KB
MD50a45dd35e2f654842ee8f1fca73833c9
SHA1a3b438ee4e4c6ed2e2c95c39341c4f17984327f0
SHA256e8c20418cfcce9076454ada3e1859b94bc81b0f3355ce6e3d329b882086cf987
SHA51201e7e1c10059f548991cb78cdab09385f8ac0eb92decfaa63a4a05052b5267d99d3300b1afc64663649be48f4d1d6d9c1edfe53e7ffef9d48f7b5ca2057710b4
-
Filesize
386KB
MD50a45dd35e2f654842ee8f1fca73833c9
SHA1a3b438ee4e4c6ed2e2c95c39341c4f17984327f0
SHA256e8c20418cfcce9076454ada3e1859b94bc81b0f3355ce6e3d329b882086cf987
SHA51201e7e1c10059f548991cb78cdab09385f8ac0eb92decfaa63a4a05052b5267d99d3300b1afc64663649be48f4d1d6d9c1edfe53e7ffef9d48f7b5ca2057710b4