Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe
Resource
win10v2004-20230220-en
General
-
Target
93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe
-
Size
688KB
-
MD5
2ca25ce83ab7d9ef5a268848cfe271e4
-
SHA1
20af785911ad2af79d399629e852bdefcb679855
-
SHA256
93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c
-
SHA512
c7c1d44a0c22705ddccd628ddc303a2ec14a9a2da12d7f5743c9f3df4ce6040888b3cab830b9027b5501e53676ee0d47e3366b5d92417fd42d05864f373d9831
-
SSDEEP
12288:4MrYy90hxnDKoOpGJGCGaT24S+sesV67acwGIwqf243xCbMSKbRxD5lf+IWJ:gye26JGCGaS4SzeM6+Gwe4hyMflxPmJ
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0247.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0247.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1280-194-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-196-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-198-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-200-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-202-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-204-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-206-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-208-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-210-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-212-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-214-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-216-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-218-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-220-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-222-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-224-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-226-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1280-228-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 368 unio8773.exe 1496 pro0247.exe 1280 qu9979.exe 4560 si932068.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0247.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0247.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio8773.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio8773.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4412 1496 WerFault.exe 87 4420 1280 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1496 pro0247.exe 1496 pro0247.exe 1280 qu9979.exe 1280 qu9979.exe 4560 si932068.exe 4560 si932068.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1496 pro0247.exe Token: SeDebugPrivilege 1280 qu9979.exe Token: SeDebugPrivilege 4560 si932068.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 544 wrote to memory of 368 544 93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe 86 PID 544 wrote to memory of 368 544 93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe 86 PID 544 wrote to memory of 368 544 93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe 86 PID 368 wrote to memory of 1496 368 unio8773.exe 87 PID 368 wrote to memory of 1496 368 unio8773.exe 87 PID 368 wrote to memory of 1496 368 unio8773.exe 87 PID 368 wrote to memory of 1280 368 unio8773.exe 93 PID 368 wrote to memory of 1280 368 unio8773.exe 93 PID 368 wrote to memory of 1280 368 unio8773.exe 93 PID 544 wrote to memory of 4560 544 93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe 99 PID 544 wrote to memory of 4560 544 93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe 99 PID 544 wrote to memory of 4560 544 93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe"C:\Users\Admin\AppData\Local\Temp\93b4d5522abb24b35fac5a3c61d2e7ea77b9fa3aab96cf34b9e8b0ce28739d5c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8773.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8773.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0247.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0247.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 10844⤵
- Program crash
PID:4412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9979.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9979.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 17764⤵
- Program crash
PID:4420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si932068.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si932068.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1496 -ip 14961⤵PID:1772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1280 -ip 12801⤵PID:2264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5658ce4e9e0d1f6fbcea2b0b617749662
SHA174b8b0af711245cda3810638d9a4dda5aef95697
SHA256ece5f906af096110e434cb60cb4c345a3f0b429bf046e5134be011f758158cff
SHA512c5dd587b28f60c4c2c27a6438285d04e4fb9a3ba3c14841e3d678c15d807997960457aeae3495d8c4a10cf5c9c083e4e02ce68d2a984d9b220abaa883450a192
-
Filesize
175KB
MD5658ce4e9e0d1f6fbcea2b0b617749662
SHA174b8b0af711245cda3810638d9a4dda5aef95697
SHA256ece5f906af096110e434cb60cb4c345a3f0b429bf046e5134be011f758158cff
SHA512c5dd587b28f60c4c2c27a6438285d04e4fb9a3ba3c14841e3d678c15d807997960457aeae3495d8c4a10cf5c9c083e4e02ce68d2a984d9b220abaa883450a192
-
Filesize
546KB
MD5131d28ba1a0002c774d0b35b04b0a82e
SHA1174ea92bc0085b1f7d85f29182a7b10c69104b88
SHA256de4f6d802e354e177cd90b3c612053abb0d115d623825ad45c38945cdb0de042
SHA512d28ab95e3f297f4e82a9f8088652688b4f014b36aa0b1529456377d80ae3a729457081cb6e7cd4f2810174ca0efe5b0bed2bffe660d43549a0768dace634a31b
-
Filesize
546KB
MD5131d28ba1a0002c774d0b35b04b0a82e
SHA1174ea92bc0085b1f7d85f29182a7b10c69104b88
SHA256de4f6d802e354e177cd90b3c612053abb0d115d623825ad45c38945cdb0de042
SHA512d28ab95e3f297f4e82a9f8088652688b4f014b36aa0b1529456377d80ae3a729457081cb6e7cd4f2810174ca0efe5b0bed2bffe660d43549a0768dace634a31b
-
Filesize
328KB
MD5f46f7b9ca4512b54ee6e6627c6fe0ac9
SHA102be8ce23b5669a85e500ae73bd0156bd5a901a8
SHA256212f9b1493f3da3ac047b64d9b0418a27f28ce3a5c53022faa599329e1c5aa8b
SHA512cc4ab19d6f5b92d1eb7a92ee35a96c1189914ef11048c356b5ced4d5cc202d5a7e2ef47830bfb67460e71132da4c96ed6657d921c361ab329a9d5b06cac7eefb
-
Filesize
328KB
MD5f46f7b9ca4512b54ee6e6627c6fe0ac9
SHA102be8ce23b5669a85e500ae73bd0156bd5a901a8
SHA256212f9b1493f3da3ac047b64d9b0418a27f28ce3a5c53022faa599329e1c5aa8b
SHA512cc4ab19d6f5b92d1eb7a92ee35a96c1189914ef11048c356b5ced4d5cc202d5a7e2ef47830bfb67460e71132da4c96ed6657d921c361ab329a9d5b06cac7eefb
-
Filesize
386KB
MD5aad04590069b579aa15d83faaa3cb119
SHA1dafbd7ccf8934ba89ac0d75e85a200b85a189245
SHA25622bc5bf7a16c0c879a913554ba2a25645be9b04ae7d3daf011f70fb5fea19b61
SHA51246a73d9495f585d4e7a4ac6ce6a27b5e43939f929f4cbdfcc06e989823dd6983eca5135b13552300de5447a5d6ab5f529535013ec2a513fd41c725ee7a745acd
-
Filesize
386KB
MD5aad04590069b579aa15d83faaa3cb119
SHA1dafbd7ccf8934ba89ac0d75e85a200b85a189245
SHA25622bc5bf7a16c0c879a913554ba2a25645be9b04ae7d3daf011f70fb5fea19b61
SHA51246a73d9495f585d4e7a4ac6ce6a27b5e43939f929f4cbdfcc06e989823dd6983eca5135b13552300de5447a5d6ab5f529535013ec2a513fd41c725ee7a745acd