Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe
Resource
win10v2004-20230220-en
General
-
Target
edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe
-
Size
687KB
-
MD5
0c2ec3da79f9bd5dcd8516d86f2343b9
-
SHA1
37cb4c2939a7d55220e27fe737f202312f293b30
-
SHA256
edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3
-
SHA512
490d7d0ffcd97afe65466aee1cf293fcc1c59cd20e3af70ad27f77948c2a864a0e15180006499974632d2ddcdbc279881422647fa1363f3964901e3dd1e023f3
-
SSDEEP
12288:oMrCy903n7lGVG5H82DSv7hSeX1yKbrRCB70WJ6TmFjIpgIVIVjQvNJb:6yqn5GVIA7Fw05mp+MQFp
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lenka
193.233.20.32:4125
-
auth_value
8a60e8b2ec79d6a7e92f9feac39b8830
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9449.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4608-191-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-192-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-194-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-196-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-198-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-200-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-202-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-204-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-206-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-208-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-210-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-213-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-218-0x00000000071A0000-0x00000000071B0000-memory.dmp family_redline behavioral1/memory/4608-216-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-220-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-222-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-224-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-226-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-228-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4608-1109-0x00000000071A0000-0x00000000071B0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1984 unio0812.exe 1432 pro9449.exe 4608 qu1498.exe 1500 si912600.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9449.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio0812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio0812.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1012 1432 WerFault.exe 85 1312 4608 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1432 pro9449.exe 1432 pro9449.exe 4608 qu1498.exe 4608 qu1498.exe 1500 si912600.exe 1500 si912600.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1432 pro9449.exe Token: SeDebugPrivilege 4608 qu1498.exe Token: SeDebugPrivilege 1500 si912600.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1984 1200 edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe 84 PID 1200 wrote to memory of 1984 1200 edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe 84 PID 1200 wrote to memory of 1984 1200 edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe 84 PID 1984 wrote to memory of 1432 1984 unio0812.exe 85 PID 1984 wrote to memory of 1432 1984 unio0812.exe 85 PID 1984 wrote to memory of 1432 1984 unio0812.exe 85 PID 1984 wrote to memory of 4608 1984 unio0812.exe 91 PID 1984 wrote to memory of 4608 1984 unio0812.exe 91 PID 1984 wrote to memory of 4608 1984 unio0812.exe 91 PID 1200 wrote to memory of 1500 1200 edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe 96 PID 1200 wrote to memory of 1500 1200 edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe 96 PID 1200 wrote to memory of 1500 1200 edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe"C:\Users\Admin\AppData\Local\Temp\edb1015f577204b1df5cb434050854309005d5fa090e03169e6cf2210352d7b3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0812.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0812.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9449.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9449.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 10804⤵
- Program crash
PID:1012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1498.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1498.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 16564⤵
- Program crash
PID:1312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si912600.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si912600.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1432 -ip 14321⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4608 -ip 46081⤵PID:4564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b021b86ac43db32869ae589ee0b5a5eb
SHA1daa59d7bd93222d53a70eec3840244729a60a2e8
SHA256f4e9048b2f582f93852ce873a8d99af9826071eb35f6cf8fd6410cb3802f2433
SHA512ae95ab14c8fd017166f0048bfcbae85d2064a5c7c072ebf5f1857b2cd61ed9d74152b734acc300d5048444601a54b42c9469c7501f7077cb3fdc30617563afcc
-
Filesize
175KB
MD5b021b86ac43db32869ae589ee0b5a5eb
SHA1daa59d7bd93222d53a70eec3840244729a60a2e8
SHA256f4e9048b2f582f93852ce873a8d99af9826071eb35f6cf8fd6410cb3802f2433
SHA512ae95ab14c8fd017166f0048bfcbae85d2064a5c7c072ebf5f1857b2cd61ed9d74152b734acc300d5048444601a54b42c9469c7501f7077cb3fdc30617563afcc
-
Filesize
546KB
MD5d5cf7ec35db069ab1eb92f300ea8da53
SHA18a18859496b2aa771927963b094edae8771e1e04
SHA256dcf45ec124f7f69cbc7b3404951238c5e5642a5eaf3608267956e1d050d48b51
SHA5123ae1906eb9e3711411f51470cd4a94b386d38f76cfa1081bad6bbd62d7ba27da1c7cb3b3b922132c6fa827d3476e121ef1e8691e51efe933df5ecd9354e362cf
-
Filesize
546KB
MD5d5cf7ec35db069ab1eb92f300ea8da53
SHA18a18859496b2aa771927963b094edae8771e1e04
SHA256dcf45ec124f7f69cbc7b3404951238c5e5642a5eaf3608267956e1d050d48b51
SHA5123ae1906eb9e3711411f51470cd4a94b386d38f76cfa1081bad6bbd62d7ba27da1c7cb3b3b922132c6fa827d3476e121ef1e8691e51efe933df5ecd9354e362cf
-
Filesize
328KB
MD5d22ebc9e2c3d0c0e69253fbd1138e443
SHA1efbd6292f2a6de22521bbf28a19a53a2687e9ba0
SHA256902b96396a2058638fabb5e426664ada130a2d07593f294cbf9ea99df8837305
SHA512ad992f77a6d7ae51423bf22409ee63d999cc56e03040e13bb8cb1123de042a55ff6b985b9cfe4dee814ea9ae4f23b42e5bf8e2712927ba1fe890ccf07070262e
-
Filesize
328KB
MD5d22ebc9e2c3d0c0e69253fbd1138e443
SHA1efbd6292f2a6de22521bbf28a19a53a2687e9ba0
SHA256902b96396a2058638fabb5e426664ada130a2d07593f294cbf9ea99df8837305
SHA512ad992f77a6d7ae51423bf22409ee63d999cc56e03040e13bb8cb1123de042a55ff6b985b9cfe4dee814ea9ae4f23b42e5bf8e2712927ba1fe890ccf07070262e
-
Filesize
386KB
MD53baa0239d6499143f2495409b4be126e
SHA14fb015e9d16adc2ad2aef02c3cb4149ee094d108
SHA2567e377207b96bef7cc74d3d59802a8c9c3d7cc28fb056aea25e711c41ee94911a
SHA512d3bcadc1fdad4cf2e7ea9b0e368a86d420360d2035aa13d15028c4de246bcee06c1b176e35903487f24071ca19217ad0a1c0d2c34875cda44b2605778bac49cf
-
Filesize
386KB
MD53baa0239d6499143f2495409b4be126e
SHA14fb015e9d16adc2ad2aef02c3cb4149ee094d108
SHA2567e377207b96bef7cc74d3d59802a8c9c3d7cc28fb056aea25e711c41ee94911a
SHA512d3bcadc1fdad4cf2e7ea9b0e368a86d420360d2035aa13d15028c4de246bcee06c1b176e35903487f24071ca19217ad0a1c0d2c34875cda44b2605778bac49cf