Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
86s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 17:54 UTC
Static task
static1
Behavioral task
behavioral1
Sample
acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe
Resource
win10v2004-20230220-en
General
-
Target
acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe
-
Size
686KB
-
MD5
0099ac6370d58d91cfa2a355b0fb07ed
-
SHA1
e2035f72f4131d8e51bb9504e19368bc18222919
-
SHA256
acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e
-
SHA512
f36086f80c61d13d1ac36d3166884fb457f9730b183e6f67c924be006a1242526533b7ce6fea07100944a9413c3130f2b5f02eb005797388e97a5c4466e45d0c
-
SSDEEP
12288:1Mr4y90aCHY7IuklSoEAXGR4iNdaygaQq8K/B1Ih/GQxyy2zDQms5nyWBhyL:VyAnLStmRiNdayRQz55yy2fQhyrL
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
viza
193.233.20.32:4125
-
auth_value
153a106a89fae7251f2dc17be2eb5720
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6720.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6720.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6720.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6720.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6720.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6720.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1992-191-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-192-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-194-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-196-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-198-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-200-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-202-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-204-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-206-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-209-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-212-0x0000000007350000-0x0000000007360000-memory.dmp family_redline behavioral1/memory/1992-214-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-216-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-218-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-220-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-222-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-224-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-226-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1992-228-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1496 un355272.exe 584 pro6720.exe 1992 qu8719.exe 4560 si271549.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6720.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6720.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un355272.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un355272.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1160 584 WerFault.exe 85 2592 1992 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 584 pro6720.exe 584 pro6720.exe 1992 qu8719.exe 1992 qu8719.exe 4560 si271549.exe 4560 si271549.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 584 pro6720.exe Token: SeDebugPrivilege 1992 qu8719.exe Token: SeDebugPrivilege 4560 si271549.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1496 1432 acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe 84 PID 1432 wrote to memory of 1496 1432 acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe 84 PID 1432 wrote to memory of 1496 1432 acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe 84 PID 1496 wrote to memory of 584 1496 un355272.exe 85 PID 1496 wrote to memory of 584 1496 un355272.exe 85 PID 1496 wrote to memory of 584 1496 un355272.exe 85 PID 1496 wrote to memory of 1992 1496 un355272.exe 91 PID 1496 wrote to memory of 1992 1496 un355272.exe 91 PID 1496 wrote to memory of 1992 1496 un355272.exe 91 PID 1432 wrote to memory of 4560 1432 acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe 95 PID 1432 wrote to memory of 4560 1432 acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe 95 PID 1432 wrote to memory of 4560 1432 acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe"C:\Users\Admin\AppData\Local\Temp\acd0ff02fb9c4e6ff8f9fce8ce69c62335d836891851274c2a05ec7ea8e51c1e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355272.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355272.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6720.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6720.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 10804⤵
- Program crash
PID:1160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8719.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8719.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 11764⤵
- Program crash
PID:2592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si271549.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si271549.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 584 -ip 5841⤵PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1992 -ip 19921⤵PID:4908
Network
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request32.20.233.193.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request45.8.109.52.in-addr.arpaIN PTRResponse
-
322 B 7
-
322 B 7
-
878.6kB 18.9kB 653 318
-
322 B 7
-
260 B 200 B 5 5
-
322 B 7
-
322 B 7
-
878.8kB 18.5kB 656 305
-
322 B 7
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
72 B 127 B 1 1
DNS Request
32.20.233.193.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
45.8.109.52.in-addr.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
544KB
MD513049a996858ef85e3bb1460e000cc96
SHA1ff01b59c655f9916f9d4ece5487740c6823826ff
SHA256057100315cb9cd80798da0404cc01f20ff3b1f385fb78301bd8d8aeee81278f0
SHA512eb68e4283236c7f3593587a3d824f5cae0e04e68e11b24cee5c647514ec30c31b081288f643450667f2f45ae0469499b6c52e512cebd9d373165f5df3148ca9d
-
Filesize
544KB
MD513049a996858ef85e3bb1460e000cc96
SHA1ff01b59c655f9916f9d4ece5487740c6823826ff
SHA256057100315cb9cd80798da0404cc01f20ff3b1f385fb78301bd8d8aeee81278f0
SHA512eb68e4283236c7f3593587a3d824f5cae0e04e68e11b24cee5c647514ec30c31b081288f643450667f2f45ae0469499b6c52e512cebd9d373165f5df3148ca9d
-
Filesize
325KB
MD5d0a268e348e5e5eace72e7cdef579b50
SHA10521551d74260c25ac62858357d9a3455f4a3088
SHA256ee340a08842cab8ff1fc1549993292e61ba477fdd8c596919a826d7070689556
SHA512b37dee345972bf464ca641fd0a5694b6149736521662db2642001dbe34ac4b0db7e0604211a2d3ab6e52c067eb0d9ea6763a9c433e75190cfbd8a8c39703e3e7
-
Filesize
325KB
MD5d0a268e348e5e5eace72e7cdef579b50
SHA10521551d74260c25ac62858357d9a3455f4a3088
SHA256ee340a08842cab8ff1fc1549993292e61ba477fdd8c596919a826d7070689556
SHA512b37dee345972bf464ca641fd0a5694b6149736521662db2642001dbe34ac4b0db7e0604211a2d3ab6e52c067eb0d9ea6763a9c433e75190cfbd8a8c39703e3e7
-
Filesize
383KB
MD50f9ef34536d2a1de9949355f4868862f
SHA185bf49f9a0ee6d5860b2cc15f7fdc184b121cdff
SHA25656fc656116b9866985824bd6f89a325e76a43e213e17e02a922aebc2cfaaa660
SHA5121b95176c7e638fda1ea06e02754493f83fdd44e8ba465f412b9e2a47c0c1bf5fd5c65ef4d0666b0891f3020124f4c083dc4d04b6edeba6eed9dbfcbb228dd2f1
-
Filesize
383KB
MD50f9ef34536d2a1de9949355f4868862f
SHA185bf49f9a0ee6d5860b2cc15f7fdc184b121cdff
SHA25656fc656116b9866985824bd6f89a325e76a43e213e17e02a922aebc2cfaaa660
SHA5121b95176c7e638fda1ea06e02754493f83fdd44e8ba465f412b9e2a47c0c1bf5fd5c65ef4d0666b0891f3020124f4c083dc4d04b6edeba6eed9dbfcbb228dd2f1