Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe
Resource
win10v2004-20230220-en
General
-
Target
023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe
-
Size
687KB
-
MD5
e2d9a6ccd5f37e36d4a59f1e6f92e8a0
-
SHA1
0101265f6d1c0e779f01933fe6e07ea79fe240ee
-
SHA256
023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc
-
SHA512
d3d4e70e798cceece909f7734603330ac2d49fb0ea798024f18d9c7f3637127a8a59a170b167dd5c3a6e1d646e17673170db10348f206c3a26f86920e0963cb0
-
SSDEEP
12288:DMrmy90JN34VxMn1nNwi7R/80SechIhPADiOs5Ts8tzaZ:NyvinRNwE0IPUi5gizaZ
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
viza
193.233.20.32:4125
-
auth_value
153a106a89fae7251f2dc17be2eb5720
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9414.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1856-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-203-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-207-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-210-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-212-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-206-0x0000000004D50000-0x0000000004D60000-memory.dmp family_redline behavioral1/memory/1856-214-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-224-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-226-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline behavioral1/memory/1856-228-0x0000000004CE0000-0x0000000004D1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5020 un176306.exe 1904 pro9414.exe 1856 qu8259.exe 2816 si997591.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9414.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un176306.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un176306.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3432 1904 WerFault.exe 84 3240 1856 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1904 pro9414.exe 1904 pro9414.exe 1856 qu8259.exe 1856 qu8259.exe 2816 si997591.exe 2816 si997591.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1904 pro9414.exe Token: SeDebugPrivilege 1856 qu8259.exe Token: SeDebugPrivilege 2816 si997591.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3696 wrote to memory of 5020 3696 023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe 83 PID 3696 wrote to memory of 5020 3696 023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe 83 PID 3696 wrote to memory of 5020 3696 023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe 83 PID 5020 wrote to memory of 1904 5020 un176306.exe 84 PID 5020 wrote to memory of 1904 5020 un176306.exe 84 PID 5020 wrote to memory of 1904 5020 un176306.exe 84 PID 5020 wrote to memory of 1856 5020 un176306.exe 90 PID 5020 wrote to memory of 1856 5020 un176306.exe 90 PID 5020 wrote to memory of 1856 5020 un176306.exe 90 PID 3696 wrote to memory of 2816 3696 023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe 94 PID 3696 wrote to memory of 2816 3696 023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe 94 PID 3696 wrote to memory of 2816 3696 023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe"C:\Users\Admin\AppData\Local\Temp\023123d097ed6f42b15c785e51af6d27c093eca66bdd171c47246bd8939800cc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un176306.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un176306.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9414.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9414.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 10804⤵
- Program crash
PID:3432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8259.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8259.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 13324⤵
- Program crash
PID:3240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si997591.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si997591.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1904 -ip 19041⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1856 -ip 18561⤵PID:4544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
545KB
MD559e3b5163b828e4151594c92265dac1e
SHA140c6507215bdbfa41b621d96fddcad1630d01c85
SHA256255cfb913ca3be755e6dfee05d9fae26dbfe7d1d63f9fcae35f5f88ebb988a0f
SHA512e6345a1adc9ac8645a94d0ac5e03ebf770d459b3227e93f14ccb16333f7e1c045ee4be42fb0f027eaa8ab25543059aeda52434be2bbe2790c44119797a6211dd
-
Filesize
545KB
MD559e3b5163b828e4151594c92265dac1e
SHA140c6507215bdbfa41b621d96fddcad1630d01c85
SHA256255cfb913ca3be755e6dfee05d9fae26dbfe7d1d63f9fcae35f5f88ebb988a0f
SHA512e6345a1adc9ac8645a94d0ac5e03ebf770d459b3227e93f14ccb16333f7e1c045ee4be42fb0f027eaa8ab25543059aeda52434be2bbe2790c44119797a6211dd
-
Filesize
325KB
MD5aabbba0ceccd86cb88050514a832421f
SHA17e2a2141199986710cb3419bcc1f32940f1bf411
SHA256423ab3e1ec5212ddc928079bde106a0fbd714dbf334893be7a5ca08275b5b0c9
SHA512a1b9e52a001aeb4047b20bbc0d282df238e8a04c6a2669e2a53c1bf8e35566bc8305eaa39f0df5010596ec0313f6c2b78430579b3d0091ad052724ea958b1621
-
Filesize
325KB
MD5aabbba0ceccd86cb88050514a832421f
SHA17e2a2141199986710cb3419bcc1f32940f1bf411
SHA256423ab3e1ec5212ddc928079bde106a0fbd714dbf334893be7a5ca08275b5b0c9
SHA512a1b9e52a001aeb4047b20bbc0d282df238e8a04c6a2669e2a53c1bf8e35566bc8305eaa39f0df5010596ec0313f6c2b78430579b3d0091ad052724ea958b1621
-
Filesize
383KB
MD50202f67bcc7e66bbfbeffffa65a0352c
SHA1c120f64fd1eb5081553abb6d5e5773752fedea51
SHA25631449d3c9b719103e380457cdcd8ad7ad10bb10840c8db7124bb6b198cc6aef6
SHA512a2b5ee661b4d7026dcf0de739cb0b57e6a0e4e143a61084736c9653196ac0a640398e233a8dab7a9a5d55a37b49e6805f94a5535a8cadeec29e96c6f9403d142
-
Filesize
383KB
MD50202f67bcc7e66bbfbeffffa65a0352c
SHA1c120f64fd1eb5081553abb6d5e5773752fedea51
SHA25631449d3c9b719103e380457cdcd8ad7ad10bb10840c8db7124bb6b198cc6aef6
SHA512a2b5ee661b4d7026dcf0de739cb0b57e6a0e4e143a61084736c9653196ac0a640398e233a8dab7a9a5d55a37b49e6805f94a5535a8cadeec29e96c6f9403d142