Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe
Resource
win10v2004-20230220-en
General
-
Target
73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe
-
Size
687KB
-
MD5
b58dfdaa34f1fecf7e03600c01d942d8
-
SHA1
ef95a4d82d96891776b8aedea312cb76d0bf96a9
-
SHA256
73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227
-
SHA512
72d7ebf4d77f4d8c341e87e7dfeec8ffd3e1072ff9962e195dbbf4263c85076d86d708b427fba0abfe9410887dca22e733e09e0237d30769f3f50fc7f2df04b3
-
SSDEEP
12288:FMrYy90tEFlvBCMEpaOGrt+q71luRU6BMfzak22YAwH:RywEFZBQaB8kmUt7SAwH
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
viza
193.233.20.32:4125
-
auth_value
153a106a89fae7251f2dc17be2eb5720
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5021.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5021.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1520-191-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-192-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-194-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-196-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-198-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-200-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-202-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-204-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-206-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-208-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-210-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-212-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-214-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-222-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-217-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-224-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-226-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline behavioral1/memory/1520-228-0x0000000004C50000-0x0000000004C8F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3176 un334410.exe 1120 pro5021.exe 1520 qu3088.exe 5048 si501817.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5021.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5021.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un334410.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un334410.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1032 1120 WerFault.exe 80 224 1520 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1120 pro5021.exe 1120 pro5021.exe 1520 qu3088.exe 1520 qu3088.exe 5048 si501817.exe 5048 si501817.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1120 pro5021.exe Token: SeDebugPrivilege 1520 qu3088.exe Token: SeDebugPrivilege 5048 si501817.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3896 wrote to memory of 3176 3896 73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe 79 PID 3896 wrote to memory of 3176 3896 73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe 79 PID 3896 wrote to memory of 3176 3896 73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe 79 PID 3176 wrote to memory of 1120 3176 un334410.exe 80 PID 3176 wrote to memory of 1120 3176 un334410.exe 80 PID 3176 wrote to memory of 1120 3176 un334410.exe 80 PID 3176 wrote to memory of 1520 3176 un334410.exe 89 PID 3176 wrote to memory of 1520 3176 un334410.exe 89 PID 3176 wrote to memory of 1520 3176 un334410.exe 89 PID 3896 wrote to memory of 5048 3896 73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe 93 PID 3896 wrote to memory of 5048 3896 73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe 93 PID 3896 wrote to memory of 5048 3896 73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe"C:\Users\Admin\AppData\Local\Temp\73ff5541b3900833a712d842e799b4198aec7f90e4bb3abf0aed41693fb68227.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un334410.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un334410.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5021.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5021.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 10804⤵
- Program crash
PID:1032
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3088.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3088.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 13284⤵
- Program crash
PID:224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501817.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si501817.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1120 -ip 11201⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1520 -ip 15201⤵PID:348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
175KB
MD5ee59ed8d569a7ffd44c985c447f60e1f
SHA17ff41aaf2c2ea296a22a9b7fae10cfeb19a1548f
SHA2566e89936c0b9cde9c7ec2edf5cd70dc9d2c68bc674afaa9e2be2ab6538f7e2e1d
SHA5120cd4a8b3fe1e89c45a8896493759519bb4caa6ade57f23e05a4901c8c493c1634a63beb9fbc5bf911064bf5b8b0a818d7277d9b30402ffbe9f5b47a9a9e380dd
-
Filesize
545KB
MD590bd0e145b046ac178e9b8cf8c2edfad
SHA1491109fa56560792bf5d9b1a3683a89ed2032bd8
SHA2568999566944cbb63b7efd71791b24cdb5063004a2b037ca4594a689e2bdf8d38c
SHA512abbeed504321c2dc01efea0475752dc99ff268f20ddcc4a27aa8ad26702bbbd7edccc57d0286d14ecfe01bf3db57e15510369d2a4cd2bb4ba1172b6d4050f9d5
-
Filesize
545KB
MD590bd0e145b046ac178e9b8cf8c2edfad
SHA1491109fa56560792bf5d9b1a3683a89ed2032bd8
SHA2568999566944cbb63b7efd71791b24cdb5063004a2b037ca4594a689e2bdf8d38c
SHA512abbeed504321c2dc01efea0475752dc99ff268f20ddcc4a27aa8ad26702bbbd7edccc57d0286d14ecfe01bf3db57e15510369d2a4cd2bb4ba1172b6d4050f9d5
-
Filesize
325KB
MD54308c516e1c2b85a164fb3d2f781ab00
SHA1b880de240c76c51d81976332498a2ad152b10c7b
SHA256c45ee030126e9ac1abefdc47659efdc856b8a89bf1faf3fa1649513f06975897
SHA512a936c290cb6ec8054a5d350cf1b350781b81be53f42f7458fab7aff55908866dcfaa51dc2637857828b6130360a8b8ff14f9c8cddc60a606aa9e3a78631fc041
-
Filesize
325KB
MD54308c516e1c2b85a164fb3d2f781ab00
SHA1b880de240c76c51d81976332498a2ad152b10c7b
SHA256c45ee030126e9ac1abefdc47659efdc856b8a89bf1faf3fa1649513f06975897
SHA512a936c290cb6ec8054a5d350cf1b350781b81be53f42f7458fab7aff55908866dcfaa51dc2637857828b6130360a8b8ff14f9c8cddc60a606aa9e3a78631fc041
-
Filesize
383KB
MD568fdc65c16c6c351568b8ea3b1f8863a
SHA115e9081ec42ef490888156c83e5fa9131a71681a
SHA256113c5f60e7fa0ae18262e9564ce2e4bccfae02b871dd7c79d73c9b59698f0c5c
SHA5128d6e3b7c9c1fae53dd9b29f39a13c7e5dd2dc3efeb059f6f84cd535dafcecfb053c2fc2f7645e150b9f880b52c019208ce7df36afa29988c7098b6c7b960bbc3
-
Filesize
383KB
MD568fdc65c16c6c351568b8ea3b1f8863a
SHA115e9081ec42ef490888156c83e5fa9131a71681a
SHA256113c5f60e7fa0ae18262e9564ce2e4bccfae02b871dd7c79d73c9b59698f0c5c
SHA5128d6e3b7c9c1fae53dd9b29f39a13c7e5dd2dc3efeb059f6f84cd535dafcecfb053c2fc2f7645e150b9f880b52c019208ce7df36afa29988c7098b6c7b960bbc3