Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe
Resource
win10v2004-20230220-en
General
-
Target
c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe
-
Size
686KB
-
MD5
97f8b495ae2e95e52edf356efec6367f
-
SHA1
5b0c982fe553ff0f83b2e89003211f28f7afaab7
-
SHA256
c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997
-
SHA512
6fef3028ed49ee10d3897b2b34ad1f505ba35643880d9a146d1a9c54be8de24c3aa0ef4a4aa8a96b805e691d7108cab24c9de19ee00dc5d73b00875b015d08bb
-
SSDEEP
12288:tMrTy902XgxiXxczYKiO0Qk2riJL3rYrW7VTImciX/92pt5w:yyf1xccDNMril3rYBNiX/92pLw
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0238.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0238.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3132-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-211-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-213-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-215-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-217-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-219-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-221-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-223-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/3132-225-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4272 un653553.exe 1032 pro0238.exe 3132 qu7735.exe 3284 si075207.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0238.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un653553.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un653553.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 100 1032 WerFault.exe 84 3980 3132 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1032 pro0238.exe 1032 pro0238.exe 3132 qu7735.exe 3132 qu7735.exe 3284 si075207.exe 3284 si075207.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1032 pro0238.exe Token: SeDebugPrivilege 3132 qu7735.exe Token: SeDebugPrivilege 3284 si075207.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3524 wrote to memory of 4272 3524 c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe 83 PID 3524 wrote to memory of 4272 3524 c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe 83 PID 3524 wrote to memory of 4272 3524 c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe 83 PID 4272 wrote to memory of 1032 4272 un653553.exe 84 PID 4272 wrote to memory of 1032 4272 un653553.exe 84 PID 4272 wrote to memory of 1032 4272 un653553.exe 84 PID 4272 wrote to memory of 3132 4272 un653553.exe 87 PID 4272 wrote to memory of 3132 4272 un653553.exe 87 PID 4272 wrote to memory of 3132 4272 un653553.exe 87 PID 3524 wrote to memory of 3284 3524 c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe 91 PID 3524 wrote to memory of 3284 3524 c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe 91 PID 3524 wrote to memory of 3284 3524 c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe"C:\Users\Admin\AppData\Local\Temp\c4bf068f9f3b5e48f06f053b261f68671302e22a98924da9183a08014d16e997.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un653553.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un653553.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0238.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0238.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 10804⤵
- Program crash
PID:100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7735.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7735.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 13324⤵
- Program crash
PID:3980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si075207.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si075207.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 1032 -ip 10321⤵PID:904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3132 -ip 31321⤵PID:2524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bc7d84816b61f1bbc216ce455d6d8e78
SHA1c8f239d56eb6ea845d33f5fa8affb0c00b33d4b1
SHA256ec1159245cc9f7a3f35bbe8e57f7778329ec85c2b77b15c62c9fe544a7dc3fd0
SHA5121ed7ce6c3d36697265106702f476c9fce9419b3451bed1cf74240742a5125d50bc7c315db6862737ef9d9555160cda2526c00f88923867474acb78782606039f
-
Filesize
175KB
MD5bc7d84816b61f1bbc216ce455d6d8e78
SHA1c8f239d56eb6ea845d33f5fa8affb0c00b33d4b1
SHA256ec1159245cc9f7a3f35bbe8e57f7778329ec85c2b77b15c62c9fe544a7dc3fd0
SHA5121ed7ce6c3d36697265106702f476c9fce9419b3451bed1cf74240742a5125d50bc7c315db6862737ef9d9555160cda2526c00f88923867474acb78782606039f
-
Filesize
544KB
MD5893e4f5078e37b256ab2d20867dbaca6
SHA1c53f4db624337fe342ba42740e7441c571ab5107
SHA256b2b73f66c3dd82c27f0b628e679899b13db19b582f4894a5a6e592670496ee57
SHA5122a15608b8d688133518fea550aa30bb509c45af2ba91491c5943b4150a4a2953a0b369aad31b51fcdffd7debd27f9a11983d05608341eb341d38b983d12c6a7e
-
Filesize
544KB
MD5893e4f5078e37b256ab2d20867dbaca6
SHA1c53f4db624337fe342ba42740e7441c571ab5107
SHA256b2b73f66c3dd82c27f0b628e679899b13db19b582f4894a5a6e592670496ee57
SHA5122a15608b8d688133518fea550aa30bb509c45af2ba91491c5943b4150a4a2953a0b369aad31b51fcdffd7debd27f9a11983d05608341eb341d38b983d12c6a7e
-
Filesize
326KB
MD5557f7ffbed24d0ea9f17bb882efe5b01
SHA191af976eac59636032c13e66b893c64302df4c6a
SHA256fa56e3696905e27ea2d5f3660bb8d3710f3d08dca6d02e0fa11001d56d407626
SHA5125c8665c281a4d3c5eba9e5fb0bc6b2659a472999d357eaad62774d529b06a8c616221913ea72a9874b2787d9af053bbbc972690823e81ec44bda503ef8509acd
-
Filesize
326KB
MD5557f7ffbed24d0ea9f17bb882efe5b01
SHA191af976eac59636032c13e66b893c64302df4c6a
SHA256fa56e3696905e27ea2d5f3660bb8d3710f3d08dca6d02e0fa11001d56d407626
SHA5125c8665c281a4d3c5eba9e5fb0bc6b2659a472999d357eaad62774d529b06a8c616221913ea72a9874b2787d9af053bbbc972690823e81ec44bda503ef8509acd
-
Filesize
384KB
MD5ef8aa1ba83602a4ecfb5f420808a86b2
SHA1d4e2de25fc141f7a0e0fafd014f4357a494d186f
SHA256cb12a790ca4f780246028e33a675594dc182c6ac2ea640ab4e62358597e980de
SHA5120ace1986e661f41dbdbe18e8cdeac92a4949baf953f14850bb301233446c0ea49ec3a71e1ddb6f94f50e534896dcb65bdd63087152f7bdf74f9a6c2109ea5887
-
Filesize
384KB
MD5ef8aa1ba83602a4ecfb5f420808a86b2
SHA1d4e2de25fc141f7a0e0fafd014f4357a494d186f
SHA256cb12a790ca4f780246028e33a675594dc182c6ac2ea640ab4e62358597e980de
SHA5120ace1986e661f41dbdbe18e8cdeac92a4949baf953f14850bb301233446c0ea49ec3a71e1ddb6f94f50e534896dcb65bdd63087152f7bdf74f9a6c2109ea5887