Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe
Resource
win10v2004-20230220-en
General
-
Target
760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe
-
Size
686KB
-
MD5
a0bad2506dc746c54ce680966e86e711
-
SHA1
2c86f266dfa2e6c466559b1aab4c7171845a9acf
-
SHA256
760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3
-
SHA512
c4a810a3dd39b79f94fd46c32b9b5e4036603f2336d98afe88ad789ac134beceada5c9764719f13c2247445e44ebce520f0bbbe788e11d6a8f93bdf587f67eb1
-
SSDEEP
12288:+Mryy90CANMWK38iaH7N2Y5FnzV3ZRRyRyMKB96eEvR7JiIPBLT:IysNMWxiWN2AFZ3ZRRy8PoPV
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9470.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9470.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9470.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9470.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9470.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9470.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1800-195-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-194-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-198-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-200-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-202-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-204-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-206-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-208-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-210-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-212-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-214-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-216-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-218-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-220-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-222-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-224-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-226-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/1800-228-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 548 un573001.exe 2120 pro9470.exe 1800 qu4697.exe 3232 si566998.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9470.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9470.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un573001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un573001.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2572 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4896 2120 WerFault.exe 84 2888 1800 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2120 pro9470.exe 2120 pro9470.exe 1800 qu4697.exe 1800 qu4697.exe 3232 si566998.exe 3232 si566998.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2120 pro9470.exe Token: SeDebugPrivilege 1800 qu4697.exe Token: SeDebugPrivilege 3232 si566998.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1176 wrote to memory of 548 1176 760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe 83 PID 1176 wrote to memory of 548 1176 760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe 83 PID 1176 wrote to memory of 548 1176 760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe 83 PID 548 wrote to memory of 2120 548 un573001.exe 84 PID 548 wrote to memory of 2120 548 un573001.exe 84 PID 548 wrote to memory of 2120 548 un573001.exe 84 PID 548 wrote to memory of 1800 548 un573001.exe 90 PID 548 wrote to memory of 1800 548 un573001.exe 90 PID 548 wrote to memory of 1800 548 un573001.exe 90 PID 1176 wrote to memory of 3232 1176 760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe 94 PID 1176 wrote to memory of 3232 1176 760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe 94 PID 1176 wrote to memory of 3232 1176 760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe"C:\Users\Admin\AppData\Local\Temp\760837296adb493bd050f1091d472bac8df5806ffdd29abf9b46b3633b974ea3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un573001.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un573001.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9470.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9470.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 11004⤵
- Program crash
PID:4896
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4697.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4697.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 13644⤵
- Program crash
PID:2888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si566998.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si566998.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2120 -ip 21201⤵PID:980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1800 -ip 18001⤵PID:1444
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b90a5202052ee7652317994e63bf82a3
SHA193e8d0da23476cf7fd5dbd055b59bd123ddd08a1
SHA2565b537f258ff05d64820b0aff9cacd50e4a4fa8dc53139f5ccdf68f8070924acf
SHA512055ac00ca697375e451c7f70477c496ab7b01a85649d663db6c881669e8ec571eb68363dc25e6b5154e8c3179fd396d121d011d23d72e509ef89904806ee22f9
-
Filesize
175KB
MD5b90a5202052ee7652317994e63bf82a3
SHA193e8d0da23476cf7fd5dbd055b59bd123ddd08a1
SHA2565b537f258ff05d64820b0aff9cacd50e4a4fa8dc53139f5ccdf68f8070924acf
SHA512055ac00ca697375e451c7f70477c496ab7b01a85649d663db6c881669e8ec571eb68363dc25e6b5154e8c3179fd396d121d011d23d72e509ef89904806ee22f9
-
Filesize
544KB
MD5f6fbf007d6c0d165f23eceb732c4b898
SHA1fd098adca5b22346d8edcd209662c1496374d8b5
SHA256588cddeada977c5219979b9a71d4851d85ff23636406493744c95770c46be2b7
SHA5127c9eec4ed5443d311b00d5d2b3017229dba877eecf6748c7352e9ce50d62898d63702b79cb9ba289578d12c56f779e185779a2dc9e9f7de5644d637e6650c1f9
-
Filesize
544KB
MD5f6fbf007d6c0d165f23eceb732c4b898
SHA1fd098adca5b22346d8edcd209662c1496374d8b5
SHA256588cddeada977c5219979b9a71d4851d85ff23636406493744c95770c46be2b7
SHA5127c9eec4ed5443d311b00d5d2b3017229dba877eecf6748c7352e9ce50d62898d63702b79cb9ba289578d12c56f779e185779a2dc9e9f7de5644d637e6650c1f9
-
Filesize
326KB
MD50659461097b0dad26a0807c167158fcf
SHA1e5af2602cf7ba73863822eaa76895c904f9df41a
SHA2563e6faa84d6c8faa09465f4619e7ac94e2598097356746fea4d223e15add6c797
SHA512e598bf01a07feb2c58a618f6036cd74da18a225e410fba9d09f6e28492ee61669b6e69114cc68b2b57dd223d812d701ca299dea5816ebdc1e177d2c3df282306
-
Filesize
326KB
MD50659461097b0dad26a0807c167158fcf
SHA1e5af2602cf7ba73863822eaa76895c904f9df41a
SHA2563e6faa84d6c8faa09465f4619e7ac94e2598097356746fea4d223e15add6c797
SHA512e598bf01a07feb2c58a618f6036cd74da18a225e410fba9d09f6e28492ee61669b6e69114cc68b2b57dd223d812d701ca299dea5816ebdc1e177d2c3df282306
-
Filesize
384KB
MD5b086995a16148d013018d2653a5b53e3
SHA1cd75df7c4c119878198786d7c168823e6717f251
SHA256bcc7a7324f7295c7b1349fba0140c4fbddb6cf523c2f3bb31185d07d874f6c44
SHA5124f787227178a0799f8d059b6cba301c326c2815ff6054efba1aa646e303104ff0bbd6b2969faf57c2791d780bed2d2fcd67e97c23e3b915e40c6d8133a42534e
-
Filesize
384KB
MD5b086995a16148d013018d2653a5b53e3
SHA1cd75df7c4c119878198786d7c168823e6717f251
SHA256bcc7a7324f7295c7b1349fba0140c4fbddb6cf523c2f3bb31185d07d874f6c44
SHA5124f787227178a0799f8d059b6cba301c326c2815ff6054efba1aa646e303104ff0bbd6b2969faf57c2791d780bed2d2fcd67e97c23e3b915e40c6d8133a42534e