Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe
Resource
win10v2004-20230221-en
General
-
Target
1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe
-
Size
686KB
-
MD5
e39b1e0907f1a44db33d32a4ec52d2d6
-
SHA1
dfee532dfde7f76eee9efd4682928b4fd73e4338
-
SHA256
1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e
-
SHA512
38191740950f83f5e6dbdc76e4d69d829ed960397777fedde108231e0316bf15e68dc9717f02bd417bc478162ad261cc42a22cb2f9fde25e20019dea76f5f5c7
-
SSDEEP
12288:5MrYy90faEL6JaIYdqWwZ2j+fTRFnz8mYJb/oMXYyMKP96fEv+6W+jKy:RyiFGJNYYWNiLwmY2MXPFqLy
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6901.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
resource yara_rule behavioral1/memory/3308-196-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-198-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-200-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-202-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-204-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-206-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-208-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-210-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-212-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-214-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-216-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-220-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-222-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-218-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-224-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-226-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/3308-228-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1520 un017484.exe 3200 pro6901.exe 3308 qu5412.exe 1700 si641403.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6901.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6901.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un017484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un017484.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1244 3200 WerFault.exe 86 2272 3308 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3200 pro6901.exe 3200 pro6901.exe 3308 qu5412.exe 3308 qu5412.exe 1700 si641403.exe 1700 si641403.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3200 pro6901.exe Token: SeDebugPrivilege 3308 qu5412.exe Token: SeDebugPrivilege 1700 si641403.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1052 wrote to memory of 1520 1052 1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe 85 PID 1052 wrote to memory of 1520 1052 1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe 85 PID 1052 wrote to memory of 1520 1052 1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe 85 PID 1520 wrote to memory of 3200 1520 un017484.exe 86 PID 1520 wrote to memory of 3200 1520 un017484.exe 86 PID 1520 wrote to memory of 3200 1520 un017484.exe 86 PID 1520 wrote to memory of 3308 1520 un017484.exe 95 PID 1520 wrote to memory of 3308 1520 un017484.exe 95 PID 1520 wrote to memory of 3308 1520 un017484.exe 95 PID 1052 wrote to memory of 1700 1052 1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe 100 PID 1052 wrote to memory of 1700 1052 1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe 100 PID 1052 wrote to memory of 1700 1052 1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe"C:\Users\Admin\AppData\Local\Temp\1f26b8b2fcdf3c5ca79260f286b205a0b1985c846006828764531ec755e1b23e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un017484.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un017484.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6901.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6901.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 10804⤵
- Program crash
PID:1244
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5412.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5412.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 13524⤵
- Program crash
PID:2272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si641403.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si641403.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3200 -ip 32001⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3308 -ip 33081⤵PID:1096
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5e7a46e620f85b00f082b7f5d73c94a19
SHA155f18102524170c11734c6174178a78a26c45d5f
SHA2562429a5d2e337c7460694afb27de9834c1c8b12d34a5e412e34aaaae103d5a886
SHA51201ec1b19159d8538cc61d09ec06dcb590fde3b3b2bbf6edb182d24c411e29ce37147032c93dba3aaa9c14a4404df252b7060917e8b6aac0b3c065e67b4eb88e2
-
Filesize
175KB
MD5e7a46e620f85b00f082b7f5d73c94a19
SHA155f18102524170c11734c6174178a78a26c45d5f
SHA2562429a5d2e337c7460694afb27de9834c1c8b12d34a5e412e34aaaae103d5a886
SHA51201ec1b19159d8538cc61d09ec06dcb590fde3b3b2bbf6edb182d24c411e29ce37147032c93dba3aaa9c14a4404df252b7060917e8b6aac0b3c065e67b4eb88e2
-
Filesize
544KB
MD5b62032c1e8de2c5f46015c319d950482
SHA1b9c99e8c5178bdd3076fe65a41b49e4de33aede4
SHA256cfaeef78017c3ba2b208bdc2429be215189dff9847d88c475fc41531c48224c2
SHA512ae4c0466038e08bbfe5a09a8b6efc6606da60cb0b000d4e6dad1d300c98f003d6c4246b6d49d8a25b82b8aaf3031800b5ac5b54d14dcd4561e3c469822e2db46
-
Filesize
544KB
MD5b62032c1e8de2c5f46015c319d950482
SHA1b9c99e8c5178bdd3076fe65a41b49e4de33aede4
SHA256cfaeef78017c3ba2b208bdc2429be215189dff9847d88c475fc41531c48224c2
SHA512ae4c0466038e08bbfe5a09a8b6efc6606da60cb0b000d4e6dad1d300c98f003d6c4246b6d49d8a25b82b8aaf3031800b5ac5b54d14dcd4561e3c469822e2db46
-
Filesize
326KB
MD572a6223dce019dc3a750fb776225dfdc
SHA10274a101df9e1eda216d68cfe0633ba7bb125ab2
SHA256960e9d1a8be7eb9ff144060557b357c9d4c180c9059c30afbc874b4514e2186c
SHA5127570ae6091840189447ee2c2c4ec6b18d54e60cd7fd547a7bdadd24424ea39a696d245eead2712bf5a3167095b2e928b95405ad9503a5f65ad5a761839a399e0
-
Filesize
326KB
MD572a6223dce019dc3a750fb776225dfdc
SHA10274a101df9e1eda216d68cfe0633ba7bb125ab2
SHA256960e9d1a8be7eb9ff144060557b357c9d4c180c9059c30afbc874b4514e2186c
SHA5127570ae6091840189447ee2c2c4ec6b18d54e60cd7fd547a7bdadd24424ea39a696d245eead2712bf5a3167095b2e928b95405ad9503a5f65ad5a761839a399e0
-
Filesize
384KB
MD5d627503ea7abbfd1a4f346177227b924
SHA1ae7140252b3c4c2e4dc6beb92b1d8793442f793f
SHA256c6ca744a35d6c94c6989e466bd6c2477ce4e0fceca2fdbb61e513d914c9fbb49
SHA512bcc759ecb99c25cd2934dc48b68dc11a76935299a8031bac40566c34e73bdb5d1c0596f0d817f16766fe0e14c361bad736c44b0bbbd7885056a89a486572f194
-
Filesize
384KB
MD5d627503ea7abbfd1a4f346177227b924
SHA1ae7140252b3c4c2e4dc6beb92b1d8793442f793f
SHA256c6ca744a35d6c94c6989e466bd6c2477ce4e0fceca2fdbb61e513d914c9fbb49
SHA512bcc759ecb99c25cd2934dc48b68dc11a76935299a8031bac40566c34e73bdb5d1c0596f0d817f16766fe0e14c361bad736c44b0bbbd7885056a89a486572f194