Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe
Resource
win10v2004-20230220-en
General
-
Target
fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe
-
Size
689KB
-
MD5
7d98888b36108e17ae146e333cd22777
-
SHA1
917cd2e4926c3a59d193a3991beb925f5c806f65
-
SHA256
fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559
-
SHA512
2f4d19a883a79af57b47315167f4ca0321a748619907dc8a85cac32a27ba00559e5bd245f519a49051839c7851d263a408d0fe4efa08eef2b45e4f316ad0dcbc
-
SSDEEP
12288:FMr8y905hvkMkxIE4gph9V7Uusknnzpp5JA/dyMKT965666Pes701Lddq:VyEhvkMaRjFUusknVp5Jzl46P101rq
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5071.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5071.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4264-191-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-192-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-194-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-196-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-198-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-200-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-202-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-204-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-206-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-208-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-210-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-217-0x0000000007210000-0x0000000007220000-memory.dmp family_redline behavioral1/memory/4264-215-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-218-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-220-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-222-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-224-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-226-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4264-228-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2608 un572778.exe 1048 pro5071.exe 4264 qu9080.exe 836 si624984.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5071.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un572778.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un572778.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 440 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4524 1048 WerFault.exe 84 3716 4264 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1048 pro5071.exe 1048 pro5071.exe 4264 qu9080.exe 4264 qu9080.exe 836 si624984.exe 836 si624984.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1048 pro5071.exe Token: SeDebugPrivilege 4264 qu9080.exe Token: SeDebugPrivilege 836 si624984.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4976 wrote to memory of 2608 4976 fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe 83 PID 4976 wrote to memory of 2608 4976 fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe 83 PID 4976 wrote to memory of 2608 4976 fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe 83 PID 2608 wrote to memory of 1048 2608 un572778.exe 84 PID 2608 wrote to memory of 1048 2608 un572778.exe 84 PID 2608 wrote to memory of 1048 2608 un572778.exe 84 PID 2608 wrote to memory of 4264 2608 un572778.exe 91 PID 2608 wrote to memory of 4264 2608 un572778.exe 91 PID 2608 wrote to memory of 4264 2608 un572778.exe 91 PID 4976 wrote to memory of 836 4976 fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe 95 PID 4976 wrote to memory of 836 4976 fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe 95 PID 4976 wrote to memory of 836 4976 fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe"C:\Users\Admin\AppData\Local\Temp\fa1a949697fd45d9be0ea62067cec38b9a31d45501850b02ac9936f6e5565559.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un572778.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un572778.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5071.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5071.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 10804⤵
- Program crash
PID:4524
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9080.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9080.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 13084⤵
- Program crash
PID:3716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si624984.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si624984.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1048 -ip 10481⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4264 -ip 42641⤵PID:4536
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD517d09c18d868eb385ff28c360ac8c677
SHA1480ce3c0115ebd6cb12c2d744f87b093c8f3ebc5
SHA2565a2f4040629fb08a46561e5536e4f720d1ae02cb45b311602071d47913692c45
SHA5123d61276e6e6f276491e2a77c6386cc9d4b9a2f12465acb57f34280c43af3b9dfad9c69156720566fa9cb36e2f3abf8fdbe298cd745232aadaaad6d63c0568c0b
-
Filesize
175KB
MD517d09c18d868eb385ff28c360ac8c677
SHA1480ce3c0115ebd6cb12c2d744f87b093c8f3ebc5
SHA2565a2f4040629fb08a46561e5536e4f720d1ae02cb45b311602071d47913692c45
SHA5123d61276e6e6f276491e2a77c6386cc9d4b9a2f12465acb57f34280c43af3b9dfad9c69156720566fa9cb36e2f3abf8fdbe298cd745232aadaaad6d63c0568c0b
-
Filesize
547KB
MD545d2ffb6205a9f2d2ad9d3d03d019193
SHA1d3d031eba5cc1f171b7c96e0b51c94f4d13bd7f1
SHA25612361e2c0530fde432b8b807b0bf7f031281946bc36f7b5d0200b9ba14c63d33
SHA5121d1602ca1461c029c6da2966573f9b4cdcf216734c3a79fd70d89a938127bd3bc472e6f3d9d33744333001f449164e3895620ba7a2d49bd2c7d3ca5902bff0bc
-
Filesize
547KB
MD545d2ffb6205a9f2d2ad9d3d03d019193
SHA1d3d031eba5cc1f171b7c96e0b51c94f4d13bd7f1
SHA25612361e2c0530fde432b8b807b0bf7f031281946bc36f7b5d0200b9ba14c63d33
SHA5121d1602ca1461c029c6da2966573f9b4cdcf216734c3a79fd70d89a938127bd3bc472e6f3d9d33744333001f449164e3895620ba7a2d49bd2c7d3ca5902bff0bc
-
Filesize
326KB
MD5b0df25254ac2d21846299b89b5c6c7fb
SHA14a78921815f11ecb90206f21432165683933ff51
SHA256d08dbb7f2a7cd3abc42f4f154f8b2b3334882256b53373bf198efd4dd2805671
SHA512b1e1608b4e92f01300bda851763b319f4203cd7d00f4684fc97e8deeb28f498fd9b26200dc50b29e5255755ae008240e84422406a5cd305b2581b97fe8e2791b
-
Filesize
326KB
MD5b0df25254ac2d21846299b89b5c6c7fb
SHA14a78921815f11ecb90206f21432165683933ff51
SHA256d08dbb7f2a7cd3abc42f4f154f8b2b3334882256b53373bf198efd4dd2805671
SHA512b1e1608b4e92f01300bda851763b319f4203cd7d00f4684fc97e8deeb28f498fd9b26200dc50b29e5255755ae008240e84422406a5cd305b2581b97fe8e2791b
-
Filesize
384KB
MD5723585d815c3988f5ac6864bc3119eb3
SHA16f9689a2def453c0b65645497e204369671775dd
SHA25690373862f1a95bd04f17448b943735f7fb49534c6ea436055d3950889e0a8348
SHA5121dfe158115e441a4d0bcb92930b41fb234d16cd4878d5331bb0e7f1db28571ba563da261235a334cb9bba11affb42004d27213b244d3121b54288ac66d894222
-
Filesize
384KB
MD5723585d815c3988f5ac6864bc3119eb3
SHA16f9689a2def453c0b65645497e204369671775dd
SHA25690373862f1a95bd04f17448b943735f7fb49534c6ea436055d3950889e0a8348
SHA5121dfe158115e441a4d0bcb92930b41fb234d16cd4878d5331bb0e7f1db28571ba563da261235a334cb9bba11affb42004d27213b244d3121b54288ac66d894222