Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe
Resource
win10v2004-20230220-en
General
-
Target
a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe
-
Size
687KB
-
MD5
f18af65f78443f399beb4104bb75832f
-
SHA1
95e68a5c39badd4d51d55dda6b8ddfd3e16e2bb2
-
SHA256
a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c
-
SHA512
3437213bbf48234a42260ca690c2596b0ce6fd17e9186e201ab8030aef6d7d5f2a85e20890b257dafd29599432a4d5b941f7d13ec5462f9bb7f75b6dd20f59df
-
SSDEEP
12288:iMrdy90w1mu1TWAUTMa/KYeh1Dkt6diz4yMKm96XuSSU4Ezlo8:TyH/WAUTPehJkt6cv4u/SRIlo8
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7716.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7716.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1892-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-211-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-215-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-217-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-219-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-221-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-223-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-225-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline behavioral1/memory/1892-227-0x0000000004BD0000-0x0000000004C0F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4696 un038272.exe 1092 pro7716.exe 1892 qu8912.exe 1592 si603983.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7716.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7716.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un038272.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un038272.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4156 1092 WerFault.exe 86 728 1892 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1092 pro7716.exe 1092 pro7716.exe 1892 qu8912.exe 1892 qu8912.exe 1592 si603983.exe 1592 si603983.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1092 pro7716.exe Token: SeDebugPrivilege 1892 qu8912.exe Token: SeDebugPrivilege 1592 si603983.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4696 4456 a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe 85 PID 4456 wrote to memory of 4696 4456 a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe 85 PID 4456 wrote to memory of 4696 4456 a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe 85 PID 4696 wrote to memory of 1092 4696 un038272.exe 86 PID 4696 wrote to memory of 1092 4696 un038272.exe 86 PID 4696 wrote to memory of 1092 4696 un038272.exe 86 PID 4696 wrote to memory of 1892 4696 un038272.exe 92 PID 4696 wrote to memory of 1892 4696 un038272.exe 92 PID 4696 wrote to memory of 1892 4696 un038272.exe 92 PID 4456 wrote to memory of 1592 4456 a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe 96 PID 4456 wrote to memory of 1592 4456 a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe 96 PID 4456 wrote to memory of 1592 4456 a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe"C:\Users\Admin\AppData\Local\Temp\a0d6d29157cd4035b6af75df082b57c4bc20a6fa5dbb2ec4b4df81681eb0836c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038272.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038272.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7716.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7716.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 10804⤵
- Program crash
PID:4156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8912.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8912.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 13284⤵
- Program crash
PID:728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si603983.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si603983.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1092 -ip 10921⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1892 -ip 18921⤵PID:796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5ea9e85b6be4c4558e098dc4fe9363b31
SHA1be4837533520b8097c7a1a84b476ea93559c1ef4
SHA2561f644b797b9e58f4d536a5981a56e64c47e68468199f811fe7982850d3618b9f
SHA512361d3e36b764ab4f462318b0ab46ee923c49e593e54711c32e8f97ee3640d6ec177a4bf4a921ffdb2ccdfb2cf31b35985cf8b263003807e9580d6fe588a35703
-
Filesize
175KB
MD5ea9e85b6be4c4558e098dc4fe9363b31
SHA1be4837533520b8097c7a1a84b476ea93559c1ef4
SHA2561f644b797b9e58f4d536a5981a56e64c47e68468199f811fe7982850d3618b9f
SHA512361d3e36b764ab4f462318b0ab46ee923c49e593e54711c32e8f97ee3640d6ec177a4bf4a921ffdb2ccdfb2cf31b35985cf8b263003807e9580d6fe588a35703
-
Filesize
545KB
MD5c0e7b8a767d8e083a43c796a00410893
SHA1d16332738c398ce32300bb9a836fa599861dbac0
SHA256a05a4d1e8c0a679c5fabb5d664dab6eae183bb1fba339f9bec09571710e0ea39
SHA512705e849b6e3927b4252b7603d58a3830517cac0753a40406858cae29d498801ecfb86ab38162bac21c1c590a18a7ee4a210997d1b44d31adbedf4e7bf84d91fe
-
Filesize
545KB
MD5c0e7b8a767d8e083a43c796a00410893
SHA1d16332738c398ce32300bb9a836fa599861dbac0
SHA256a05a4d1e8c0a679c5fabb5d664dab6eae183bb1fba339f9bec09571710e0ea39
SHA512705e849b6e3927b4252b7603d58a3830517cac0753a40406858cae29d498801ecfb86ab38162bac21c1c590a18a7ee4a210997d1b44d31adbedf4e7bf84d91fe
-
Filesize
326KB
MD5dad6a92bb8d8dfd0dcc28642cf79e5ff
SHA135e11ea77ee83803431765d75dd81dd9d950459a
SHA2569047304db959b410a1516b1329808a62ce8eb36d4df77db8983d94d6e90a420a
SHA512539bdb635b7cd202d680b831ef35b5b70c0d64b4d66639421f164dab0cdb94ed7239b62c817fab86722ae736349c2535cdb7bfedb8e85ad808096b39abcd66a5
-
Filesize
326KB
MD5dad6a92bb8d8dfd0dcc28642cf79e5ff
SHA135e11ea77ee83803431765d75dd81dd9d950459a
SHA2569047304db959b410a1516b1329808a62ce8eb36d4df77db8983d94d6e90a420a
SHA512539bdb635b7cd202d680b831ef35b5b70c0d64b4d66639421f164dab0cdb94ed7239b62c817fab86722ae736349c2535cdb7bfedb8e85ad808096b39abcd66a5
-
Filesize
384KB
MD5318332f9a1cd01a3012f57550dbd0592
SHA17be78717948708b7ef31e5a8ad84e7319f20fb81
SHA256f17209eba3dd9f9a5e2826f37ea9d2e49592ac1725ed9664515565ffe6a3073e
SHA512a71a07aebd2adc2f629ab97343cc84ea88cf92bbe837788c246b05b2e31af3b383fb1519df2f2c393e6702df8363433595d66faf1dd0bc59125af4a3cf688ecf
-
Filesize
384KB
MD5318332f9a1cd01a3012f57550dbd0592
SHA17be78717948708b7ef31e5a8ad84e7319f20fb81
SHA256f17209eba3dd9f9a5e2826f37ea9d2e49592ac1725ed9664515565ffe6a3073e
SHA512a71a07aebd2adc2f629ab97343cc84ea88cf92bbe837788c246b05b2e31af3b383fb1519df2f2c393e6702df8363433595d66faf1dd0bc59125af4a3cf688ecf