Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe
Resource
win10v2004-20230220-en
General
-
Target
1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe
-
Size
686KB
-
MD5
c79a1916e942898d0dda31ba90adee8f
-
SHA1
5ee78efec311599cd7ee34e6d5947814a3febda7
-
SHA256
1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18
-
SHA512
d5eea834842e81ea9fa20f64c81c5397adf662a3954def5629421b285150c3695feb2fd1f71ffb057a07148357ed6d118e5c56b5774787711b8669d2595353be
-
SSDEEP
12288:LMrsy90I+SF50QFbJLc51xzlma17VTIkfiGk9Sofwi7:nyASEsbJmwaIUiGk9S+w8
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1619.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1619.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3316-195-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-196-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-198-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-200-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-202-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-204-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-206-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-208-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-210-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-212-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-214-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-216-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-220-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-218-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-222-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-224-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-226-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/3316-228-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3360 un136228.exe 5060 pro1619.exe 3316 qu1616.exe 4452 si612709.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1619.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un136228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un136228.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3388 5060 WerFault.exe 81 4652 3316 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5060 pro1619.exe 5060 pro1619.exe 3316 qu1616.exe 3316 qu1616.exe 4452 si612709.exe 4452 si612709.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5060 pro1619.exe Token: SeDebugPrivilege 3316 qu1616.exe Token: SeDebugPrivilege 4452 si612709.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2692 wrote to memory of 3360 2692 1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe 80 PID 2692 wrote to memory of 3360 2692 1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe 80 PID 2692 wrote to memory of 3360 2692 1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe 80 PID 3360 wrote to memory of 5060 3360 un136228.exe 81 PID 3360 wrote to memory of 5060 3360 un136228.exe 81 PID 3360 wrote to memory of 5060 3360 un136228.exe 81 PID 3360 wrote to memory of 3316 3360 un136228.exe 87 PID 3360 wrote to memory of 3316 3360 un136228.exe 87 PID 3360 wrote to memory of 3316 3360 un136228.exe 87 PID 2692 wrote to memory of 4452 2692 1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe 90 PID 2692 wrote to memory of 4452 2692 1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe 90 PID 2692 wrote to memory of 4452 2692 1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe"C:\Users\Admin\AppData\Local\Temp\1f3e1fdc5a56ad313e4f5ee7300ed956666de96d9f45404c9d3aa27c4bb31b18.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136228.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136228.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1619.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1619.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 10844⤵
- Program crash
PID:3388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1616.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1616.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 16324⤵
- Program crash
PID:4652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612709.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si612709.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5060 -ip 50601⤵PID:2320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3316 -ip 33161⤵PID:1424
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD521a40192bd6ec337fb31d6686a7b4304
SHA160ff3327a3ab63cefb1a22d2ab1ae19cf60af89f
SHA256814da5574066b721e1a31de53f8d9c3b85265285da7f9f5280482b0aab9be54c
SHA512c692162e5665c03f449bf762e1c4bd49cbc5fa856460920dadc30e08b7b849032afd8f6755ad5b3469535e93ebf658e1a85c40e0e2c8dcb4821009a38bf44263
-
Filesize
175KB
MD521a40192bd6ec337fb31d6686a7b4304
SHA160ff3327a3ab63cefb1a22d2ab1ae19cf60af89f
SHA256814da5574066b721e1a31de53f8d9c3b85265285da7f9f5280482b0aab9be54c
SHA512c692162e5665c03f449bf762e1c4bd49cbc5fa856460920dadc30e08b7b849032afd8f6755ad5b3469535e93ebf658e1a85c40e0e2c8dcb4821009a38bf44263
-
Filesize
544KB
MD5323ec0601e501486032d15145d5a9baa
SHA12a8744bd002ce28c9b44b5e1f0e6b6c799002b02
SHA256f83773d5eb873b055b0168ef0f00bddb540762e1a3e4c420f5e4dc09e2a46356
SHA51218b840beb0d3fbca192f1279187a695a5f9e9f546e27f3752f6fd2bac73886c35d4bc62ae5d25ce30136ada94cecb94075f8f9277bc4e2a03cc89af910edc1bb
-
Filesize
544KB
MD5323ec0601e501486032d15145d5a9baa
SHA12a8744bd002ce28c9b44b5e1f0e6b6c799002b02
SHA256f83773d5eb873b055b0168ef0f00bddb540762e1a3e4c420f5e4dc09e2a46356
SHA51218b840beb0d3fbca192f1279187a695a5f9e9f546e27f3752f6fd2bac73886c35d4bc62ae5d25ce30136ada94cecb94075f8f9277bc4e2a03cc89af910edc1bb
-
Filesize
326KB
MD5c8f734dcbbd646ff228ee85cb7818ae8
SHA139c5844f5454f2e75e1839c9c58a876b1fcba74a
SHA256df75e4d07d79c806647c491312bb97668ae7be990c74761fef015c5195fa6d44
SHA5121e88dfd741286a4e102f3f6deaf29bbe9792242aceb521b0eb2ecd77ed49219755f8e3f58b56739b69a04c95e9816c0c5dcad7afdbaa3e8085fa612694072dc1
-
Filesize
326KB
MD5c8f734dcbbd646ff228ee85cb7818ae8
SHA139c5844f5454f2e75e1839c9c58a876b1fcba74a
SHA256df75e4d07d79c806647c491312bb97668ae7be990c74761fef015c5195fa6d44
SHA5121e88dfd741286a4e102f3f6deaf29bbe9792242aceb521b0eb2ecd77ed49219755f8e3f58b56739b69a04c95e9816c0c5dcad7afdbaa3e8085fa612694072dc1
-
Filesize
384KB
MD56c9105b5bf070c9e6f2bbd553b4409dc
SHA17e3c59e906d1aa6f8e24c50d4d8c0c3e9b3a8878
SHA25610d5e4fc8d615e7883d15ba4777931e797696bad1736e5cf32a99180f7715d90
SHA51220dcd9603ced1dd1e42f1bf8c0a1dbed13f9070d255831395b0db7495caf6524c18911c9bc5bd3ea9a5441c774dda70e3a79a2362e9d0ddd22569aa15def1bdc
-
Filesize
384KB
MD56c9105b5bf070c9e6f2bbd553b4409dc
SHA17e3c59e906d1aa6f8e24c50d4d8c0c3e9b3a8878
SHA25610d5e4fc8d615e7883d15ba4777931e797696bad1736e5cf32a99180f7715d90
SHA51220dcd9603ced1dd1e42f1bf8c0a1dbed13f9070d255831395b0db7495caf6524c18911c9bc5bd3ea9a5441c774dda70e3a79a2362e9d0ddd22569aa15def1bdc