Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2023, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe
Resource
win10v2004-20230221-en
General
-
Target
baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe
-
Size
689KB
-
MD5
bcc8b0328c4e48cce575b4f0643a53d2
-
SHA1
dd4e71c9e20f85b62a3e43056882ab327472c342
-
SHA256
baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a
-
SHA512
1245aaa6476a2697e88a23c97cecbca4a09c8588c46646fbf1b5418061e318b9f77353cf28bfa7b30a4fd0ddec48fbf1bd43fab59ce0e52bd0540d5321f3bcbb
-
SSDEEP
12288:eMruy90qwHJuMLw4cTfelJBfFmlS+4SQsY7VTIRNiMQJ11/+r:EyD8NHcEBfFigc/Di51Wr
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4944.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4944.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1008-192-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-190-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-197-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-199-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-201-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-203-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-205-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-207-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-209-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-211-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-213-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-215-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-217-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-219-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-221-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-223-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-225-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/1008-227-0x0000000007160000-0x000000000719F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5100 un839685.exe 2120 pro4944.exe 1008 qu5935.exe 540 si081788.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4944.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4944.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un839685.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un839685.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4828 2120 WerFault.exe 86 2724 1008 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2120 pro4944.exe 2120 pro4944.exe 1008 qu5935.exe 1008 qu5935.exe 540 si081788.exe 540 si081788.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2120 pro4944.exe Token: SeDebugPrivilege 1008 qu5935.exe Token: SeDebugPrivilege 540 si081788.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1564 wrote to memory of 5100 1564 baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe 85 PID 1564 wrote to memory of 5100 1564 baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe 85 PID 1564 wrote to memory of 5100 1564 baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe 85 PID 5100 wrote to memory of 2120 5100 un839685.exe 86 PID 5100 wrote to memory of 2120 5100 un839685.exe 86 PID 5100 wrote to memory of 2120 5100 un839685.exe 86 PID 5100 wrote to memory of 1008 5100 un839685.exe 92 PID 5100 wrote to memory of 1008 5100 un839685.exe 92 PID 5100 wrote to memory of 1008 5100 un839685.exe 92 PID 1564 wrote to memory of 540 1564 baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe 96 PID 1564 wrote to memory of 540 1564 baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe 96 PID 1564 wrote to memory of 540 1564 baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe"C:\Users\Admin\AppData\Local\Temp\baeafb9ab9eb7818f1bffcdb751560a740cd00c06db724d119dac8093d50477a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un839685.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un839685.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4944.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4944.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 10844⤵
- Program crash
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5935.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5935.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 15124⤵
- Program crash
PID:2724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si081788.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si081788.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2120 -ip 21201⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1008 -ip 10081⤵PID:2148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52b57eb3935b2d7e3aaabdacd2a5720d3
SHA1a06712fab5008c17520894d962e588e2470d3475
SHA256a94d2a7c2a1662cfaaea112915660747e1d2b02edad5dcb5db133e97a7c16966
SHA512def524d4ec450f075f1bc6e44b4977a09a8a1d3b4b8ca9ef18d5eee3f6ef85b837b49e50fafbb84212f94de1ae1a12808a2fd8b44b4bb6792ba3dd291432c7ad
-
Filesize
175KB
MD52b57eb3935b2d7e3aaabdacd2a5720d3
SHA1a06712fab5008c17520894d962e588e2470d3475
SHA256a94d2a7c2a1662cfaaea112915660747e1d2b02edad5dcb5db133e97a7c16966
SHA512def524d4ec450f075f1bc6e44b4977a09a8a1d3b4b8ca9ef18d5eee3f6ef85b837b49e50fafbb84212f94de1ae1a12808a2fd8b44b4bb6792ba3dd291432c7ad
-
Filesize
547KB
MD56b2c2a899dd812be101f353c4e90700d
SHA16419fd580ed9560a2cf4ac8c562c7dac5508a659
SHA256eca0c52383cc408e8b994f77196f7998a70392a1f535b9e2537f2ef6673246d6
SHA5122df748919d94f1c71f9824da5b982489f3b5e7bd1f60957391b48daa8ceeb77b787e981541ed640f386e791b5e93b3a743bf991ba363529e759c64d35fbd807d
-
Filesize
547KB
MD56b2c2a899dd812be101f353c4e90700d
SHA16419fd580ed9560a2cf4ac8c562c7dac5508a659
SHA256eca0c52383cc408e8b994f77196f7998a70392a1f535b9e2537f2ef6673246d6
SHA5122df748919d94f1c71f9824da5b982489f3b5e7bd1f60957391b48daa8ceeb77b787e981541ed640f386e791b5e93b3a743bf991ba363529e759c64d35fbd807d
-
Filesize
326KB
MD54efb26a1b9dce552c4b3e80113785893
SHA138a2c4a59be6210ae01a7f946cbad8f46d4cae95
SHA256ec69ac553c1cfe29535726b7bd0e22427d8667c9913e319c129af3bea197a2f8
SHA51203111e3e1799ba338627acdedbb56dea6b1a5c1609eaeb0e2ced61cebf131e9a7cf0195551064b3d5f04e6f41df8931406ae8b655756984a1a6adad1cdac157a
-
Filesize
326KB
MD54efb26a1b9dce552c4b3e80113785893
SHA138a2c4a59be6210ae01a7f946cbad8f46d4cae95
SHA256ec69ac553c1cfe29535726b7bd0e22427d8667c9913e319c129af3bea197a2f8
SHA51203111e3e1799ba338627acdedbb56dea6b1a5c1609eaeb0e2ced61cebf131e9a7cf0195551064b3d5f04e6f41df8931406ae8b655756984a1a6adad1cdac157a
-
Filesize
384KB
MD5c3123b6272329a10e02b9c08f64d3c9f
SHA153bc445e3b20483a5d9cf7e8902d41f7290701ef
SHA25601507a8311b22451924c011130545fa373acdf46982bdbb7aea4b3a3325d6456
SHA512832b4b62c1e713cdd8ae0af47d0cc050260105a3c10aff1fb3aeb20ca9de7c5dd010273b472ae9a9a3bce1355457e3024993dc39067e43ce563e3826f0e97fd7
-
Filesize
384KB
MD5c3123b6272329a10e02b9c08f64d3c9f
SHA153bc445e3b20483a5d9cf7e8902d41f7290701ef
SHA25601507a8311b22451924c011130545fa373acdf46982bdbb7aea4b3a3325d6456
SHA512832b4b62c1e713cdd8ae0af47d0cc050260105a3c10aff1fb3aeb20ca9de7c5dd010273b472ae9a9a3bce1355457e3024993dc39067e43ce563e3826f0e97fd7