Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe
Resource
win10v2004-20230221-en
General
-
Target
dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe
-
Size
699KB
-
MD5
35e770f4009c1ae601474088fd8628b3
-
SHA1
ee18e66c234001327ac4cfda8bbfcf1aeb076123
-
SHA256
dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de
-
SHA512
8eecd8d86f9d10378c1aa4651ab5ea00f5b29c41f20a01607b5ecd4282df63a1401614cb938e6e98d94cbe91ee645a717cea1ac091b375d39d618c3342509934
-
SSDEEP
12288:GMrxy90yww0ZiwZjpoBLFBSqgNULCN39j7qFQgM4Dh+xeRlO:HyU7ohNGNHqFQgM4Dh+slO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1444.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1232-191-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-192-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-194-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-196-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-198-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-200-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-202-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-204-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-206-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-208-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-210-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-212-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-214-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-216-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-218-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-220-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-222-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/1232-224-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1636 un114202.exe 4724 pro1444.exe 1232 qu0442.exe 4116 si280982.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1444.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1444.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un114202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un114202.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1856 4724 WerFault.exe 85 1912 1232 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4724 pro1444.exe 4724 pro1444.exe 1232 qu0442.exe 1232 qu0442.exe 4116 si280982.exe 4116 si280982.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4724 pro1444.exe Token: SeDebugPrivilege 1232 qu0442.exe Token: SeDebugPrivilege 4116 si280982.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1636 1516 dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe 84 PID 1516 wrote to memory of 1636 1516 dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe 84 PID 1516 wrote to memory of 1636 1516 dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe 84 PID 1636 wrote to memory of 4724 1636 un114202.exe 85 PID 1636 wrote to memory of 4724 1636 un114202.exe 85 PID 1636 wrote to memory of 4724 1636 un114202.exe 85 PID 1636 wrote to memory of 1232 1636 un114202.exe 91 PID 1636 wrote to memory of 1232 1636 un114202.exe 91 PID 1636 wrote to memory of 1232 1636 un114202.exe 91 PID 1516 wrote to memory of 4116 1516 dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe 95 PID 1516 wrote to memory of 4116 1516 dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe 95 PID 1516 wrote to memory of 4116 1516 dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe"C:\Users\Admin\AppData\Local\Temp\dd21a449dba55f037fffc6f6e94edf7589501bb60437bc60c23b83048d95a6de.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114202.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114202.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1444.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1444.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 10764⤵
- Program crash
PID:1856
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0442.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0442.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 13484⤵
- Program crash
PID:1912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280982.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280982.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4724 -ip 47241⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1232 -ip 12321⤵PID:660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD501d1c2fc57c33fdef8cd9b9d39ca5b18
SHA12429ef09a8188a2c12b6912d821553e53344ac6f
SHA25603d57ad6383d4e1ab48799987c2518b6fde7706407b6f8496b942050a8eda646
SHA512d2a51cdd155fba0958268e52d095c988e7170ac7f9bbb0869b1f8d7a376f82f372a691ff0d66a03ad60cb2e04f58af92b02b0ecda54e9cb1f2e51f988b78966b
-
Filesize
175KB
MD501d1c2fc57c33fdef8cd9b9d39ca5b18
SHA12429ef09a8188a2c12b6912d821553e53344ac6f
SHA25603d57ad6383d4e1ab48799987c2518b6fde7706407b6f8496b942050a8eda646
SHA512d2a51cdd155fba0958268e52d095c988e7170ac7f9bbb0869b1f8d7a376f82f372a691ff0d66a03ad60cb2e04f58af92b02b0ecda54e9cb1f2e51f988b78966b
-
Filesize
557KB
MD5ee2dcbdd922f93b8f81c0316070acfea
SHA162e7b7bc19d835b60f6035ac176d8f7c9dd5e440
SHA256574ac5861ef3db7bccb1e46f4daff92176f602a8419839b501bdb382a697923e
SHA512975e74bb5d711e88d5d73e93c80fb678a2586fedde11bac9ecf0475edc1c3f3e6c8c0257bd903365f1d76d6a0ac67ce9853d4fcebd209ddeea77fdfefd5ae9e0
-
Filesize
557KB
MD5ee2dcbdd922f93b8f81c0316070acfea
SHA162e7b7bc19d835b60f6035ac176d8f7c9dd5e440
SHA256574ac5861ef3db7bccb1e46f4daff92176f602a8419839b501bdb382a697923e
SHA512975e74bb5d711e88d5d73e93c80fb678a2586fedde11bac9ecf0475edc1c3f3e6c8c0257bd903365f1d76d6a0ac67ce9853d4fcebd209ddeea77fdfefd5ae9e0
-
Filesize
307KB
MD5505b1e60079e250c220e1f26b375799c
SHA1e222c436d5df59e88ae530f2cfac140304dace34
SHA25652d2fba146cbcecc41a0a0f12b3807b5b45739a9d3e3cc8dd255f6495f7d86e7
SHA5122c33e68203529d4965e4fdabe50df73354f993adf17e9e7d39057f0da443ad0ea1d1c7e0798632be98b328f30e8b8f0c8edc4ff3087429423091a386ceca2649
-
Filesize
307KB
MD5505b1e60079e250c220e1f26b375799c
SHA1e222c436d5df59e88ae530f2cfac140304dace34
SHA25652d2fba146cbcecc41a0a0f12b3807b5b45739a9d3e3cc8dd255f6495f7d86e7
SHA5122c33e68203529d4965e4fdabe50df73354f993adf17e9e7d39057f0da443ad0ea1d1c7e0798632be98b328f30e8b8f0c8edc4ff3087429423091a386ceca2649
-
Filesize
365KB
MD556ad4dac9d28322dbf841999cd8a318d
SHA1e29b94acd99558cff5eff66ab9a6bdecbfa5da79
SHA2564ed10e756d0839650abed7f208cd0fa09c436801443b5aaa2346c17ec18ea492
SHA512a17d57504664dd1be3a760e684b960966313901b75df80f95680866f09c6e57e672e7cbd9522ca672e13716019a7c9eed9a473bb0282919c913a34998dbfcd2e
-
Filesize
365KB
MD556ad4dac9d28322dbf841999cd8a318d
SHA1e29b94acd99558cff5eff66ab9a6bdecbfa5da79
SHA2564ed10e756d0839650abed7f208cd0fa09c436801443b5aaa2346c17ec18ea492
SHA512a17d57504664dd1be3a760e684b960966313901b75df80f95680866f09c6e57e672e7cbd9522ca672e13716019a7c9eed9a473bb0282919c913a34998dbfcd2e