Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe
Resource
win10v2004-20230220-en
General
-
Target
ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe
-
Size
700KB
-
MD5
2f15f86c63100defdfcc67771b7086ce
-
SHA1
3d982b5478c9ceffdb2635d0723aca5aa985bcea
-
SHA256
ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2
-
SHA512
16f4aca15a3f5c22af5e0f23e39b877089ee0040001aeb0775dd2f1e0a0780d018ecb08ca43a8b78bbf39f7f623e1fac48f4f124612c799bb21820f9c5bb19af
-
SSDEEP
12288:0Mr/y90SxVu899HbB0/L9DMjcA3yyBj8F3BDXV7Gg8icIAhe5CVrnXqnPpQP+k:TyvxYMVaY3yyBj8V2guIKEaV
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8245.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3824-190-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-191-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-193-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-195-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-197-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-207-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-203-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-199-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-209-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-211-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-213-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-215-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-217-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-219-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-221-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-223-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-225-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline behavioral1/memory/3824-227-0x0000000005290000-0x00000000052CF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3296 un889893.exe 992 pro8245.exe 3824 qu1514.exe 4068 si538695.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8245.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un889893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un889893.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3912 992 WerFault.exe 84 4192 3824 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 992 pro8245.exe 992 pro8245.exe 3824 qu1514.exe 3824 qu1514.exe 4068 si538695.exe 4068 si538695.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 992 pro8245.exe Token: SeDebugPrivilege 3824 qu1514.exe Token: SeDebugPrivilege 4068 si538695.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4528 wrote to memory of 3296 4528 ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe 83 PID 4528 wrote to memory of 3296 4528 ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe 83 PID 4528 wrote to memory of 3296 4528 ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe 83 PID 3296 wrote to memory of 992 3296 un889893.exe 84 PID 3296 wrote to memory of 992 3296 un889893.exe 84 PID 3296 wrote to memory of 992 3296 un889893.exe 84 PID 3296 wrote to memory of 3824 3296 un889893.exe 90 PID 3296 wrote to memory of 3824 3296 un889893.exe 90 PID 3296 wrote to memory of 3824 3296 un889893.exe 90 PID 4528 wrote to memory of 4068 4528 ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe 94 PID 4528 wrote to memory of 4068 4528 ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe 94 PID 4528 wrote to memory of 4068 4528 ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe"C:\Users\Admin\AppData\Local\Temp\ba96367b63d7634bd64a53c0a659da0af5b0b001b5eb2508d4e42b3e8b19d2b2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un889893.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un889893.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8245.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8245.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 10444⤵
- Program crash
PID:3912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1514.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1514.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 13284⤵
- Program crash
PID:4192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538695.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538695.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 992 -ip 9921⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3824 -ip 38241⤵PID:816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f828658358673b1b17a02e5639814a22
SHA131f1f17c0b240cbcce8f3900bf61782938292bdc
SHA256c8895fc57cb88891b4348ab4c238e03aba65d8f98e1bbf8cf1d8788db40d87d5
SHA512e38b7224ae54688b0ba3ef0beb221f62362aa7342d5424414c136fe11d60abdd7f8f5d3f7540757e735a062d68b5d31b112d5642d53fcc60f70d962f24c68665
-
Filesize
175KB
MD5f828658358673b1b17a02e5639814a22
SHA131f1f17c0b240cbcce8f3900bf61782938292bdc
SHA256c8895fc57cb88891b4348ab4c238e03aba65d8f98e1bbf8cf1d8788db40d87d5
SHA512e38b7224ae54688b0ba3ef0beb221f62362aa7342d5424414c136fe11d60abdd7f8f5d3f7540757e735a062d68b5d31b112d5642d53fcc60f70d962f24c68665
-
Filesize
558KB
MD550e37e73b6ec71e51e7d18869a1bbea7
SHA145b0749c26b34e29a35b3e7ddcf773320a01b3bb
SHA256b73583d5c2dd36e253164c445b22fd3375b0d857dace1c0c6fe9756e7207efb0
SHA512bdf01bbc3a9c58a0e95928d5d0b6319d2f7a259882683101cc9551989285b64f3b92f7174566efe9b50dc9a07ca0acb6bbd7582142ac656faa38e987d2c73723
-
Filesize
558KB
MD550e37e73b6ec71e51e7d18869a1bbea7
SHA145b0749c26b34e29a35b3e7ddcf773320a01b3bb
SHA256b73583d5c2dd36e253164c445b22fd3375b0d857dace1c0c6fe9756e7207efb0
SHA512bdf01bbc3a9c58a0e95928d5d0b6319d2f7a259882683101cc9551989285b64f3b92f7174566efe9b50dc9a07ca0acb6bbd7582142ac656faa38e987d2c73723
-
Filesize
307KB
MD5675ac5bca3b36557109fadab48c21754
SHA1a7b049229db0a6db4cf617ea39ac4110019a8be0
SHA25648f28188f7d3e52f0c9d6bcf9c528a4ac3443833d996e2b139329a2e0ee589b0
SHA51243bf90074da53ef61baca31ddbfd94d1ebbd52c540b07ff6374d8ab527188c07dde9a37abd58eb293171718f257de60b0c2b04137d6a1136643057e377e5e727
-
Filesize
307KB
MD5675ac5bca3b36557109fadab48c21754
SHA1a7b049229db0a6db4cf617ea39ac4110019a8be0
SHA25648f28188f7d3e52f0c9d6bcf9c528a4ac3443833d996e2b139329a2e0ee589b0
SHA51243bf90074da53ef61baca31ddbfd94d1ebbd52c540b07ff6374d8ab527188c07dde9a37abd58eb293171718f257de60b0c2b04137d6a1136643057e377e5e727
-
Filesize
365KB
MD5d8f3f9055846a3b22df80ab7eb7d4c05
SHA1b9a0213988e5dac0669fa0f33ec894543f06b63e
SHA25668a9d7629028cc4c8ce7ec227f6f9b039ff60c0519c4a63862d8b76d7ba5c7cc
SHA512ff6fee222ab31f3f9829e00aadb93eb92f40eb12c5667596bbf34b97def4197e7a4449d3ea66bedc88387f3e89b55fc2b242de01359ac04b921edce09b72de05
-
Filesize
365KB
MD5d8f3f9055846a3b22df80ab7eb7d4c05
SHA1b9a0213988e5dac0669fa0f33ec894543f06b63e
SHA25668a9d7629028cc4c8ce7ec227f6f9b039ff60c0519c4a63862d8b76d7ba5c7cc
SHA512ff6fee222ab31f3f9829e00aadb93eb92f40eb12c5667596bbf34b97def4197e7a4449d3ea66bedc88387f3e89b55fc2b242de01359ac04b921edce09b72de05