Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe
Resource
win10v2004-20230220-en
General
-
Target
20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe
-
Size
701KB
-
MD5
ee26e9be692ae2d72a37dd09ba5da49f
-
SHA1
87651d92c447bf9b81bdc0e0e0fbfa603fc565d3
-
SHA256
20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1
-
SHA512
60df3bf6abf8290add52bf65e5902a26ea8c497c33546b3c098035907e626446e169d50488d5c0a87ec0ec164e310304dbcf9f705bb23f335ee988b74d476a8c
-
SSDEEP
12288:cMrQy90btjvasibPby1Zo6iHxTKXPZ9RRzkQTegNYMv3rKuOrf4f:UyIjSsNPRicPNxkXMPrK3m
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9664.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9664.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2660-190-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-189-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-192-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-194-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-196-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-198-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-200-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-202-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-207-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-209-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-211-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-213-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-215-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-217-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-219-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-221-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-223-0x0000000002540000-0x000000000257F000-memory.dmp family_redline behavioral1/memory/2660-225-0x0000000002540000-0x000000000257F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 548 un776494.exe 1960 pro9664.exe 2660 qu2544.exe 3816 si254614.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9664.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un776494.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un776494.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3640 1960 WerFault.exe 85 4300 2660 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1960 pro9664.exe 1960 pro9664.exe 2660 qu2544.exe 2660 qu2544.exe 3816 si254614.exe 3816 si254614.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1960 pro9664.exe Token: SeDebugPrivilege 2660 qu2544.exe Token: SeDebugPrivilege 3816 si254614.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4900 wrote to memory of 548 4900 20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe 84 PID 4900 wrote to memory of 548 4900 20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe 84 PID 4900 wrote to memory of 548 4900 20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe 84 PID 548 wrote to memory of 1960 548 un776494.exe 85 PID 548 wrote to memory of 1960 548 un776494.exe 85 PID 548 wrote to memory of 1960 548 un776494.exe 85 PID 548 wrote to memory of 2660 548 un776494.exe 93 PID 548 wrote to memory of 2660 548 un776494.exe 93 PID 548 wrote to memory of 2660 548 un776494.exe 93 PID 4900 wrote to memory of 3816 4900 20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe 96 PID 4900 wrote to memory of 3816 4900 20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe 96 PID 4900 wrote to memory of 3816 4900 20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe"C:\Users\Admin\AppData\Local\Temp\20888e5f8ce623e1be81a54c740e0751681069cf7e56f03425321d2d2c922bf1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un776494.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un776494.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9664.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9664.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 10804⤵
- Program crash
PID:3640
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2544.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2544.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 13364⤵
- Program crash
PID:4300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si254614.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si254614.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1960 -ip 19601⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2660 -ip 26601⤵PID:4424
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5590fc588b6c460225f96134784ffb328
SHA150278e04bc3b51fb8c97324af7d12f9ebfe3ffc2
SHA256abb74aa9c6677a41a2a41409cee6dae4b3eac589a71b406b3093ed3454124d57
SHA512865bacae8ce0b107db6340aa3d3bb55ede1df44126252295bacafe60e2209da8c27fdf402f739317369ee5c80ba2946b18fae6b0b61b11719b6b08d489f10c22
-
Filesize
175KB
MD5590fc588b6c460225f96134784ffb328
SHA150278e04bc3b51fb8c97324af7d12f9ebfe3ffc2
SHA256abb74aa9c6677a41a2a41409cee6dae4b3eac589a71b406b3093ed3454124d57
SHA512865bacae8ce0b107db6340aa3d3bb55ede1df44126252295bacafe60e2209da8c27fdf402f739317369ee5c80ba2946b18fae6b0b61b11719b6b08d489f10c22
-
Filesize
558KB
MD5e64c4411f27a6d4c993ced66d46f34b8
SHA107370274d06d45ab72e79a17921b8a34424da2eb
SHA256855d0ee9cf0727e5767af20b1fed66e57d8605220ef0cb5561c4b6f776d68bdf
SHA512ec3a23575c223471431f360b8b6f3815a7877d6d9d9f3450aa5da0b74c56e807862a912da5e1801342cd3819e4d2c17d9b5483e555bfc589e115fd6295649248
-
Filesize
558KB
MD5e64c4411f27a6d4c993ced66d46f34b8
SHA107370274d06d45ab72e79a17921b8a34424da2eb
SHA256855d0ee9cf0727e5767af20b1fed66e57d8605220ef0cb5561c4b6f776d68bdf
SHA512ec3a23575c223471431f360b8b6f3815a7877d6d9d9f3450aa5da0b74c56e807862a912da5e1801342cd3819e4d2c17d9b5483e555bfc589e115fd6295649248
-
Filesize
307KB
MD59ee699bef996a109fa03171b0f314623
SHA11413e2786322175d7952f65e1bfa40811a999daa
SHA256492357a1b312e7fff0292868139a24ca8a65723bd3ba7540aabb21dbf8cef89d
SHA512bb029b3e2787b7be2422dab6e52fe05925627320cdfc7f7b0ef06dd30e93d51ae3a535624a76b3791d710a35990f7563b629a1561d83156637871979a06f8925
-
Filesize
307KB
MD59ee699bef996a109fa03171b0f314623
SHA11413e2786322175d7952f65e1bfa40811a999daa
SHA256492357a1b312e7fff0292868139a24ca8a65723bd3ba7540aabb21dbf8cef89d
SHA512bb029b3e2787b7be2422dab6e52fe05925627320cdfc7f7b0ef06dd30e93d51ae3a535624a76b3791d710a35990f7563b629a1561d83156637871979a06f8925
-
Filesize
365KB
MD5eb400830d63bc97a4ac74b6ebe605b17
SHA1a719370b211c49ec06428d53dafaed5df300651d
SHA2562a42ad6cd50c789827f525c218a753e02129d25f521185ac06d85f55bf6e3dfb
SHA512df638836de681d2ecd7734542d23954b81f1ff0b9b1e7cfbd5b197a2a2472e330050c075388426bdfa1d175bde2767d76351003e0a999ddc1159490e0c2ea4e6
-
Filesize
365KB
MD5eb400830d63bc97a4ac74b6ebe605b17
SHA1a719370b211c49ec06428d53dafaed5df300651d
SHA2562a42ad6cd50c789827f525c218a753e02129d25f521185ac06d85f55bf6e3dfb
SHA512df638836de681d2ecd7734542d23954b81f1ff0b9b1e7cfbd5b197a2a2472e330050c075388426bdfa1d175bde2767d76351003e0a999ddc1159490e0c2ea4e6