Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 11:18
Static task
static1
Behavioral task
behavioral1
Sample
097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe
Resource
win10v2004-20230221-en
General
-
Target
097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe
-
Size
688KB
-
MD5
f60918781bc446d37cbb16b0177daa8b
-
SHA1
96be892b7555c3af6e9d203e336bc22c300c5bbd
-
SHA256
097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab
-
SHA512
548e59e18fbde0e3047cf8e7cdfc8e0655ec050dbf790ce8c34715d14425ab86b31f470d841cb22b88551a68c4c54bb450c18216ce6aa58b403dcee12ccbaa08
-
SSDEEP
12288:LMrSy906Edg2me+Gha0UpN9z4/8meXWZ0DEyqZsndBwyyu:pyoDMDpXz4/+G+DEjIeyyu
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7796.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/2760-190-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-191-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-193-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-195-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-197-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-199-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-201-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-203-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-205-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-207-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-209-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-211-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-213-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-215-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-217-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-219-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-221-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-223-0x00000000027D0000-0x000000000280E000-memory.dmp family_redline behavioral1/memory/2760-1109-0x0000000004E30000-0x0000000004E40000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2640 un908128.exe 1648 pro7796.exe 2760 qu9238.exe 4184 si363839.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7796.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7796.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un908128.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un908128.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3548 1648 WerFault.exe 85 944 2760 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1648 pro7796.exe 1648 pro7796.exe 2760 qu9238.exe 2760 qu9238.exe 4184 si363839.exe 4184 si363839.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1648 pro7796.exe Token: SeDebugPrivilege 2760 qu9238.exe Token: SeDebugPrivilege 4184 si363839.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2640 2924 097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe 84 PID 2924 wrote to memory of 2640 2924 097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe 84 PID 2924 wrote to memory of 2640 2924 097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe 84 PID 2640 wrote to memory of 1648 2640 un908128.exe 85 PID 2640 wrote to memory of 1648 2640 un908128.exe 85 PID 2640 wrote to memory of 1648 2640 un908128.exe 85 PID 2640 wrote to memory of 2760 2640 un908128.exe 91 PID 2640 wrote to memory of 2760 2640 un908128.exe 91 PID 2640 wrote to memory of 2760 2640 un908128.exe 91 PID 2924 wrote to memory of 4184 2924 097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe 94 PID 2924 wrote to memory of 4184 2924 097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe 94 PID 2924 wrote to memory of 4184 2924 097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe"C:\Users\Admin\AppData\Local\Temp\097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908128.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908128.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7796.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7796.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 10804⤵
- Program crash
PID:3548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9238.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9238.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 13324⤵
- Program crash
PID:944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363839.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363839.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1648 -ip 16481⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2760 -ip 27601⤵PID:4284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5278ab40e4b9fc7c647a14e1b1e255c5a
SHA10f40bd85d74c493486290b99ede81e53df952552
SHA2567ff0a007c943701f4de67e06881e6cdc461d7602feb1976da383e2fc2a10ed5f
SHA512b790adfd69b31893eee71c3ae31f9249968d2d147932d8939994b6b398574f820124c46dab483e85e95c474574b72889d73719d9055af460f6c36a1e5ea85698
-
Filesize
175KB
MD5278ab40e4b9fc7c647a14e1b1e255c5a
SHA10f40bd85d74c493486290b99ede81e53df952552
SHA2567ff0a007c943701f4de67e06881e6cdc461d7602feb1976da383e2fc2a10ed5f
SHA512b790adfd69b31893eee71c3ae31f9249968d2d147932d8939994b6b398574f820124c46dab483e85e95c474574b72889d73719d9055af460f6c36a1e5ea85698
-
Filesize
545KB
MD543716da2475a6a4e085e81a1d7c61184
SHA1a2b1506ba6caab7dd11572b9c788ac836a735855
SHA2561a1818e01bb71a40d6af076901a59b2567a90c95cae6c37d6a55c0808d18468f
SHA512d4b5d993fb0563c903fc849ea34e500e2cb914db806b8033543d9ecc5dc77b76221ee2268cd74660f2f3e818bf53be83abbc7af06f5ce76a7eb6a513b3c5a995
-
Filesize
545KB
MD543716da2475a6a4e085e81a1d7c61184
SHA1a2b1506ba6caab7dd11572b9c788ac836a735855
SHA2561a1818e01bb71a40d6af076901a59b2567a90c95cae6c37d6a55c0808d18468f
SHA512d4b5d993fb0563c903fc849ea34e500e2cb914db806b8033543d9ecc5dc77b76221ee2268cd74660f2f3e818bf53be83abbc7af06f5ce76a7eb6a513b3c5a995
-
Filesize
300KB
MD5cde7418409d40162db2d5d108665025e
SHA1ab5a9ba3c001d281071e75dab8b4062b474472ca
SHA2560e431e5f7c571090b0d00362eefb40a094254f57f401978c858c357755c60fae
SHA5120c6be7c32015c4d7690f17b22a495e80c87117121619bd81caa06e6fa804f41baa251ca348ef13ec7336dcce0e0cbd157442b9433932769fc1f8c8636bf38ce5
-
Filesize
300KB
MD5cde7418409d40162db2d5d108665025e
SHA1ab5a9ba3c001d281071e75dab8b4062b474472ca
SHA2560e431e5f7c571090b0d00362eefb40a094254f57f401978c858c357755c60fae
SHA5120c6be7c32015c4d7690f17b22a495e80c87117121619bd81caa06e6fa804f41baa251ca348ef13ec7336dcce0e0cbd157442b9433932769fc1f8c8636bf38ce5
-
Filesize
359KB
MD51a42876776bf6235cdb4175bb59de171
SHA10c0e0de20ed07d7b84b2835bf79531f6a0283316
SHA2561874bce898c85a088e02ac0126510f6b1453d7957f739cdad7a84c2b4347e315
SHA5123f527ea863a52fd17dae513e814499e5f7b02a6d0ff854900f8d1dc7a3dd4ba3fdb0c2cbd313b7e8e445c272811da49d66c666222d3e8b1798d46903fd11879f
-
Filesize
359KB
MD51a42876776bf6235cdb4175bb59de171
SHA10c0e0de20ed07d7b84b2835bf79531f6a0283316
SHA2561874bce898c85a088e02ac0126510f6b1453d7957f739cdad7a84c2b4347e315
SHA5123f527ea863a52fd17dae513e814499e5f7b02a6d0ff854900f8d1dc7a3dd4ba3fdb0c2cbd313b7e8e445c272811da49d66c666222d3e8b1798d46903fd11879f