Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 13:23
Static task
static1
Behavioral task
behavioral1
Sample
57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe
Resource
win10v2004-20230220-en
General
-
Target
57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe
-
Size
685KB
-
MD5
1f851af091a208dbe440bb1b75f308bc
-
SHA1
be0de3b49d258b5dc8d88956c6b07fc845f5e012
-
SHA256
57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e
-
SHA512
c40be3344ea456a8a18bc1a464fb99f83bd806d645645a55f5f08904341228b4af0366290955a24705f11c3b88b52c988605c34833c3b8173ed88a12a4c8aebe
-
SSDEEP
12288:cMrMy90NwzFmppj1QiksARksdmZKZIh/K/7B0KiE6L0Aqcc:AyalQiWis/ZAyjOKiE6xqcc
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1065.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1065.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4228-191-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-192-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-194-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-196-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-198-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-200-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-202-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-204-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-206-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-208-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-210-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-212-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-214-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-218-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-216-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-220-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-222-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline behavioral1/memory/4228-225-0x0000000002770000-0x00000000027AE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3288 un184619.exe 2988 pro1065.exe 4228 qu2081.exe 3628 si572555.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1065.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un184619.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un184619.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1336 2988 WerFault.exe 88 3392 4228 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2988 pro1065.exe 2988 pro1065.exe 4228 qu2081.exe 4228 qu2081.exe 3628 si572555.exe 3628 si572555.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2988 pro1065.exe Token: SeDebugPrivilege 4228 qu2081.exe Token: SeDebugPrivilege 3628 si572555.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4004 wrote to memory of 3288 4004 57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe 87 PID 4004 wrote to memory of 3288 4004 57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe 87 PID 4004 wrote to memory of 3288 4004 57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe 87 PID 3288 wrote to memory of 2988 3288 un184619.exe 88 PID 3288 wrote to memory of 2988 3288 un184619.exe 88 PID 3288 wrote to memory of 2988 3288 un184619.exe 88 PID 3288 wrote to memory of 4228 3288 un184619.exe 94 PID 3288 wrote to memory of 4228 3288 un184619.exe 94 PID 3288 wrote to memory of 4228 3288 un184619.exe 94 PID 4004 wrote to memory of 3628 4004 57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe 98 PID 4004 wrote to memory of 3628 4004 57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe 98 PID 4004 wrote to memory of 3628 4004 57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe"C:\Users\Admin\AppData\Local\Temp\57c9ed1e90bdb5e303f41f752fdf53705cfb5023b54a595d905d99c131ff036e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un184619.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un184619.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1065.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1065.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 10844⤵
- Program crash
PID:1336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2081.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2081.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 19604⤵
- Program crash
PID:3392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si572555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si572555.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2988 -ip 29881⤵PID:3348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4228 -ip 42281⤵PID:4312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD50207fb9837f600deb2393ac48441eb98
SHA113b4b265550d26cdde45f5aae78a60a1869463d1
SHA25606e3491d1ec3f00467f52c69dddebfd5d751274704b66a7551eae0a36eb3efb2
SHA512e6228d3d302425e554ccddbd6f67588516bc239cf1887486fa04df3ae942192fec04b93e0c9229f6eadbaa7d9bee67b51b435b2d2cfb48cab4ff0e1574fe278e
-
Filesize
175KB
MD50207fb9837f600deb2393ac48441eb98
SHA113b4b265550d26cdde45f5aae78a60a1869463d1
SHA25606e3491d1ec3f00467f52c69dddebfd5d751274704b66a7551eae0a36eb3efb2
SHA512e6228d3d302425e554ccddbd6f67588516bc239cf1887486fa04df3ae942192fec04b93e0c9229f6eadbaa7d9bee67b51b435b2d2cfb48cab4ff0e1574fe278e
-
Filesize
543KB
MD55d151e3dfbffccda0cd77a2e1ebeef8b
SHA12fcd5bfa350cb8d2b602186648f84f53e44b5212
SHA25607376eee26d1b6587fcbe2a5512e0b6e2d950906052d4a887613413142a13e59
SHA512d270e29bdd734d078cec69787a886612f3b34a83f572c3cbc7e322420497c3fa2ac2f3ff8fd8f978aae8cc52d7c57e9828a3d56583ad023fe0975d83935de939
-
Filesize
543KB
MD55d151e3dfbffccda0cd77a2e1ebeef8b
SHA12fcd5bfa350cb8d2b602186648f84f53e44b5212
SHA25607376eee26d1b6587fcbe2a5512e0b6e2d950906052d4a887613413142a13e59
SHA512d270e29bdd734d078cec69787a886612f3b34a83f572c3cbc7e322420497c3fa2ac2f3ff8fd8f978aae8cc52d7c57e9828a3d56583ad023fe0975d83935de939
-
Filesize
292KB
MD53da2eda961ec514d5656041d0a2932df
SHA1f92101ade9a9a76644c29195208a752ea3a7e99f
SHA256f86e3d85cd21fb0c801e2b99f2605123d72cc0a75c119237344809b4c435fe91
SHA5124cf80c45a699144128779bf7fae7f19923567c16c23da959248e59eb25caa424c94aa33c6a120c91608ba632965bc49fb4476a37410c11a2b3cc8f9fc0731210
-
Filesize
292KB
MD53da2eda961ec514d5656041d0a2932df
SHA1f92101ade9a9a76644c29195208a752ea3a7e99f
SHA256f86e3d85cd21fb0c801e2b99f2605123d72cc0a75c119237344809b4c435fe91
SHA5124cf80c45a699144128779bf7fae7f19923567c16c23da959248e59eb25caa424c94aa33c6a120c91608ba632965bc49fb4476a37410c11a2b3cc8f9fc0731210
-
Filesize
350KB
MD5900186eec9ea71b1f5a84697bb7ae5e8
SHA1857fb1d4d8f70a892837256a47dd775da6c0ce8c
SHA256149006bc9d47d06e95040f123b52ad4d45e6862668b48ef2d4d1d09b17b44a9d
SHA512152cf0783ead90dff3622919c8487a41fd6d15aa105ae37623401338efb1e1aa58aa13a0767d17e8c2dbe8f152f791b841cd9787b3a295886688402a0d1e1317
-
Filesize
350KB
MD5900186eec9ea71b1f5a84697bb7ae5e8
SHA1857fb1d4d8f70a892837256a47dd775da6c0ce8c
SHA256149006bc9d47d06e95040f123b52ad4d45e6862668b48ef2d4d1d09b17b44a9d
SHA512152cf0783ead90dff3622919c8487a41fd6d15aa105ae37623401338efb1e1aa58aa13a0767d17e8c2dbe8f152f791b841cd9787b3a295886688402a0d1e1317