Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 14:47
Static task
static1
Behavioral task
behavioral1
Sample
11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe
Resource
win10v2004-20230221-en
General
-
Target
11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe
-
Size
685KB
-
MD5
2d289dfe316bd8f40e108e165086e671
-
SHA1
d58173d21c36d85cd6aa7b8d05dbdc81e1b8dace
-
SHA256
11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7
-
SHA512
75ab67944d5c6dc8e2f93f8015ba8f84f6007041b19fdff6b970deeb5cbf059fa9d875bbe59a382f56543fa1e644e9e17f87597f1d4a4dbf24cfd7140be2407c
-
SSDEEP
12288:ZMrky900KfE6bkKM64p7n29As8hyzjodIP9pQwbmjTySIBrksETkgH/+I3iL:ByofE6bkDtpL5yzjTVWVjT8hksETkgJq
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8084.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8084.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3496-191-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-192-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-194-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-196-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-198-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-202-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-205-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-207-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-209-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-211-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-213-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-215-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-217-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-219-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-221-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-223-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-225-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline behavioral1/memory/3496-227-0x0000000004CE0000-0x0000000004D1E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1636 un242058.exe 2512 pro8084.exe 3496 qu0710.exe 4632 si125970.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8084.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un242058.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un242058.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3188 2512 WerFault.exe 84 3592 3496 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2512 pro8084.exe 2512 pro8084.exe 3496 qu0710.exe 3496 qu0710.exe 4632 si125970.exe 4632 si125970.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2512 pro8084.exe Token: SeDebugPrivilege 3496 qu0710.exe Token: SeDebugPrivilege 4632 si125970.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4328 wrote to memory of 1636 4328 11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe 83 PID 4328 wrote to memory of 1636 4328 11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe 83 PID 4328 wrote to memory of 1636 4328 11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe 83 PID 1636 wrote to memory of 2512 1636 un242058.exe 84 PID 1636 wrote to memory of 2512 1636 un242058.exe 84 PID 1636 wrote to memory of 2512 1636 un242058.exe 84 PID 1636 wrote to memory of 3496 1636 un242058.exe 91 PID 1636 wrote to memory of 3496 1636 un242058.exe 91 PID 1636 wrote to memory of 3496 1636 un242058.exe 91 PID 4328 wrote to memory of 4632 4328 11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe 97 PID 4328 wrote to memory of 4632 4328 11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe 97 PID 4328 wrote to memory of 4632 4328 11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe"C:\Users\Admin\AppData\Local\Temp\11ffe07eabd1eb9ce4c340c73bc3998ae23c8a8a33ea78e88c24025367cf9fe7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un242058.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un242058.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8084.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8084.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 10924⤵
- Program crash
PID:3188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0710.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0710.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 20244⤵
- Program crash
PID:3592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125970.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125970.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2512 -ip 25121⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3496 -ip 34961⤵PID:4580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5841b7357cfc8f8918cb7df4c39263aae
SHA1e9661250d32a5b14d26adc82749932187002d438
SHA25676b4609cd57ab982a0301beaad76374580389275bffa946605c642f9bde57f16
SHA512a53439d7599998a5565dc38d959769951ad9c869d1bfdf3166b197044c3f1734c82b3e7c20950fef1ed5090727ab56b80b35c527847fdaee588b4bbe8ef11579
-
Filesize
175KB
MD5841b7357cfc8f8918cb7df4c39263aae
SHA1e9661250d32a5b14d26adc82749932187002d438
SHA25676b4609cd57ab982a0301beaad76374580389275bffa946605c642f9bde57f16
SHA512a53439d7599998a5565dc38d959769951ad9c869d1bfdf3166b197044c3f1734c82b3e7c20950fef1ed5090727ab56b80b35c527847fdaee588b4bbe8ef11579
-
Filesize
543KB
MD5f3cae483658b7f6a25fa3c7f6c3b9b9a
SHA1c7bb21a389d23b105a991fa43ca28634b0af1f68
SHA25673dce7ae45f8b806b2712ac5baf0ffef1985cf8a9b7265b24bc933d6ea28cdcd
SHA512f5773f6d5f8d8609c9dc04d147fc7ef30f89d27fec80dcf0c45add96279ae3cee2ef156eda6b1f728b79f8b44278f770765f6adfcffe48c4a8ba2dfb6dc14118
-
Filesize
543KB
MD5f3cae483658b7f6a25fa3c7f6c3b9b9a
SHA1c7bb21a389d23b105a991fa43ca28634b0af1f68
SHA25673dce7ae45f8b806b2712ac5baf0ffef1985cf8a9b7265b24bc933d6ea28cdcd
SHA512f5773f6d5f8d8609c9dc04d147fc7ef30f89d27fec80dcf0c45add96279ae3cee2ef156eda6b1f728b79f8b44278f770765f6adfcffe48c4a8ba2dfb6dc14118
-
Filesize
292KB
MD587702ace7043d23ff88045fa8e9f7f89
SHA134acfcc199fda51360ae7e8fc844398c3944798a
SHA25646a140f84aabf0f80b12f625d8f8f7d3386d618f1ca18cedfbf3f4a27673e32b
SHA5126b5d7eeeeddcfd2d86b9318009c957b7f8b15f72c2083204637379dfa480892e4fc6fa27697525bf4b31e2d7cbf79c59abd44cf988856542e621e5743b0f45ac
-
Filesize
292KB
MD587702ace7043d23ff88045fa8e9f7f89
SHA134acfcc199fda51360ae7e8fc844398c3944798a
SHA25646a140f84aabf0f80b12f625d8f8f7d3386d618f1ca18cedfbf3f4a27673e32b
SHA5126b5d7eeeeddcfd2d86b9318009c957b7f8b15f72c2083204637379dfa480892e4fc6fa27697525bf4b31e2d7cbf79c59abd44cf988856542e621e5743b0f45ac
-
Filesize
350KB
MD5ae3330a4fa1c3a69f956c1908bc2bba8
SHA1feeef79bcad7e615b307f85ac3e500d875b97674
SHA256793cf058c43cb0c75fb7823ebc4253cbd08871bd6ca9db4a7db1aa4da05e11ff
SHA5124174fbe888ae183d1d6d66e4406df5112609e169b16ccd4c3dfb5156299c74e537621ce841374acdf3f503c7470e67e69587c9ac80656c70dd4be410fde6193b
-
Filesize
350KB
MD5ae3330a4fa1c3a69f956c1908bc2bba8
SHA1feeef79bcad7e615b307f85ac3e500d875b97674
SHA256793cf058c43cb0c75fb7823ebc4253cbd08871bd6ca9db4a7db1aa4da05e11ff
SHA5124174fbe888ae183d1d6d66e4406df5112609e169b16ccd4c3dfb5156299c74e537621ce841374acdf3f503c7470e67e69587c9ac80656c70dd4be410fde6193b