Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
56s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe
Resource
win10v2004-20230221-en
General
-
Target
712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe
-
Size
685KB
-
MD5
df5ae9a6a92f280152eb2d5b2a0cd75e
-
SHA1
22b254ec41de7f9b0fe3034b6406c68a574d5c83
-
SHA256
712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084
-
SHA512
20e9813d9cb57f7f2ab353846909d6817a506ee1829f02f3aab394544c534f098b70b6bc76709b049a8b7f422276fec8c69170fd90ca6882476084b3ad54624b
-
SSDEEP
12288:3Mr0y90hzZ45rr1yMulkGgapMhWGAlVI8OIzTH/ceH4hlBZ3BE8WIPG:fyNlglkGga5dw8jzTrH4j3BE8WIu
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7010.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3452-189-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-190-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-192-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-194-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-198-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-196-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-200-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-202-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-204-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-206-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-208-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-210-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-212-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-217-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-218-0x0000000004CE0000-0x0000000004CF0000-memory.dmp family_redline behavioral1/memory/3452-220-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-222-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-224-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-226-0x00000000052E0000-0x000000000531E000-memory.dmp family_redline behavioral1/memory/3452-1107-0x0000000004CE0000-0x0000000004CF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1600 un085170.exe 2268 pro7010.exe 3452 qu9735.exe 4120 si033252.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7010.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un085170.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un085170.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 400 2268 WerFault.exe 83 1896 3452 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2268 pro7010.exe 2268 pro7010.exe 3452 qu9735.exe 3452 qu9735.exe 4120 si033252.exe 4120 si033252.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2268 pro7010.exe Token: SeDebugPrivilege 3452 qu9735.exe Token: SeDebugPrivilege 4120 si033252.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4980 wrote to memory of 1600 4980 712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe 82 PID 4980 wrote to memory of 1600 4980 712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe 82 PID 4980 wrote to memory of 1600 4980 712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe 82 PID 1600 wrote to memory of 2268 1600 un085170.exe 83 PID 1600 wrote to memory of 2268 1600 un085170.exe 83 PID 1600 wrote to memory of 2268 1600 un085170.exe 83 PID 1600 wrote to memory of 3452 1600 un085170.exe 92 PID 1600 wrote to memory of 3452 1600 un085170.exe 92 PID 1600 wrote to memory of 3452 1600 un085170.exe 92 PID 4980 wrote to memory of 4120 4980 712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe 96 PID 4980 wrote to memory of 4120 4980 712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe 96 PID 4980 wrote to memory of 4120 4980 712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe"C:\Users\Admin\AppData\Local\Temp\712b2fa53efed85b594661ad03cc69ee6316eec44e2ce18b8d111c250bb2e084.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un085170.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un085170.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7010.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7010.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 10884⤵
- Program crash
PID:400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9735.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9735.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 17204⤵
- Program crash
PID:1896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si033252.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si033252.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2268 -ip 22681⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3452 -ip 34521⤵PID:1272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c87322fab50bb95eb2c5ec298c2eb80a
SHA18bfaf4b25a96661e84be527f61d2fda2ae17b91e
SHA256db51e5f2645f224d28e0d9a43defe21b65de322c16b925335288b4a93e121681
SHA5121001b477ea1dcc48adb681fff424cb896756600da9cac000ca492f72e7dde53f7845140824dc1aafe05d551980d6084e9882a9ddf74cb2eb5422dd57f7b5b9a8
-
Filesize
175KB
MD5c87322fab50bb95eb2c5ec298c2eb80a
SHA18bfaf4b25a96661e84be527f61d2fda2ae17b91e
SHA256db51e5f2645f224d28e0d9a43defe21b65de322c16b925335288b4a93e121681
SHA5121001b477ea1dcc48adb681fff424cb896756600da9cac000ca492f72e7dde53f7845140824dc1aafe05d551980d6084e9882a9ddf74cb2eb5422dd57f7b5b9a8
-
Filesize
543KB
MD5c257eeae8c3ac3571f3d420211bfcae8
SHA1c7029cd989ad012a1cd2e1d9211bd1939ccf984d
SHA256a292c188a1d0f2d33f467f396f3c814e74ff5a5508c1e0539697c73b3dbf5367
SHA5120ef2db5ee820ae04552905247b6c7b54fd2727523cb9765076cb1fe3770e7d1823fa8c59f5d0bd0b387720fcf71865485a270e2634b85a1865563efbbe53489a
-
Filesize
543KB
MD5c257eeae8c3ac3571f3d420211bfcae8
SHA1c7029cd989ad012a1cd2e1d9211bd1939ccf984d
SHA256a292c188a1d0f2d33f467f396f3c814e74ff5a5508c1e0539697c73b3dbf5367
SHA5120ef2db5ee820ae04552905247b6c7b54fd2727523cb9765076cb1fe3770e7d1823fa8c59f5d0bd0b387720fcf71865485a270e2634b85a1865563efbbe53489a
-
Filesize
292KB
MD57141e077be3b4f73ae4eeec26d89db83
SHA119aecc45393a3fe65add589909be42349ee0738c
SHA2562b92cecf087e497f772a84d5f5fd1a284ce6a241c964c54c315ced4a973f7cd7
SHA512b017dcd2e870b5078aa73c22dd3dea6e114b0cf42bd2eb2d55616ca9e9a90182708e93a77483f186ca723c7e016f73c2e1b2e53769e795a3fb46591e3d573e75
-
Filesize
292KB
MD57141e077be3b4f73ae4eeec26d89db83
SHA119aecc45393a3fe65add589909be42349ee0738c
SHA2562b92cecf087e497f772a84d5f5fd1a284ce6a241c964c54c315ced4a973f7cd7
SHA512b017dcd2e870b5078aa73c22dd3dea6e114b0cf42bd2eb2d55616ca9e9a90182708e93a77483f186ca723c7e016f73c2e1b2e53769e795a3fb46591e3d573e75
-
Filesize
350KB
MD58ba9a76f968b8a99b5b9631377f27744
SHA1157da131c429b82aabbf6ea3c3de6d25cf72f761
SHA256d5bc698ab7d46e9ee66a55e6671278834862737a6ec17629bc69a961ce7e6c85
SHA5126442deea7bb2e9e4f9b151d1db6343e1e4170b94aa75ec8fd93e6fb68b2202d5720bd61ddf83e91f238b1fe0c8a954ab91fa3a3bf7c638b598a09433c935108f
-
Filesize
350KB
MD58ba9a76f968b8a99b5b9631377f27744
SHA1157da131c429b82aabbf6ea3c3de6d25cf72f761
SHA256d5bc698ab7d46e9ee66a55e6671278834862737a6ec17629bc69a961ce7e6c85
SHA5126442deea7bb2e9e4f9b151d1db6343e1e4170b94aa75ec8fd93e6fb68b2202d5720bd61ddf83e91f238b1fe0c8a954ab91fa3a3bf7c638b598a09433c935108f