Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe
Resource
win10v2004-20230220-en
General
-
Target
8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe
-
Size
684KB
-
MD5
f1ac8ea9e728a7fb913b8417503d942b
-
SHA1
2476235d16e97fd18588a107406719f3965f4007
-
SHA256
8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3
-
SHA512
52fa70fc2f39056d14d96b9997301046eebe01942f9ac3908770d24bbcaec8ab80ae90bb8b9d71468f031d57b2b52344719db2db3d90dbb84a8b6067725c4de3
-
SSDEEP
12288:EMrny90bu7z/buqaR3lncJqkEMT391avLdvGDc2xRCFBQmkEoeXTKPSHm:DyRQRlnc0MBedg1CimkEo2hHm
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5990.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1332-186-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-187-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-189-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-213-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-215-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-217-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline behavioral1/memory/1332-219-0x0000000004CC0000-0x0000000004CFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4240 un598347.exe 1160 pro5990.exe 1332 qu3508.exe 4640 si583862.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5990.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un598347.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un598347.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4408 1160 WerFault.exe 83 2112 1332 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1160 pro5990.exe 1160 pro5990.exe 1332 qu3508.exe 1332 qu3508.exe 4640 si583862.exe 4640 si583862.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1160 pro5990.exe Token: SeDebugPrivilege 1332 qu3508.exe Token: SeDebugPrivilege 4640 si583862.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1652 wrote to memory of 4240 1652 8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe 82 PID 1652 wrote to memory of 4240 1652 8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe 82 PID 1652 wrote to memory of 4240 1652 8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe 82 PID 4240 wrote to memory of 1160 4240 un598347.exe 83 PID 4240 wrote to memory of 1160 4240 un598347.exe 83 PID 4240 wrote to memory of 1160 4240 un598347.exe 83 PID 4240 wrote to memory of 1332 4240 un598347.exe 89 PID 4240 wrote to memory of 1332 4240 un598347.exe 89 PID 4240 wrote to memory of 1332 4240 un598347.exe 89 PID 1652 wrote to memory of 4640 1652 8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe 92 PID 1652 wrote to memory of 4640 1652 8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe 92 PID 1652 wrote to memory of 4640 1652 8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe"C:\Users\Admin\AppData\Local\Temp\8886c75281f558bc97d9a05b3e219bc22fe69deea1f162269fa3b1e401a346c3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598347.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598347.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5990.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5990.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 10844⤵
- Program crash
PID:4408
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3508.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3508.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 13604⤵
- Program crash
PID:2112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si583862.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si583862.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1160 -ip 11601⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1332 -ip 13321⤵PID:680
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5879517db2c68afd251abe1923e64bb97
SHA1448b26df2673f743c5de1b6534467054dcabee15
SHA2564b7c496c32570aaa9479e758bf2c0c426b91817a28730ad5450c697d3abc0fce
SHA5128da4ca57a026f96c8b43877e5889471e5be007702f8d010a4434f62951071ce684af593823d38f0908b50172772817e15a79c1a87f9986a023349f6803b0b438
-
Filesize
175KB
MD5879517db2c68afd251abe1923e64bb97
SHA1448b26df2673f743c5de1b6534467054dcabee15
SHA2564b7c496c32570aaa9479e758bf2c0c426b91817a28730ad5450c697d3abc0fce
SHA5128da4ca57a026f96c8b43877e5889471e5be007702f8d010a4434f62951071ce684af593823d38f0908b50172772817e15a79c1a87f9986a023349f6803b0b438
-
Filesize
543KB
MD58586884407b3e479f4cdecbd8dc86d6d
SHA17db0316c50e5999e533d37aacac47676daa0c1e6
SHA256bc5351d8c7246c9e737926608d030ea208f7fb6a84a9ea1c6c9c710e4f288b52
SHA512be155ed19b594136b91f6ceecb273558881a64dc6eaaf79e7f84c1d2db7023adfc677853e837ce63f9a667730f8e52beeeeee6c40cb5979e9bb75598bad5c079
-
Filesize
543KB
MD58586884407b3e479f4cdecbd8dc86d6d
SHA17db0316c50e5999e533d37aacac47676daa0c1e6
SHA256bc5351d8c7246c9e737926608d030ea208f7fb6a84a9ea1c6c9c710e4f288b52
SHA512be155ed19b594136b91f6ceecb273558881a64dc6eaaf79e7f84c1d2db7023adfc677853e837ce63f9a667730f8e52beeeeee6c40cb5979e9bb75598bad5c079
-
Filesize
292KB
MD54949809a12eb83bcd5bbe5eb9f3ae2b3
SHA145ac89e8f99d050c5979fc6e0432074427260395
SHA2565f0f8e1754061180eac129c3890684e78388e4ee07e39fdad7f3bb595a0eccaa
SHA51270e1e048d382c0a289c09889bfc71a6aca5f7fe2729114a334c93edb21f8a07d71550ac80e1b02f3cdb2322bcc049077b8f88e0a0c7e551daa9dba2b5850f495
-
Filesize
292KB
MD54949809a12eb83bcd5bbe5eb9f3ae2b3
SHA145ac89e8f99d050c5979fc6e0432074427260395
SHA2565f0f8e1754061180eac129c3890684e78388e4ee07e39fdad7f3bb595a0eccaa
SHA51270e1e048d382c0a289c09889bfc71a6aca5f7fe2729114a334c93edb21f8a07d71550ac80e1b02f3cdb2322bcc049077b8f88e0a0c7e551daa9dba2b5850f495
-
Filesize
350KB
MD5843b327dd169a04170abe4d8da58e148
SHA17a88a52d6094971dedd376471b0a69a7f61f728a
SHA256077cdeb0a36ba2f0a605442d5d4a2aa9f81a45a6544f28a46368b22df6f55638
SHA5120a278aabfbf2195252d09d0e08e854663ac51a1b014529490198986ff4de27beac51cbaa5b1df82e7cd94ad0b4ad1e886678ac1fb81303232bdd329ccab212e5
-
Filesize
350KB
MD5843b327dd169a04170abe4d8da58e148
SHA17a88a52d6094971dedd376471b0a69a7f61f728a
SHA256077cdeb0a36ba2f0a605442d5d4a2aa9f81a45a6544f28a46368b22df6f55638
SHA5120a278aabfbf2195252d09d0e08e854663ac51a1b014529490198986ff4de27beac51cbaa5b1df82e7cd94ad0b4ad1e886678ac1fb81303232bdd329ccab212e5