Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
56s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe
Resource
win10v2004-20230221-en
General
-
Target
d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe
-
Size
699KB
-
MD5
3840bafe9b89587dc6d34e67d47164eb
-
SHA1
0e0c0ebbb7cb22fb000e7443e33443b334a96199
-
SHA256
d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66
-
SHA512
43b668818b0b02e5f994151e52ce9edda8be61a6b51c73a242b058a7283f658479fdf00ac129829fd3771c0e2d01ec0de3621cdbd2dbc5dccfb712bcdd2d1374
-
SSDEEP
12288:aMrfy90YfWoEoXH/NWoAZquN9X6uLHTHBRvqKSxSO5Rw2Wa3vZ7:FyLl8n9nHTH+KSoiRJ/3vp
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6294.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6294.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4848-190-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-191-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-193-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-195-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-197-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-199-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-201-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-203-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-205-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-207-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-209-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-211-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-213-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-215-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-217-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-219-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-226-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline behavioral1/memory/4848-221-0x0000000002980000-0x00000000029BE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3840 un757991.exe 2268 pro6294.exe 4848 qu0324.exe 4720 si797257.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6294.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un757991.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un757991.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 324 2268 WerFault.exe 84 2108 4848 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2268 pro6294.exe 2268 pro6294.exe 4848 qu0324.exe 4848 qu0324.exe 4720 si797257.exe 4720 si797257.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2268 pro6294.exe Token: SeDebugPrivilege 4848 qu0324.exe Token: SeDebugPrivilege 4720 si797257.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1932 wrote to memory of 3840 1932 d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe 83 PID 1932 wrote to memory of 3840 1932 d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe 83 PID 1932 wrote to memory of 3840 1932 d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe 83 PID 3840 wrote to memory of 2268 3840 un757991.exe 84 PID 3840 wrote to memory of 2268 3840 un757991.exe 84 PID 3840 wrote to memory of 2268 3840 un757991.exe 84 PID 3840 wrote to memory of 4848 3840 un757991.exe 90 PID 3840 wrote to memory of 4848 3840 un757991.exe 90 PID 3840 wrote to memory of 4848 3840 un757991.exe 90 PID 1932 wrote to memory of 4720 1932 d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe 93 PID 1932 wrote to memory of 4720 1932 d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe 93 PID 1932 wrote to memory of 4720 1932 d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe"C:\Users\Admin\AppData\Local\Temp\d7dc3bf3b899054240319b2af9d0ca4ebfcb41d96d3b837e318ec21a9b10ad66.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un757991.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un757991.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6294.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6294.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 10804⤵
- Program crash
PID:324
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0324.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0324.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 17844⤵
- Program crash
PID:2108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797257.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797257.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2268 -ip 22681⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4848 -ip 48481⤵PID:3440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52cb621148319048fa3a0a4c9afad2268
SHA1770f83503ace26c2a67bf61dc9d94e8e622f3879
SHA2562edca9d8f79748fe8b9f85f417e922adec4631c9f7546cc22d45810b40d542ef
SHA512b83efd0b5ca38935b8b5c10f8531dd7c8cdc7f5b237dea79d4414e70f807839878277e417d51611f5d52f81b74ecd3fd1bc13af263b21798e4d26debe22cdc0f
-
Filesize
175KB
MD52cb621148319048fa3a0a4c9afad2268
SHA1770f83503ace26c2a67bf61dc9d94e8e622f3879
SHA2562edca9d8f79748fe8b9f85f417e922adec4631c9f7546cc22d45810b40d542ef
SHA512b83efd0b5ca38935b8b5c10f8531dd7c8cdc7f5b237dea79d4414e70f807839878277e417d51611f5d52f81b74ecd3fd1bc13af263b21798e4d26debe22cdc0f
-
Filesize
557KB
MD50bfde275754351e2739bb9167df0afaa
SHA162f73f747f2f955d3f1f15595b8e12d3e3566e9a
SHA25655e0f90362332cfd8afaf0cd6d358ff53b4a35b61079c9a7bb16208dd416d67e
SHA5127b6d8f2b49cb94480c2749643ba3c82478ed6fa8ed49c80eb19f77193a4b47faa674f1684fd42b0640196388db083b3053f105fb4cfa612c8664062b74c8edcb
-
Filesize
557KB
MD50bfde275754351e2739bb9167df0afaa
SHA162f73f747f2f955d3f1f15595b8e12d3e3566e9a
SHA25655e0f90362332cfd8afaf0cd6d358ff53b4a35b61079c9a7bb16208dd416d67e
SHA5127b6d8f2b49cb94480c2749643ba3c82478ed6fa8ed49c80eb19f77193a4b47faa674f1684fd42b0640196388db083b3053f105fb4cfa612c8664062b74c8edcb
-
Filesize
308KB
MD5d5dbc1be75a2aad1a6b7a061b02c83d6
SHA14bd577bb4963d26930cf5424e27b145b09473d37
SHA256f54385b9b5d8b316a631753b8e0fe2f7c3a8ba2eb25e1ce9c719d0312b1a6307
SHA51237a04b852c9e31f228f444009bf9e082bbbe9bf09e30aa0e548ff6864746a872fa0600d4980721d83f53c0bb5604ddf3109d46df1a24f31182aa42cbbfe0f3b3
-
Filesize
308KB
MD5d5dbc1be75a2aad1a6b7a061b02c83d6
SHA14bd577bb4963d26930cf5424e27b145b09473d37
SHA256f54385b9b5d8b316a631753b8e0fe2f7c3a8ba2eb25e1ce9c719d0312b1a6307
SHA51237a04b852c9e31f228f444009bf9e082bbbe9bf09e30aa0e548ff6864746a872fa0600d4980721d83f53c0bb5604ddf3109d46df1a24f31182aa42cbbfe0f3b3
-
Filesize
366KB
MD53852395950811d472d8513b62aa53be7
SHA1929673aa33745f08a6b20fe58f30a0ccffe5e29a
SHA25680e52d5b22a33744adc27c5534039d31d474152c88eba6f1f3af67f8859ae280
SHA512bf60e55003d36d9b599fd896262d64adb6646378150cce6f5493661551c14137872cb7890b6c1c75076fc29b6110ddd130c3c6ce4f0c6df6c22fbae2914d64a3
-
Filesize
366KB
MD53852395950811d472d8513b62aa53be7
SHA1929673aa33745f08a6b20fe58f30a0ccffe5e29a
SHA25680e52d5b22a33744adc27c5534039d31d474152c88eba6f1f3af67f8859ae280
SHA512bf60e55003d36d9b599fd896262d64adb6646378150cce6f5493661551c14137872cb7890b6c1c75076fc29b6110ddd130c3c6ce4f0c6df6c22fbae2914d64a3