Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe
Resource
win10v2004-20230221-en
General
-
Target
a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe
-
Size
696KB
-
MD5
68312da8ca407cd678c46dc16a19510b
-
SHA1
f3762c36d0c3dfcc98261c39dcd16f0409f39d1a
-
SHA256
a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7
-
SHA512
74226473df76c21292ce9ac37b73e45560ce382640a7f8a452b1bc9d42a8b205d337bff8ddf945c2b38334c76e0fee78ffd0b49f0185f51d4ec88fae856ddbb1
-
SSDEEP
12288:BMrey90zDh/pj9SQB48NzZaDzfrLy8HO5rFWLtAMI2VDbvZKTrmB0py:jyycunNzZObC8HO5ZWGM1JvbBiy
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6197.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4892-191-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-192-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-194-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-196-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-198-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-202-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-200-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-205-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-209-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-211-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-213-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-215-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-217-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-219-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-221-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-223-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-225-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-227-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/4892-1111-0x00000000072B0000-0x00000000072C0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4152 un535988.exe 1792 pro6197.exe 4892 qu7293.exe 2328 si993794.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6197.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un535988.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un535988.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2188 1792 WerFault.exe 85 396 4892 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1792 pro6197.exe 1792 pro6197.exe 4892 qu7293.exe 4892 qu7293.exe 2328 si993794.exe 2328 si993794.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1792 pro6197.exe Token: SeDebugPrivilege 4892 qu7293.exe Token: SeDebugPrivilege 2328 si993794.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3824 wrote to memory of 4152 3824 a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe 84 PID 3824 wrote to memory of 4152 3824 a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe 84 PID 3824 wrote to memory of 4152 3824 a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe 84 PID 4152 wrote to memory of 1792 4152 un535988.exe 85 PID 4152 wrote to memory of 1792 4152 un535988.exe 85 PID 4152 wrote to memory of 1792 4152 un535988.exe 85 PID 4152 wrote to memory of 4892 4152 un535988.exe 91 PID 4152 wrote to memory of 4892 4152 un535988.exe 91 PID 4152 wrote to memory of 4892 4152 un535988.exe 91 PID 3824 wrote to memory of 2328 3824 a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe 95 PID 3824 wrote to memory of 2328 3824 a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe 95 PID 3824 wrote to memory of 2328 3824 a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe"C:\Users\Admin\AppData\Local\Temp\a7ec3a10a384cb025f1e713a8b5dd02b102d81a1a3e30b15d179005bb7f8beb7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un535988.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un535988.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6197.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6197.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 10964⤵
- Program crash
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7293.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7293.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 11924⤵
- Program crash
PID:396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si993794.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si993794.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1792 -ip 17921⤵PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4892 -ip 48921⤵PID:3124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b9c4f7fa2212a5bb8fe18a0d01fdbc0c
SHA1777f250dc996c043dbb76f6bbae45561be0596d9
SHA2568e8ab9663fcf90f7ee981c2de11d8c7c520d84809620463e0dec6b048282483d
SHA51252e45bb24b4245f6b401200914194c10d568e1d4f501bf1da099b5f58060f41f70be83b1a96661614e1dfabf6213042de63dfbfdf9a29f7c81bb3926b99917b6
-
Filesize
175KB
MD5b9c4f7fa2212a5bb8fe18a0d01fdbc0c
SHA1777f250dc996c043dbb76f6bbae45561be0596d9
SHA2568e8ab9663fcf90f7ee981c2de11d8c7c520d84809620463e0dec6b048282483d
SHA51252e45bb24b4245f6b401200914194c10d568e1d4f501bf1da099b5f58060f41f70be83b1a96661614e1dfabf6213042de63dfbfdf9a29f7c81bb3926b99917b6
-
Filesize
554KB
MD5fc85aec2cfe587ff1548595e2fe23a54
SHA12ac1fa781ae1e601c3f2c7d735358868160d5437
SHA256ff7413b1c33a3abfe2d530251c6ebffc518c70dd856cb01f87166b250d21cd4e
SHA512242f5982f84a838ce6353a4585f22b97ca48e09531153c99dc7c055d5b7daa552a249fa2dce88eeb0d7779351efe76a48202192030c1bfe6ea8c77f8ff4e7dfe
-
Filesize
554KB
MD5fc85aec2cfe587ff1548595e2fe23a54
SHA12ac1fa781ae1e601c3f2c7d735358868160d5437
SHA256ff7413b1c33a3abfe2d530251c6ebffc518c70dd856cb01f87166b250d21cd4e
SHA512242f5982f84a838ce6353a4585f22b97ca48e09531153c99dc7c055d5b7daa552a249fa2dce88eeb0d7779351efe76a48202192030c1bfe6ea8c77f8ff4e7dfe
-
Filesize
347KB
MD57fafd5d9b20d443efc21abee7710df86
SHA1067f82f5704fc44403831b242515c5465bbcbf0e
SHA256b5de6bc377d047b126f3ba4cc22b337347027b18a4aa3ba491301fc3871d81cc
SHA5123b4576e965ac28c6d6480a29ffee0f8269153f8372b1e0e5fa85f62bada42bdc6980953b7236cf1688b5d8fcc000a15d5fae09f1c5b79bcee8158063b3c3ff02
-
Filesize
347KB
MD57fafd5d9b20d443efc21abee7710df86
SHA1067f82f5704fc44403831b242515c5465bbcbf0e
SHA256b5de6bc377d047b126f3ba4cc22b337347027b18a4aa3ba491301fc3871d81cc
SHA5123b4576e965ac28c6d6480a29ffee0f8269153f8372b1e0e5fa85f62bada42bdc6980953b7236cf1688b5d8fcc000a15d5fae09f1c5b79bcee8158063b3c3ff02
-
Filesize
405KB
MD561b3092fcf314ef2ccc633287f7fcd39
SHA12eac2d6f90416b357220dc1e47b3215bb7f3d757
SHA256aebfe9841e091b53e372aa1b0a188ffe33ccd8f7d3c1bd12852442484bd4bf1b
SHA5126c9c2709a56ea7bd4b6f6469ad489ac227f395791692c8679d1339f99cf7a3a045c764f104c6e48cb1ed7b6bc91cf080832ee2d25b9a7f036b0c7e7997cf1ef8
-
Filesize
405KB
MD561b3092fcf314ef2ccc633287f7fcd39
SHA12eac2d6f90416b357220dc1e47b3215bb7f3d757
SHA256aebfe9841e091b53e372aa1b0a188ffe33ccd8f7d3c1bd12852442484bd4bf1b
SHA5126c9c2709a56ea7bd4b6f6469ad489ac227f395791692c8679d1339f99cf7a3a045c764f104c6e48cb1ed7b6bc91cf080832ee2d25b9a7f036b0c7e7997cf1ef8