Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe
Resource
win10v2004-20230221-en
General
-
Target
08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe
-
Size
696KB
-
MD5
86e0427e89d9c4dddd1f6755641d7cec
-
SHA1
287a2a2657add23569ab44b38ea532d36935b31b
-
SHA256
08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda
-
SHA512
6d8a13529e4bb3edd5ad30f0534c931f515e00e5de686b816755f04147a701aa84d4b1f4a7aa3d3ba5220803e56bb6ef3cbfa0158b62a45bea7f4123e87966b3
-
SSDEEP
12288:1Mr3y90XMHSDYlXn43AO+KF+M5+OGmKaDzCfpa6y+rixIxwZFV1kSZlIaZ+4u/Jq:Oy6MHSE6AO+ZM5jGmKOOhPFVwnsS3tnT
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5851.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5851.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4664-194-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-197-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-199-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-201-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-195-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-203-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-205-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-207-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-209-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-213-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-211-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-215-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-217-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-219-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-221-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-223-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-225-0x0000000007750000-0x000000000778F000-memory.dmp family_redline behavioral1/memory/4664-227-0x0000000007750000-0x000000000778F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 908 un178840.exe 1152 pro5851.exe 4664 qu8746.exe 2924 si535793.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5851.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un178840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un178840.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3832 1152 WerFault.exe 84 3824 4664 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1152 pro5851.exe 1152 pro5851.exe 4664 qu8746.exe 4664 qu8746.exe 2924 si535793.exe 2924 si535793.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1152 pro5851.exe Token: SeDebugPrivilege 4664 qu8746.exe Token: SeDebugPrivilege 2924 si535793.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3492 wrote to memory of 908 3492 08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe 83 PID 3492 wrote to memory of 908 3492 08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe 83 PID 3492 wrote to memory of 908 3492 08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe 83 PID 908 wrote to memory of 1152 908 un178840.exe 84 PID 908 wrote to memory of 1152 908 un178840.exe 84 PID 908 wrote to memory of 1152 908 un178840.exe 84 PID 908 wrote to memory of 4664 908 un178840.exe 91 PID 908 wrote to memory of 4664 908 un178840.exe 91 PID 908 wrote to memory of 4664 908 un178840.exe 91 PID 3492 wrote to memory of 2924 3492 08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe 95 PID 3492 wrote to memory of 2924 3492 08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe 95 PID 3492 wrote to memory of 2924 3492 08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe"C:\Users\Admin\AppData\Local\Temp\08938f405454ed56546c6945ce812ddccb05a5f043eb1aaafc830564b9e97fda.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178840.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5851.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5851.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 10124⤵
- Program crash
PID:3832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8746.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8746.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 13724⤵
- Program crash
PID:3824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535793.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535793.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1152 -ip 11521⤵PID:324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4664 -ip 46641⤵PID:316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD561d1c9de6638215fd2b1c947c56f4498
SHA1ce4a411be3db4170e3d3d7f811c60529e4dc4dad
SHA256ac3611c42d837220b0745da7081f778b060c0044a92dd2d7c62be7f5abb6cf5e
SHA5127a956b35e9e98221ed3e07371890253c6c7cd5670a64714d6ffa782b77492be7408373e882be0830f17500dc3950af869ae733d3b87d769a1fdeb7ca76904c3e
-
Filesize
175KB
MD561d1c9de6638215fd2b1c947c56f4498
SHA1ce4a411be3db4170e3d3d7f811c60529e4dc4dad
SHA256ac3611c42d837220b0745da7081f778b060c0044a92dd2d7c62be7f5abb6cf5e
SHA5127a956b35e9e98221ed3e07371890253c6c7cd5670a64714d6ffa782b77492be7408373e882be0830f17500dc3950af869ae733d3b87d769a1fdeb7ca76904c3e
-
Filesize
554KB
MD5171e30a4083a181ebc9a6000c4391844
SHA1f832b93c7323720c4d5d12c046712950b7d06bce
SHA256164455761846210dd797b50adffb208ba3d6e8575eaf9b2371076fe81e75455d
SHA51290ea13c7add99aba2d8f5f1c29e1e799e0e93ee8b9a7b2fdcf71d1980a778cb54ec637f517d64980c989311bbcf68dde5ec60e35d4c0320c029601f8916750f7
-
Filesize
554KB
MD5171e30a4083a181ebc9a6000c4391844
SHA1f832b93c7323720c4d5d12c046712950b7d06bce
SHA256164455761846210dd797b50adffb208ba3d6e8575eaf9b2371076fe81e75455d
SHA51290ea13c7add99aba2d8f5f1c29e1e799e0e93ee8b9a7b2fdcf71d1980a778cb54ec637f517d64980c989311bbcf68dde5ec60e35d4c0320c029601f8916750f7
-
Filesize
347KB
MD50953d2a24b0408b26fc9652e06ae644c
SHA11164270789c62a49c440751bc9cdc1624e92c677
SHA256d01833ea89b233dc92b4466395bfa1090ae1398ada7ae366df608c92eeceecf6
SHA51239f2fd6ce0e31a4fc5c4bc7d1a89033ebecd032fa37cd3fcbe99ce8faa49d9f7755f34097c770391189ab6fd4ddd90ea485ef9c6a51cfa8cbc64dfaf269cb060
-
Filesize
347KB
MD50953d2a24b0408b26fc9652e06ae644c
SHA11164270789c62a49c440751bc9cdc1624e92c677
SHA256d01833ea89b233dc92b4466395bfa1090ae1398ada7ae366df608c92eeceecf6
SHA51239f2fd6ce0e31a4fc5c4bc7d1a89033ebecd032fa37cd3fcbe99ce8faa49d9f7755f34097c770391189ab6fd4ddd90ea485ef9c6a51cfa8cbc64dfaf269cb060
-
Filesize
405KB
MD59d74ece886be5f19f552c305f7712022
SHA18ff8b1c12e6b64131be4ca7b74824238999b621c
SHA2562f678ff330e5ba40250a736d2153f9d7815725157aaf47dd5c2751002935616b
SHA51257645ee661607f6b99fbe606e85cc9d15a6f3ce608dacb8d3afb2b6921a586d6a13c69fccbc7619496e52550aa7bfebc3e6cb66e43c370c0165dd2c7b8419f26
-
Filesize
405KB
MD59d74ece886be5f19f552c305f7712022
SHA18ff8b1c12e6b64131be4ca7b74824238999b621c
SHA2562f678ff330e5ba40250a736d2153f9d7815725157aaf47dd5c2751002935616b
SHA51257645ee661607f6b99fbe606e85cc9d15a6f3ce608dacb8d3afb2b6921a586d6a13c69fccbc7619496e52550aa7bfebc3e6cb66e43c370c0165dd2c7b8419f26