Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe
Resource
win10v2004-20230220-en
General
-
Target
c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe
-
Size
695KB
-
MD5
1246c40d4288a87c0ff60c787b63c0dc
-
SHA1
1cb5a778f8b56dd9b04be931cd405b6191162ac4
-
SHA256
c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71
-
SHA512
e80e1800ed5dee46276f0e66140af2ec3ce754b1c20792ff09fc9ffedb04cef622cdd7a251bb0b4b4030ecd322f03a8862a939f9de3f23b0d6ebeed8578a899e
-
SSDEEP
12288:6Mrjy90iJEFqEiBilkvahiWurr+22LCmQhAemqxVOY/Jl1DvtoGIEfw:BylBXahFuX+KBqbqaYZq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
muse
176.113.115.145:4125
-
auth_value
b91988a63a24940038d9262827a5320c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5355.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5355.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4188-195-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-196-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-198-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-200-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-202-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-204-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-206-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-208-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-210-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-212-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-214-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-216-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-218-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-220-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-222-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-224-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-226-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4188-228-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2940 un466056.exe 1308 pro5355.exe 4188 qu9559.exe 528 si625251.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5355.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un466056.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un466056.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3872 1308 WerFault.exe 84 4632 4188 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1308 pro5355.exe 1308 pro5355.exe 4188 qu9559.exe 4188 qu9559.exe 528 si625251.exe 528 si625251.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1308 pro5355.exe Token: SeDebugPrivilege 4188 qu9559.exe Token: SeDebugPrivilege 528 si625251.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5012 wrote to memory of 2940 5012 c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe 83 PID 5012 wrote to memory of 2940 5012 c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe 83 PID 5012 wrote to memory of 2940 5012 c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe 83 PID 2940 wrote to memory of 1308 2940 un466056.exe 84 PID 2940 wrote to memory of 1308 2940 un466056.exe 84 PID 2940 wrote to memory of 1308 2940 un466056.exe 84 PID 2940 wrote to memory of 4188 2940 un466056.exe 91 PID 2940 wrote to memory of 4188 2940 un466056.exe 91 PID 2940 wrote to memory of 4188 2940 un466056.exe 91 PID 5012 wrote to memory of 528 5012 c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe 95 PID 5012 wrote to memory of 528 5012 c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe 95 PID 5012 wrote to memory of 528 5012 c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe"C:\Users\Admin\AppData\Local\Temp\c1c7d26c918812b63a67a9d525f987dccd525da73501eb17ce6776bbc056ce71.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un466056.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un466056.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5355.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5355.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 10844⤵
- Program crash
PID:3872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9559.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9559.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 13524⤵
- Program crash
PID:4632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625251.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625251.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1308 -ip 13081⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4188 -ip 41881⤵PID:3032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58b8a8959b48a1d5d858c63abfbe9bc67
SHA1775adab7d7c13cf0d1631a6d2c1143c0648e736f
SHA256d82c1e65d408f895ae1812bb4efb80e2bd88bed8eb704aad90afd5bead7639d7
SHA512359071ce8aadbf0220a37813781c63048e4f5ede463a7017373b8e61be11f0a4bdfdeaa74bd5f5bf3044e8fedb7298fa78d502f74e340e6eb30598dd939aa82b
-
Filesize
175KB
MD58b8a8959b48a1d5d858c63abfbe9bc67
SHA1775adab7d7c13cf0d1631a6d2c1143c0648e736f
SHA256d82c1e65d408f895ae1812bb4efb80e2bd88bed8eb704aad90afd5bead7639d7
SHA512359071ce8aadbf0220a37813781c63048e4f5ede463a7017373b8e61be11f0a4bdfdeaa74bd5f5bf3044e8fedb7298fa78d502f74e340e6eb30598dd939aa82b
-
Filesize
553KB
MD5b93a7b8f848e62e8fd60efa825e547c7
SHA1e5527722ea5a34f9053c34d550efd351fb2a78b8
SHA256cfc2f46ca41505ac006f8ed1900978c76557e1187b407e6c8bff07cd30a697c7
SHA51233b1ef92a2e1b36f8bc923444f3613fceac817f0a31f076d614d641636391747ec9bdca3347c50b808bb17ac1828ccde9f267558064169c357002dbf3db06f03
-
Filesize
553KB
MD5b93a7b8f848e62e8fd60efa825e547c7
SHA1e5527722ea5a34f9053c34d550efd351fb2a78b8
SHA256cfc2f46ca41505ac006f8ed1900978c76557e1187b407e6c8bff07cd30a697c7
SHA51233b1ef92a2e1b36f8bc923444f3613fceac817f0a31f076d614d641636391747ec9bdca3347c50b808bb17ac1828ccde9f267558064169c357002dbf3db06f03
-
Filesize
345KB
MD573fc95fdaf42cb2b1b296e0385eb5f81
SHA16a4997602f238ee00d3dc8092176df442b59e133
SHA256478aa6371a562b642cbfff7be1fe8b867998b6c0c6be093190724c46923d2cb0
SHA51263bdebf648717a9e04bc88ffc7adf48cd4c85b756d6732bbeaba80f5ca1027f0c6f8460d36d313c38c41affedf77644c5945f2503be9fb233d7852cd40c22142
-
Filesize
345KB
MD573fc95fdaf42cb2b1b296e0385eb5f81
SHA16a4997602f238ee00d3dc8092176df442b59e133
SHA256478aa6371a562b642cbfff7be1fe8b867998b6c0c6be093190724c46923d2cb0
SHA51263bdebf648717a9e04bc88ffc7adf48cd4c85b756d6732bbeaba80f5ca1027f0c6f8460d36d313c38c41affedf77644c5945f2503be9fb233d7852cd40c22142
-
Filesize
403KB
MD5d0ba59c7b7c84e7cb811cb3d0c93b22e
SHA184ec16f96fd000a77463730a3762c5ddd90364f7
SHA25683710ec608341f68992a2280a3fc82657d13663a1ec45fabf5542ee49e61985d
SHA512d053b98f0ef14cbde96d0e9d83f83356a7947ca02e67c68ae24f957c95178392613edf803ec03eb48f649bdaffd9e5d5f68789056c1669d2017c1d08580b0af8
-
Filesize
403KB
MD5d0ba59c7b7c84e7cb811cb3d0c93b22e
SHA184ec16f96fd000a77463730a3762c5ddd90364f7
SHA25683710ec608341f68992a2280a3fc82657d13663a1ec45fabf5542ee49e61985d
SHA512d053b98f0ef14cbde96d0e9d83f83356a7947ca02e67c68ae24f957c95178392613edf803ec03eb48f649bdaffd9e5d5f68789056c1669d2017c1d08580b0af8