Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2023, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe
Resource
win10v2004-20230220-en
General
-
Target
6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe
-
Size
672KB
-
MD5
7553fea207eab95d1aeb9db3c8bb1a77
-
SHA1
c25191c981512cd04ba8ab4109a40a600ac4a6cf
-
SHA256
6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931
-
SHA512
cf28eaab86a676e4a6c6183ab942e89d0055480e745297bd8fc6a33b512684c7de6d98b683110c75310738d169a994ba5020d2697c5183fc88efa1cd737ea32d
-
SSDEEP
12288:0Mr6y9051AJnKm2Iiaesxu0UBGh7Ct6stVSNomHZ+YZ52Fp9d0dVy:WyCAJKm0ae70FVM6kuoRqm7i8
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9442.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9442.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9442.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9442.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9442.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9442.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/220-196-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-195-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-198-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-200-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-202-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-204-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-206-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-208-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-210-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-212-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-214-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-216-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-218-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-220-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-222-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-224-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-226-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/220-228-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4220 un939683.exe 408 pro9442.exe 220 qu0970.exe 872 si146350.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9442.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9442.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un939683.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un939683.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2548 408 WerFault.exe 85 3932 220 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 408 pro9442.exe 408 pro9442.exe 220 qu0970.exe 220 qu0970.exe 872 si146350.exe 872 si146350.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 408 pro9442.exe Token: SeDebugPrivilege 220 qu0970.exe Token: SeDebugPrivilege 872 si146350.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4828 wrote to memory of 4220 4828 6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe 84 PID 4828 wrote to memory of 4220 4828 6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe 84 PID 4828 wrote to memory of 4220 4828 6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe 84 PID 4220 wrote to memory of 408 4220 un939683.exe 85 PID 4220 wrote to memory of 408 4220 un939683.exe 85 PID 4220 wrote to memory of 408 4220 un939683.exe 85 PID 4220 wrote to memory of 220 4220 un939683.exe 88 PID 4220 wrote to memory of 220 4220 un939683.exe 88 PID 4220 wrote to memory of 220 4220 un939683.exe 88 PID 4828 wrote to memory of 872 4828 6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe 92 PID 4828 wrote to memory of 872 4828 6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe 92 PID 4828 wrote to memory of 872 4828 6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe"C:\Users\Admin\AppData\Local\Temp\6e603d025639f1b9ea067b6ad14538ffbe3634e2ac4c82473689df19e3498931.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un939683.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un939683.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9442.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9442.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 408 -s 10844⤵
- Program crash
PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0970.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0970.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 13284⤵
- Program crash
PID:3932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si146350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si146350.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 408 -ip 4081⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 220 -ip 2201⤵PID:3136
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5f031eb34ddd698a2dc82280d43cd87e2
SHA1ed580e673be25151de29292719743a1761437c85
SHA2567790777cf13c01f61ff7e1ba397a7c045578ae46e4626a29416213f9dccd49c5
SHA512145acb8b996b138bdfd2458ead0a25608568e853adf862653278b595c3d74570d7d438fe0a8b52a4ba5dc30cabe41153dc53e0b1c3b569eb165739841b835324
-
Filesize
175KB
MD5f031eb34ddd698a2dc82280d43cd87e2
SHA1ed580e673be25151de29292719743a1761437c85
SHA2567790777cf13c01f61ff7e1ba397a7c045578ae46e4626a29416213f9dccd49c5
SHA512145acb8b996b138bdfd2458ead0a25608568e853adf862653278b595c3d74570d7d438fe0a8b52a4ba5dc30cabe41153dc53e0b1c3b569eb165739841b835324
-
Filesize
530KB
MD59b13fb6ca7854e48267013267d126ab8
SHA138807628f6c3b044110c28c0edc192d582a271fb
SHA2564d70bb5c99dfec43badae95bf4648d753112359b8c8a111a4a8201162f771074
SHA5128c66d1eebf9e5e447a8347c2b9f936b4a23ed7ebf9dce4b6511ab9c7927c8e2a3269400b94aef7facb768c9fc9e846bcf16f58130546c64f184f5cfc665347d7
-
Filesize
530KB
MD59b13fb6ca7854e48267013267d126ab8
SHA138807628f6c3b044110c28c0edc192d582a271fb
SHA2564d70bb5c99dfec43badae95bf4648d753112359b8c8a111a4a8201162f771074
SHA5128c66d1eebf9e5e447a8347c2b9f936b4a23ed7ebf9dce4b6511ab9c7927c8e2a3269400b94aef7facb768c9fc9e846bcf16f58130546c64f184f5cfc665347d7
-
Filesize
259KB
MD585e46d62ca27163b31dbd60fd2e69568
SHA12c753dd8d6e705e912f81feea6dd6aaf0b80c3ad
SHA2565cc8c308c595bdbb956a1593206decbe64d9d443c37880649f0151b80817d8c5
SHA512c75d8ba8b9b0dc728023fcd4066f2e714365043e37b75d2f0621da74508415d9131591961e834125c77253bc56a070aeacaa6a0026c3cf0d71aa3cf436498b7d
-
Filesize
259KB
MD585e46d62ca27163b31dbd60fd2e69568
SHA12c753dd8d6e705e912f81feea6dd6aaf0b80c3ad
SHA2565cc8c308c595bdbb956a1593206decbe64d9d443c37880649f0151b80817d8c5
SHA512c75d8ba8b9b0dc728023fcd4066f2e714365043e37b75d2f0621da74508415d9131591961e834125c77253bc56a070aeacaa6a0026c3cf0d71aa3cf436498b7d
-
Filesize
318KB
MD5501dffe4e3f2ddc052aab1b276ed414e
SHA1ba32c25a183f6755fb1fdb4f4b63362469117856
SHA25649dade739115fb18897274b8288a783a7409b0c790afda8db08eb460d8d1793c
SHA512be6c2b2354a92ab23529d45e3bf9e3b748a64cf08e22ec0565e84076803f19a294fc57680b1aee98275a3a89c1c26a5edbbb2e78d3d99bfb1a60359d3dad1a3a
-
Filesize
318KB
MD5501dffe4e3f2ddc052aab1b276ed414e
SHA1ba32c25a183f6755fb1fdb4f4b63362469117856
SHA25649dade739115fb18897274b8288a783a7409b0c790afda8db08eb460d8d1793c
SHA512be6c2b2354a92ab23529d45e3bf9e3b748a64cf08e22ec0565e84076803f19a294fc57680b1aee98275a3a89c1c26a5edbbb2e78d3d99bfb1a60359d3dad1a3a