Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
106s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2023, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe
Resource
win10v2004-20230221-en
General
-
Target
1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe
-
Size
674KB
-
MD5
741980ed3bdb4aaaa6adcf532c7f7f94
-
SHA1
e6959287f0e78c0d92de627515bba877437f383b
-
SHA256
1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f
-
SHA512
c16c5b648e672fcde1c9272d8e3d88a0fd2520db30352383421aaa33d7271e6da2535931ad9a43afc8cb9da9dacbc43e941e4353a5449b807602be2b2cb897a8
-
SSDEEP
12288:IMrEy90q0/3JLb139mdmkIXWglBgF4j/De8EObmrWmY4TnlI/yXzq:cyPaJlNmmnGgLgF42obx14Lm/yG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2983.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2983.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1460-191-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-192-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-194-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-196-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-198-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-200-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-202-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-206-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-208-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-204-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-210-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-212-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-214-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-216-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-221-0x0000000004B90000-0x0000000004BA0000-memory.dmp family_redline behavioral1/memory/1460-224-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-220-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-226-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline behavioral1/memory/1460-228-0x0000000004A60000-0x0000000004A9F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4664 un200601.exe 4976 pro2983.exe 1460 qu2782.exe 3460 si643772.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2983.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un200601.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un200601.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2968 4976 WerFault.exe 84 3268 1460 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4976 pro2983.exe 4976 pro2983.exe 1460 qu2782.exe 1460 qu2782.exe 3460 si643772.exe 3460 si643772.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4976 pro2983.exe Token: SeDebugPrivilege 1460 qu2782.exe Token: SeDebugPrivilege 3460 si643772.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2100 wrote to memory of 4664 2100 1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe 83 PID 2100 wrote to memory of 4664 2100 1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe 83 PID 2100 wrote to memory of 4664 2100 1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe 83 PID 4664 wrote to memory of 4976 4664 un200601.exe 84 PID 4664 wrote to memory of 4976 4664 un200601.exe 84 PID 4664 wrote to memory of 4976 4664 un200601.exe 84 PID 4664 wrote to memory of 1460 4664 un200601.exe 88 PID 4664 wrote to memory of 1460 4664 un200601.exe 88 PID 4664 wrote to memory of 1460 4664 un200601.exe 88 PID 2100 wrote to memory of 3460 2100 1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe 91 PID 2100 wrote to memory of 3460 2100 1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe 91 PID 2100 wrote to memory of 3460 2100 1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe"C:\Users\Admin\AppData\Local\Temp\1b3292fa8ebc8c0e23addc160870f68460c20d6deae3340a9d0fdec588ef6b1f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un200601.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un200601.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2983.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2983.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 10804⤵
- Program crash
PID:2968
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2782.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2782.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 14604⤵
- Program crash
PID:3268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si643772.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si643772.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4976 -ip 49761⤵PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1460 -ip 14601⤵PID:1204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bb1d8d8052bf8bbb3b6652b2c4a44b3d
SHA1970c7855d9ec2e1472922ebc28cbac063be1d07e
SHA2565afed2bd4becd813ec6259794fe82dee4b2ba3474c24c291681131e8fa5c278b
SHA5123eb8cacf21fd67f89dfcbab1311748bba33d7651efaa8f77cf3e4c51f6dedd5f886b320c1abc78b0591ca3a0d3053ebb0a5435b79edfaa330f3d50b1a02c01dd
-
Filesize
175KB
MD5bb1d8d8052bf8bbb3b6652b2c4a44b3d
SHA1970c7855d9ec2e1472922ebc28cbac063be1d07e
SHA2565afed2bd4becd813ec6259794fe82dee4b2ba3474c24c291681131e8fa5c278b
SHA5123eb8cacf21fd67f89dfcbab1311748bba33d7651efaa8f77cf3e4c51f6dedd5f886b320c1abc78b0591ca3a0d3053ebb0a5435b79edfaa330f3d50b1a02c01dd
-
Filesize
531KB
MD5fa58cd4d80bfe0caca255c0f65a0e710
SHA1bfab9c6dfc0ee53c53c7fd4bee3c6c5f50f4b784
SHA2564f5da6cb417895d18239c322acb77ab90ce49ba9723d138d4e81e0f61537016b
SHA51238df8a78d90d84c0df6fd5cda8369c9483c542df10f94d6ed7a8c75c754d7c081007e56e6699020e9f1b427016ef68ad2cf3138c5eba2139777c4ba2e5345a5d
-
Filesize
531KB
MD5fa58cd4d80bfe0caca255c0f65a0e710
SHA1bfab9c6dfc0ee53c53c7fd4bee3c6c5f50f4b784
SHA2564f5da6cb417895d18239c322acb77ab90ce49ba9723d138d4e81e0f61537016b
SHA51238df8a78d90d84c0df6fd5cda8369c9483c542df10f94d6ed7a8c75c754d7c081007e56e6699020e9f1b427016ef68ad2cf3138c5eba2139777c4ba2e5345a5d
-
Filesize
260KB
MD53529dfd63a48bc115fde7917fdf95442
SHA14db062d4c42043d2b58412b1f6e2f822787f4d7d
SHA256d1d596c6d87ea7657a12feddedffe5e84dc4a6bde4b99d9d23c4eb49ad7d1606
SHA512fc8b32d341a7077f64c5020177bbcd35b941c5d98edef96685069def77cedd3933b3a4e8b766cf939ea695b805bed1b4796ebf644fbdd72d8ec51f1f22dd9c05
-
Filesize
260KB
MD53529dfd63a48bc115fde7917fdf95442
SHA14db062d4c42043d2b58412b1f6e2f822787f4d7d
SHA256d1d596c6d87ea7657a12feddedffe5e84dc4a6bde4b99d9d23c4eb49ad7d1606
SHA512fc8b32d341a7077f64c5020177bbcd35b941c5d98edef96685069def77cedd3933b3a4e8b766cf939ea695b805bed1b4796ebf644fbdd72d8ec51f1f22dd9c05
-
Filesize
318KB
MD5037d2ba77e06de1de5ed3b259eb9d019
SHA1e91b5194b08f5edf1e1bd615661d5f2a7292f256
SHA25662a21b101e7f036c3a6c59dd19734fe268476eba85bb8ab87ccf6e30ba5b2d87
SHA512a3ae788424e083537750aab03d43f731008372d3338747fdb71142b90b0b4a852e12a0bf3b7a14b74520337f9351a65435150d235363ab533487031af0c6498d
-
Filesize
318KB
MD5037d2ba77e06de1de5ed3b259eb9d019
SHA1e91b5194b08f5edf1e1bd615661d5f2a7292f256
SHA25662a21b101e7f036c3a6c59dd19734fe268476eba85bb8ab87ccf6e30ba5b2d87
SHA512a3ae788424e083537750aab03d43f731008372d3338747fdb71142b90b0b4a852e12a0bf3b7a14b74520337f9351a65435150d235363ab533487031af0c6498d