Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
83s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe
Resource
win10v2004-20230220-en
General
-
Target
85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe
-
Size
530KB
-
MD5
01c83ac04fa104185716363a56582821
-
SHA1
7ff01036dbcbc9496578265625fb662fd99a59e8
-
SHA256
85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a
-
SHA512
ddb05b45f2be33b96673e6f66646d7ed767a6186218a6cfaca9e9fcf187bc92fed20172c53deb861c5fa977f6d752871d85d8df81f5a7f416760c7354aa53bb8
-
SSDEEP
12288:+Mrky90/N19cO40N1pHJ3FNC16ad+E8qxCyMrM/naM2:+ys1KOt1phmwad+E8gnSM2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr405777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr405777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr405777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr405777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr405777.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr405777.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3588-158-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-161-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-163-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-159-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-165-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-167-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-169-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-171-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-173-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-175-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-177-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-179-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-181-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-183-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-185-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-187-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-189-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-191-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-193-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-195-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-197-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-199-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-201-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-203-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-205-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-207-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-209-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-211-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-213-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-217-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-215-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-219-0x0000000007700000-0x000000000773F000-memory.dmp family_redline behavioral1/memory/3588-221-0x0000000007700000-0x000000000773F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5032 zivc5235.exe 4944 jr405777.exe 3588 ku392826.exe 4236 lr961669.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr405777.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivc5235.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zivc5235.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4336 3588 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4944 jr405777.exe 4944 jr405777.exe 3588 ku392826.exe 3588 ku392826.exe 4236 lr961669.exe 4236 lr961669.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4944 jr405777.exe Token: SeDebugPrivilege 3588 ku392826.exe Token: SeDebugPrivilege 4236 lr961669.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4476 wrote to memory of 5032 4476 85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe 82 PID 4476 wrote to memory of 5032 4476 85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe 82 PID 4476 wrote to memory of 5032 4476 85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe 82 PID 5032 wrote to memory of 4944 5032 zivc5235.exe 83 PID 5032 wrote to memory of 4944 5032 zivc5235.exe 83 PID 5032 wrote to memory of 3588 5032 zivc5235.exe 88 PID 5032 wrote to memory of 3588 5032 zivc5235.exe 88 PID 5032 wrote to memory of 3588 5032 zivc5235.exe 88 PID 4476 wrote to memory of 4236 4476 85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe 94 PID 4476 wrote to memory of 4236 4476 85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe 94 PID 4476 wrote to memory of 4236 4476 85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe"C:\Users\Admin\AppData\Local\Temp\85cff0e6d9a5d8d15f587109714283b46a352cf3cb96bc027a635bbc800a5f5a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivc5235.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivc5235.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr405777.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr405777.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku392826.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku392826.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 19204⤵
- Program crash
PID:4336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr961669.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr961669.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3588 -ip 35881⤵PID:4520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5954879dea7b3bac8c04435f7331f3992
SHA1962446d46570828be23d05515e4330d22a3b6574
SHA25683387448ea33dd40dc819527c9734e0bcb6bd3971dd6685762db947bb44a9b05
SHA512511414dbd9a9e0b5d0a1289833e81f9edb7d9b27fb2b144d9d87d860f528b3a78cbf61ed13dec11b0dcd3bd765af9360eac45ed440106f63725d407893976220
-
Filesize
176KB
MD5954879dea7b3bac8c04435f7331f3992
SHA1962446d46570828be23d05515e4330d22a3b6574
SHA25683387448ea33dd40dc819527c9734e0bcb6bd3971dd6685762db947bb44a9b05
SHA512511414dbd9a9e0b5d0a1289833e81f9edb7d9b27fb2b144d9d87d860f528b3a78cbf61ed13dec11b0dcd3bd765af9360eac45ed440106f63725d407893976220
-
Filesize
388KB
MD5ccc7af0d8643acf7ebd801eedc05088d
SHA1808fb0caee41a7b85b6718a9d875f883553a0239
SHA256d1ccac4afdd362345e9384a92f79dc04d1d42ba2efe2ac49904dd715fe53f3ab
SHA51218f9b57048153bfa3496cf8d8c0bac7b4af588ad7f55849f4067459495b363f64c2fe1e344074b99a324658c56b470790729503f1e12f676df7f210801e80526
-
Filesize
388KB
MD5ccc7af0d8643acf7ebd801eedc05088d
SHA1808fb0caee41a7b85b6718a9d875f883553a0239
SHA256d1ccac4afdd362345e9384a92f79dc04d1d42ba2efe2ac49904dd715fe53f3ab
SHA51218f9b57048153bfa3496cf8d8c0bac7b4af588ad7f55849f4067459495b363f64c2fe1e344074b99a324658c56b470790729503f1e12f676df7f210801e80526
-
Filesize
11KB
MD54a1d105aeb13dfd1d708aca14eaa6a27
SHA15cf7fbb733122a2dc5703aec669d8984e4b39037
SHA2569401af04463ec437a18cab091e4611ca085448c882f002f01d96c41c9e807512
SHA512cd48b32b6802fc5d985f25b21ce07a65ff3f4dfe07a618a8c39f249801de3b62c5d5d80b60e50a2ac26031ea877155836fb70d122a2bd4a6d2b08e67fa2592f7
-
Filesize
11KB
MD54a1d105aeb13dfd1d708aca14eaa6a27
SHA15cf7fbb733122a2dc5703aec669d8984e4b39037
SHA2569401af04463ec437a18cab091e4611ca085448c882f002f01d96c41c9e807512
SHA512cd48b32b6802fc5d985f25b21ce07a65ff3f4dfe07a618a8c39f249801de3b62c5d5d80b60e50a2ac26031ea877155836fb70d122a2bd4a6d2b08e67fa2592f7
-
Filesize
354KB
MD5872c128705af3c0f0653ee9eb240b7f0
SHA15634cd711010110021bd9774b33ea02aafeb8d12
SHA256047e794c09e7a4e7641574373a003bdd135ecb533b854464756e70f6dc46d557
SHA5128122eeb3327925934a5fd226eac98de09cabda7b9fef6f9ede4ed304b673015300e535979f9e75985b9130b52ce931701f446a4e9ae4565ec5a2f6c9818f1ba8
-
Filesize
354KB
MD5872c128705af3c0f0653ee9eb240b7f0
SHA15634cd711010110021bd9774b33ea02aafeb8d12
SHA256047e794c09e7a4e7641574373a003bdd135ecb533b854464756e70f6dc46d557
SHA5128122eeb3327925934a5fd226eac98de09cabda7b9fef6f9ede4ed304b673015300e535979f9e75985b9130b52ce931701f446a4e9ae4565ec5a2f6c9818f1ba8