Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe
Resource
win10v2004-20230220-en
General
-
Target
f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe
-
Size
531KB
-
MD5
1a14ccde94897499deea2a69c473fb01
-
SHA1
430809095604e7b0ed005f8764171132b7e409a0
-
SHA256
f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601
-
SHA512
9b5080e831e9ac1d3d13cd0101802b6a147cc6c4e4af3738e76b357377b23ee7412222776fe3d70bab56db548b40ce3436ebcded55cf44f7a65929e4a2990829
-
SSDEEP
12288:iMrIy90NQwkINmGg3NTRG7IF1ryudvJyqf5KXa/wm1blWnlCqFOrAIQx:WyOkINeRG7IF9x3Arm1bElCMgG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr093390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr093390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr093390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr093390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr093390.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr093390.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/1604-158-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-159-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-161-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-163-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-165-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-167-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-169-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-171-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-173-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-175-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-177-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-179-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-181-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-183-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-185-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-187-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-189-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-191-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-193-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-195-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-197-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-199-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-201-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-203-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-205-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-207-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-209-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-211-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-213-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-215-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-217-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-219-0x0000000002630000-0x000000000266F000-memory.dmp family_redline behavioral1/memory/1604-221-0x0000000002630000-0x000000000266F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4372 zisE6544.exe 2008 jr093390.exe 1604 ku582903.exe 2388 lr553667.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr093390.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zisE6544.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zisE6544.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 828 1604 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2008 jr093390.exe 2008 jr093390.exe 1604 ku582903.exe 1604 ku582903.exe 2388 lr553667.exe 2388 lr553667.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2008 jr093390.exe Token: SeDebugPrivilege 1604 ku582903.exe Token: SeDebugPrivilege 2388 lr553667.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1752 wrote to memory of 4372 1752 f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe 84 PID 1752 wrote to memory of 4372 1752 f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe 84 PID 1752 wrote to memory of 4372 1752 f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe 84 PID 4372 wrote to memory of 2008 4372 zisE6544.exe 85 PID 4372 wrote to memory of 2008 4372 zisE6544.exe 85 PID 4372 wrote to memory of 1604 4372 zisE6544.exe 90 PID 4372 wrote to memory of 1604 4372 zisE6544.exe 90 PID 4372 wrote to memory of 1604 4372 zisE6544.exe 90 PID 1752 wrote to memory of 2388 1752 f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe 97 PID 1752 wrote to memory of 2388 1752 f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe 97 PID 1752 wrote to memory of 2388 1752 f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe"C:\Users\Admin\AppData\Local\Temp\f21da8b6c88b0afef96c05010d10d204f2897958bf9a0c1711e0d6170afae601.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisE6544.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisE6544.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr093390.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr093390.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku582903.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku582903.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 10844⤵
- Program crash
PID:828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553667.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553667.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1604 -ip 16041⤵PID:1344
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD513a773e684ff6c9b4fe791d71898a603
SHA147587eb7f8df8ef2b426f9969f7105afc3f3e0cc
SHA256e7a16a8a44e8d790bb6650a1ebc8296c177d50cddbc6ea9bdb5e9f8d4219301a
SHA512c4f156970fd372aaba54cfa5e1eccd31448c73663f5ff5a2092ab94f4316590b269afaab285b4aa2980724bb0537f9bf585b3cf7ce95f682408f7b04e44ef6dd
-
Filesize
176KB
MD513a773e684ff6c9b4fe791d71898a603
SHA147587eb7f8df8ef2b426f9969f7105afc3f3e0cc
SHA256e7a16a8a44e8d790bb6650a1ebc8296c177d50cddbc6ea9bdb5e9f8d4219301a
SHA512c4f156970fd372aaba54cfa5e1eccd31448c73663f5ff5a2092ab94f4316590b269afaab285b4aa2980724bb0537f9bf585b3cf7ce95f682408f7b04e44ef6dd
-
Filesize
388KB
MD5d41bb93ab2d8dc2b3287de9e59fa9876
SHA1532827ce3f3b86f800ee862d3d941deb0e29b409
SHA25602014b5ee7e71bea762b043536015a6272e7cf7e9de55bff9d5720925fd44e08
SHA5120b0903e580e23c41de0cd803704da61364c47bc7cbd9811e73dcd1200238634b7b6101111285141462e7a3a251d65458fb28117e54b57589f7c5741b2e7b639f
-
Filesize
388KB
MD5d41bb93ab2d8dc2b3287de9e59fa9876
SHA1532827ce3f3b86f800ee862d3d941deb0e29b409
SHA25602014b5ee7e71bea762b043536015a6272e7cf7e9de55bff9d5720925fd44e08
SHA5120b0903e580e23c41de0cd803704da61364c47bc7cbd9811e73dcd1200238634b7b6101111285141462e7a3a251d65458fb28117e54b57589f7c5741b2e7b639f
-
Filesize
11KB
MD59b2fb0f2a58168b7b00102317d63ca91
SHA1e8d794d2f5468d330c65cb94f4a9ceb649517179
SHA25665b52bda54a208be8d1f8793809dfaf654b8f50d3fa4d976b5688c4c04717ef2
SHA5125aa5fc321c68772fb910f268143f81f274df0146e677d2de0d1c0bd1e6c4be0b791304370c2921aedf3fb30c4a4f6617be03cd7c0dc77a800928dbfc51d77252
-
Filesize
11KB
MD59b2fb0f2a58168b7b00102317d63ca91
SHA1e8d794d2f5468d330c65cb94f4a9ceb649517179
SHA25665b52bda54a208be8d1f8793809dfaf654b8f50d3fa4d976b5688c4c04717ef2
SHA5125aa5fc321c68772fb910f268143f81f274df0146e677d2de0d1c0bd1e6c4be0b791304370c2921aedf3fb30c4a4f6617be03cd7c0dc77a800928dbfc51d77252
-
Filesize
434KB
MD587de609fc861f515a2d06be8166db992
SHA1b3dae492192e33dd7b4f2277c135b24f8792fcc1
SHA2561830853de237fdace93c3641aafde641de9f4d842e050313116b0fa8ca19ca01
SHA512a025069b8ae5200fbc8c9159bcb44c050c2afd1e89ab1a5dba990f2e08a0a2d04d59a6cbc6103cd3594f962c09c97c032bc08ecfd006343b459c747fbf17f676
-
Filesize
434KB
MD587de609fc861f515a2d06be8166db992
SHA1b3dae492192e33dd7b4f2277c135b24f8792fcc1
SHA2561830853de237fdace93c3641aafde641de9f4d842e050313116b0fa8ca19ca01
SHA512a025069b8ae5200fbc8c9159bcb44c050c2afd1e89ab1a5dba990f2e08a0a2d04d59a6cbc6103cd3594f962c09c97c032bc08ecfd006343b459c747fbf17f676