Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe
Resource
win10v2004-20230220-en
General
-
Target
3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe
-
Size
529KB
-
MD5
3fa0829a943bc10f93ce0e8f4aa01e3d
-
SHA1
0db1ac3e5aa156f79a8963a5ba38d4d52077ff15
-
SHA256
3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da
-
SHA512
c356e2f6f2f0bca273ecc6649f4d0e2e85c6d269e737341b4906394a1583ff2fad04d62f5e1e4424ef3450e9d22aae084f07c3dada89f025ac08da2a23c3adcc
-
SSDEEP
12288:eMrEy902HRyawK05Qalg0eqESBJgo0Q9c0zmySwPDIvX6P:myTh053lg0t/IeSRiP
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr260645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr260645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr260645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr260645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr260645.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr260645.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/264-159-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-161-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-171-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-181-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-183-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-179-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-191-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-203-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-217-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-219-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-221-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-215-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-213-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-211-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-209-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-207-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-205-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-201-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-199-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-197-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-195-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-193-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-189-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-187-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-185-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-177-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-175-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-173-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-169-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-167-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-165-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-163-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline behavioral1/memory/264-158-0x0000000004B30000-0x0000000004B6F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1392 zipb8734.exe 1992 jr260645.exe 264 ku753543.exe 1656 lr526344.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr260645.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zipb8734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipb8734.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1280 264 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1992 jr260645.exe 1992 jr260645.exe 264 ku753543.exe 264 ku753543.exe 1656 lr526344.exe 1656 lr526344.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1992 jr260645.exe Token: SeDebugPrivilege 264 ku753543.exe Token: SeDebugPrivilege 1656 lr526344.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1392 2160 3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe 85 PID 2160 wrote to memory of 1392 2160 3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe 85 PID 2160 wrote to memory of 1392 2160 3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe 85 PID 1392 wrote to memory of 1992 1392 zipb8734.exe 86 PID 1392 wrote to memory of 1992 1392 zipb8734.exe 86 PID 1392 wrote to memory of 264 1392 zipb8734.exe 89 PID 1392 wrote to memory of 264 1392 zipb8734.exe 89 PID 1392 wrote to memory of 264 1392 zipb8734.exe 89 PID 2160 wrote to memory of 1656 2160 3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe 93 PID 2160 wrote to memory of 1656 2160 3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe 93 PID 2160 wrote to memory of 1656 2160 3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe"C:\Users\Admin\AppData\Local\Temp\3a06e2e4461153ce6b678f9768d7de7a0de51fc7f9cc95bb7cc0c489a5c586da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipb8734.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipb8734.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr260645.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr260645.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku753543.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku753543.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 13364⤵
- Program crash
PID:1280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr526344.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr526344.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 264 -ip 2641⤵PID:4808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD57871de06338154e2ca3ef5dfa9a93eb5
SHA100212ec7b50e1d546d92c255a989e94aa5e4d490
SHA256733d14924eeb676e0e7f44e6fc618a35d8bcf122f9453e341a70757a6f38bcf8
SHA5128a59a41a24903f80845fc802d8b24566cc36498aa170117e4dcf0030fa592d2d6c4bf8b633fc9f8000879c86991800d037123db5a35ba131341c24dcc84cf690
-
Filesize
176KB
MD57871de06338154e2ca3ef5dfa9a93eb5
SHA100212ec7b50e1d546d92c255a989e94aa5e4d490
SHA256733d14924eeb676e0e7f44e6fc618a35d8bcf122f9453e341a70757a6f38bcf8
SHA5128a59a41a24903f80845fc802d8b24566cc36498aa170117e4dcf0030fa592d2d6c4bf8b633fc9f8000879c86991800d037123db5a35ba131341c24dcc84cf690
-
Filesize
387KB
MD51bad8fb305dd5f79b335f2a5e8a77162
SHA14645bdf331222774f66fef1b2a6bdeb3b8c4227c
SHA25645e348430daebdea869751f789e24309ba0fecfad9eb8e54be1c4aa7781c3d3e
SHA512f5cc446a5d60c4a55ed2d19993a1e8354b815aa65b6ed83af175b16b08a223f299bb62854968671c2eb00b3ecb8dbfbc35ed6ffa752b2b422935e2610dc2f5be
-
Filesize
387KB
MD51bad8fb305dd5f79b335f2a5e8a77162
SHA14645bdf331222774f66fef1b2a6bdeb3b8c4227c
SHA25645e348430daebdea869751f789e24309ba0fecfad9eb8e54be1c4aa7781c3d3e
SHA512f5cc446a5d60c4a55ed2d19993a1e8354b815aa65b6ed83af175b16b08a223f299bb62854968671c2eb00b3ecb8dbfbc35ed6ffa752b2b422935e2610dc2f5be
-
Filesize
12KB
MD5043a8b533e230bd63bc256e67bd5eec9
SHA1312cb24d443c3ee952d0b77a854029ecfade190d
SHA25643d695677f76daa84dcbe4863620cc726d02fed68dc2fe2363b442abca418e04
SHA5125cc71ca268532d5ee3b49d7f5e5c21c24e3681951dd8ae7ddff205d43e9dae0b4cd3ac80702937c31f8b8c59afc4da1200030f5d92c9407dc46a095e3255ac9b
-
Filesize
12KB
MD5043a8b533e230bd63bc256e67bd5eec9
SHA1312cb24d443c3ee952d0b77a854029ecfade190d
SHA25643d695677f76daa84dcbe4863620cc726d02fed68dc2fe2363b442abca418e04
SHA5125cc71ca268532d5ee3b49d7f5e5c21c24e3681951dd8ae7ddff205d43e9dae0b4cd3ac80702937c31f8b8c59afc4da1200030f5d92c9407dc46a095e3255ac9b
-
Filesize
342KB
MD5333699e889064107c037d0141e3d1f69
SHA16f23e2b0d4477db57c488fd41bcda8de3173363d
SHA2563fc6a28bcf459704e0026c7ba056ef703f1ce0d5a348bb010c6771e0f623a4a9
SHA51208e8044c8a8bf3f2c00e398ee0f8e9ee84ed468d7b3138bb1c039492f39d7a422cedca4d725426c1273cd1ea1057d8c021d945b4acbf672aa287a4a2d5838335
-
Filesize
342KB
MD5333699e889064107c037d0141e3d1f69
SHA16f23e2b0d4477db57c488fd41bcda8de3173363d
SHA2563fc6a28bcf459704e0026c7ba056ef703f1ce0d5a348bb010c6771e0f623a4a9
SHA51208e8044c8a8bf3f2c00e398ee0f8e9ee84ed468d7b3138bb1c039492f39d7a422cedca4d725426c1273cd1ea1057d8c021d945b4acbf672aa287a4a2d5838335