Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe
Resource
win10v2004-20230220-en
General
-
Target
dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe
-
Size
531KB
-
MD5
b1507b9cd0b170821cc2d6fe2c4097f6
-
SHA1
0d8f3e577b46a3a7610143c8468a71cce2ddbb2a
-
SHA256
dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc
-
SHA512
eddd5852660bfdfad12da438a83b554858586a06e2abf39f57b519aa46d8be9ac3bfb379826a6ea8d8b1d8f3e21dcb4b67557c0233229ff02dc3c7e09b977134
-
SSDEEP
12288:wMrqy90+sXdSt/S3oPbjJmv51oV1kfwPa57+DD/:KyyXddoPbEM1a7I
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr682944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr682944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr682944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr682944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr682944.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr682944.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/492-158-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-159-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-161-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-163-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-165-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-167-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-169-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-171-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-173-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-175-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-177-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-179-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-181-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-183-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-185-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-187-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-189-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-191-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-193-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-195-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-197-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-199-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-201-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-203-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-205-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-207-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-209-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-211-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-213-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-215-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-217-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-219-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/492-221-0x0000000007150000-0x000000000718F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1924 ziet8081.exe 652 jr682944.exe 492 ku381639.exe 2452 lr451204.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr682944.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziet8081.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziet8081.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4840 492 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 652 jr682944.exe 652 jr682944.exe 492 ku381639.exe 492 ku381639.exe 2452 lr451204.exe 2452 lr451204.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 652 jr682944.exe Token: SeDebugPrivilege 492 ku381639.exe Token: SeDebugPrivilege 2452 lr451204.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1924 5048 dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe 83 PID 5048 wrote to memory of 1924 5048 dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe 83 PID 5048 wrote to memory of 1924 5048 dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe 83 PID 1924 wrote to memory of 652 1924 ziet8081.exe 84 PID 1924 wrote to memory of 652 1924 ziet8081.exe 84 PID 1924 wrote to memory of 492 1924 ziet8081.exe 85 PID 1924 wrote to memory of 492 1924 ziet8081.exe 85 PID 1924 wrote to memory of 492 1924 ziet8081.exe 85 PID 5048 wrote to memory of 2452 5048 dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe 91 PID 5048 wrote to memory of 2452 5048 dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe 91 PID 5048 wrote to memory of 2452 5048 dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe"C:\Users\Admin\AppData\Local\Temp\dcf054e345dd8f426fbf7c1d6b00bd6d545b9ab21241ecfa25197bee992377fc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziet8081.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziet8081.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr682944.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr682944.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku381639.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku381639.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 492 -s 18964⤵
- Program crash
PID:4840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr451204.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr451204.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 492 -ip 4921⤵PID:1952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5f31e43e77eec0ee82027897b8cf8e2c6
SHA1ec5b20827e2d5fdadab3cb595ed7cd5bd4e6f673
SHA256c4aea6f251ecba22e41ed4ae684da6d290bda48254ac718a8c9e64940df4e30e
SHA5129ec406087572d4736d14d97b32baf13fc6680ad78c2deca81a1a940034046d30efdf414d97418d0bb8503d3aa2b0d1142e41673a196f539d9a99aac84cbfa1e5
-
Filesize
176KB
MD5f31e43e77eec0ee82027897b8cf8e2c6
SHA1ec5b20827e2d5fdadab3cb595ed7cd5bd4e6f673
SHA256c4aea6f251ecba22e41ed4ae684da6d290bda48254ac718a8c9e64940df4e30e
SHA5129ec406087572d4736d14d97b32baf13fc6680ad78c2deca81a1a940034046d30efdf414d97418d0bb8503d3aa2b0d1142e41673a196f539d9a99aac84cbfa1e5
-
Filesize
389KB
MD5fef77f81a9b4f01240c6e839fd580991
SHA1595d57c811154c56269dd382f532bb4d05cb3310
SHA256dbcea9081a82afa6be1ff9adfe658fce599e059e09f28df410edde574fbeabff
SHA512f70246267f33041b7713da040826e8daa4d81d417402fca496d42309c1dcc1287d8dbce9c68f86b35e81e631e6b6142fded32adf393fc09ae712ae1d18aa6d96
-
Filesize
389KB
MD5fef77f81a9b4f01240c6e839fd580991
SHA1595d57c811154c56269dd382f532bb4d05cb3310
SHA256dbcea9081a82afa6be1ff9adfe658fce599e059e09f28df410edde574fbeabff
SHA512f70246267f33041b7713da040826e8daa4d81d417402fca496d42309c1dcc1287d8dbce9c68f86b35e81e631e6b6142fded32adf393fc09ae712ae1d18aa6d96
-
Filesize
12KB
MD5a4cb641215ee47f285df25acd5b70c9c
SHA123787c6cfb129c3bd069d8867817e4d4d2754f7d
SHA256088939fcce9169cb72794761fc0fd4968c1ca833d969563e60dacaef430496bf
SHA512a22f3a3861b84bb57538ae7256138dfb2b49c9e583bd566fd68cd953166e78429eb4892f5ad3f17b34e9c0397a67c3ff6c421553798e56eac25d44e63f501443
-
Filesize
12KB
MD5a4cb641215ee47f285df25acd5b70c9c
SHA123787c6cfb129c3bd069d8867817e4d4d2754f7d
SHA256088939fcce9169cb72794761fc0fd4968c1ca833d969563e60dacaef430496bf
SHA512a22f3a3861b84bb57538ae7256138dfb2b49c9e583bd566fd68cd953166e78429eb4892f5ad3f17b34e9c0397a67c3ff6c421553798e56eac25d44e63f501443
-
Filesize
355KB
MD55f47c92883cf6a14a8e15c6c4bd31ae3
SHA1cb924fbf5008c17fad5d2e32ff74d651528c1995
SHA2561482a956fa86f7347ab115daf1444fa45852cdf577bd9cb5ca5ac22e898568ad
SHA5128d00ed8e21fe8509eb665d9b37997c531f28951b3e330b419c66a20ac97d3737e57c96fec8e6e850823a5c3fddf7b3eafe97d2203e0e0e54548ba35d7c5db783
-
Filesize
355KB
MD55f47c92883cf6a14a8e15c6c4bd31ae3
SHA1cb924fbf5008c17fad5d2e32ff74d651528c1995
SHA2561482a956fa86f7347ab115daf1444fa45852cdf577bd9cb5ca5ac22e898568ad
SHA5128d00ed8e21fe8509eb665d9b37997c531f28951b3e330b419c66a20ac97d3737e57c96fec8e6e850823a5c3fddf7b3eafe97d2203e0e0e54548ba35d7c5db783