Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe
Resource
win10v2004-20230221-en
General
-
Target
18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe
-
Size
530KB
-
MD5
a7aa0da9b0d5f4f9ae4422bedfb85ff2
-
SHA1
ffaa2e1b47508b0403a5ac9e35fda09dfb3927a4
-
SHA256
18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85
-
SHA512
6b34351acd4e3e14b3e53bd57eceae340318c7e3dc44d73e2b7c76b5daddd3b93b082018ac28bd5de8ce6fff503c611cf89aba3610dd0d85ad4218a8220079e9
-
SSDEEP
12288:KMrZy90m2ig/f+demCgtjPehT9Aijv5VnJdF/oA:/yc+Bptu9AijBVuA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr951028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr951028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr951028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr951028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr951028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr951028.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4340-158-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-161-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-159-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-163-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-165-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-167-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-169-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-171-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-173-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-175-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-177-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-179-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-181-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-183-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-185-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-187-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-189-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-191-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-193-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-195-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-197-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-199-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-201-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-203-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-205-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-207-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-209-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-211-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-213-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-215-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-217-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-219-0x0000000007130000-0x000000000716F000-memory.dmp family_redline behavioral1/memory/4340-221-0x0000000007130000-0x000000000716F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4404 ziGG4145.exe 3848 jr951028.exe 4340 ku005015.exe 2808 lr086789.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr951028.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziGG4145.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziGG4145.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4604 4340 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3848 jr951028.exe 3848 jr951028.exe 4340 ku005015.exe 4340 ku005015.exe 2808 lr086789.exe 2808 lr086789.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3848 jr951028.exe Token: SeDebugPrivilege 4340 ku005015.exe Token: SeDebugPrivilege 2808 lr086789.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 392 wrote to memory of 4404 392 18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe 86 PID 392 wrote to memory of 4404 392 18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe 86 PID 392 wrote to memory of 4404 392 18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe 86 PID 4404 wrote to memory of 3848 4404 ziGG4145.exe 87 PID 4404 wrote to memory of 3848 4404 ziGG4145.exe 87 PID 4404 wrote to memory of 4340 4404 ziGG4145.exe 88 PID 4404 wrote to memory of 4340 4404 ziGG4145.exe 88 PID 4404 wrote to memory of 4340 4404 ziGG4145.exe 88 PID 392 wrote to memory of 2808 392 18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe 92 PID 392 wrote to memory of 2808 392 18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe 92 PID 392 wrote to memory of 2808 392 18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe"C:\Users\Admin\AppData\Local\Temp\18c8106040df086ceae6d8c5a9c37ebef4cbc751df8511074b1cb89722c9cd85.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGG4145.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGG4145.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr951028.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr951028.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku005015.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku005015.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 19204⤵
- Program crash
PID:4604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr086789.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr086789.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4340 -ip 43401⤵PID:4708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5be8df8ae835624cfe4922352f7719058
SHA192be69c54956200d41f9e97c69952463d826744a
SHA2566b5bbef61a2369448a918979428c77695c567df4dde01aa4bcbcf59d554bc69b
SHA512d308fae0bee81544dac0639aa54e15ce7f80b04afae6b13b44e6685dda80a06db57687139f245331115aa3bf77389e6fa9d122d8e707c3ddef999c24f7e0b6e3
-
Filesize
175KB
MD5be8df8ae835624cfe4922352f7719058
SHA192be69c54956200d41f9e97c69952463d826744a
SHA2566b5bbef61a2369448a918979428c77695c567df4dde01aa4bcbcf59d554bc69b
SHA512d308fae0bee81544dac0639aa54e15ce7f80b04afae6b13b44e6685dda80a06db57687139f245331115aa3bf77389e6fa9d122d8e707c3ddef999c24f7e0b6e3
-
Filesize
388KB
MD550d47c35203dcba35b7e91e995560e9c
SHA160972531d7455af886133bd29e6c4704111f994d
SHA256d0c8811959366ee1d96fe088a9da5989cbea2bbff054b3852906ea2a38461b4c
SHA512913a67cdd504d3e45d0cfff8a530608d5959992649f360b1d84b599f33c8024f92b05ab2c9c591c44440aec77bd2c964a4f9cca54560c15eb694c7983a692eaa
-
Filesize
388KB
MD550d47c35203dcba35b7e91e995560e9c
SHA160972531d7455af886133bd29e6c4704111f994d
SHA256d0c8811959366ee1d96fe088a9da5989cbea2bbff054b3852906ea2a38461b4c
SHA512913a67cdd504d3e45d0cfff8a530608d5959992649f360b1d84b599f33c8024f92b05ab2c9c591c44440aec77bd2c964a4f9cca54560c15eb694c7983a692eaa
-
Filesize
11KB
MD5dc60f0c6c3c7a8ac4f2a4f95a36f94bc
SHA15daba85b1a40c2ca8e34ff00612e8070cd426768
SHA256338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4
SHA512f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd
-
Filesize
11KB
MD5dc60f0c6c3c7a8ac4f2a4f95a36f94bc
SHA15daba85b1a40c2ca8e34ff00612e8070cd426768
SHA256338e974fcfa569f03bc276983ad2ac3d1413e1c492b8efaada49f83442eca3b4
SHA512f56f5cc9652c24716ea8f556027cb2c9c1a9a708b3150b73f174221e639904fea8136edd5c18a27b049b077d8f33c7e9bb6d3df210684686ffa70deb5c7101bd
-
Filesize
355KB
MD59e857f425cd92216c513e43c3109eb8d
SHA100678d8a8180057f0b4e7902f682429d13ff7a41
SHA2568c993b3886241cddf1cac98f45c349f8ac06e798261d9fac17f56439a4c86373
SHA512b4c434ff193a2cb78d6bb355cdae4fb99c9e837732f6bfd8b74c0a019c0accfd5d9de30654f1c8ef5a0773d51734d5a73338f54895e9c889d99b1232b2719def
-
Filesize
355KB
MD59e857f425cd92216c513e43c3109eb8d
SHA100678d8a8180057f0b4e7902f682429d13ff7a41
SHA2568c993b3886241cddf1cac98f45c349f8ac06e798261d9fac17f56439a4c86373
SHA512b4c434ff193a2cb78d6bb355cdae4fb99c9e837732f6bfd8b74c0a019c0accfd5d9de30654f1c8ef5a0773d51734d5a73338f54895e9c889d99b1232b2719def