Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe
Resource
win10v2004-20230220-en
General
-
Target
2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe
-
Size
659KB
-
MD5
d017fabcfcd10bb0301006800b146038
-
SHA1
df8045122b218cfa84eb965b22ccd2e94b1a6f42
-
SHA256
2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124
-
SHA512
e995277a96a7d3e13f4ba1dd0ee517756cb88a1270f1fb5e819010c3370d6366460c9e1421458626dec7d5d2f1dd5071838c7774b4b1f8f81e91003132c8c7fb
-
SSDEEP
12288:NMrFy90ly2ZtZnboiWElqPNrTswqpVdU1IKjHQoqBiTVQ9a1eRr99FgN:wy6y2ZtZbpkyfGfzQDj9a1K5IN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8634.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8634.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4384-191-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-192-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-194-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-196-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-198-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-203-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-207-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-205-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-209-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-211-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-213-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-215-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-217-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-219-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-221-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-223-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-225-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4384-227-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2880 un991171.exe 2644 pro8634.exe 4384 qu6983.exe 3732 si350099.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8634.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un991171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un991171.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 224 2644 WerFault.exe 84 4124 4384 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2644 pro8634.exe 2644 pro8634.exe 4384 qu6983.exe 4384 qu6983.exe 3732 si350099.exe 3732 si350099.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2644 pro8634.exe Token: SeDebugPrivilege 4384 qu6983.exe Token: SeDebugPrivilege 3732 si350099.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5040 wrote to memory of 2880 5040 2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe 83 PID 5040 wrote to memory of 2880 5040 2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe 83 PID 5040 wrote to memory of 2880 5040 2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe 83 PID 2880 wrote to memory of 2644 2880 un991171.exe 84 PID 2880 wrote to memory of 2644 2880 un991171.exe 84 PID 2880 wrote to memory of 2644 2880 un991171.exe 84 PID 2880 wrote to memory of 4384 2880 un991171.exe 91 PID 2880 wrote to memory of 4384 2880 un991171.exe 91 PID 2880 wrote to memory of 4384 2880 un991171.exe 91 PID 5040 wrote to memory of 3732 5040 2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe 95 PID 5040 wrote to memory of 3732 5040 2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe 95 PID 5040 wrote to memory of 3732 5040 2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe"C:\Users\Admin\AppData\Local\Temp\2caa55fb9de38dfba656013f5631f1e90d49eb563eba7cb23dd1e0608c08b124.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un991171.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un991171.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8634.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8634.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 10284⤵
- Program crash
PID:224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6983.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6983.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 13164⤵
- Program crash
PID:4124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si350099.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si350099.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2644 -ip 26441⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4384 -ip 43841⤵PID:4180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53744f630c55fdec7a90b35397597eabb
SHA16edd3b6a0fbade60492aa57d3c624dea6f92465c
SHA256bdda940775912b85ee2905982a3d2f31ce993542690ddabf9efa72784ce0fd71
SHA51237937b01350f8d9e97a80ecb1396f63c54e50385cee41d699c7a75e3103512762e5458007de01b177a2ec062c48530e59c6a226f859d6233186b908c6c71524e
-
Filesize
175KB
MD53744f630c55fdec7a90b35397597eabb
SHA16edd3b6a0fbade60492aa57d3c624dea6f92465c
SHA256bdda940775912b85ee2905982a3d2f31ce993542690ddabf9efa72784ce0fd71
SHA51237937b01350f8d9e97a80ecb1396f63c54e50385cee41d699c7a75e3103512762e5458007de01b177a2ec062c48530e59c6a226f859d6233186b908c6c71524e
-
Filesize
517KB
MD5385db9f30cbd4057296c1dcf1416ff1c
SHA16518843037e240867c9ed900bc8084c08cf53502
SHA2566d235c83aebb8f21223719a4e4075fc36418c01c6dbc1dfd4866c5f5d65aead9
SHA51287c128676915571cd2642f6d7b3e3b8ed4c90d11cacd38512cf499ca8e99c7c74e7547e6bf9b75901393ddd05fba2c29a1fd8f5d2ce836e034dcf76d58ea6b7d
-
Filesize
517KB
MD5385db9f30cbd4057296c1dcf1416ff1c
SHA16518843037e240867c9ed900bc8084c08cf53502
SHA2566d235c83aebb8f21223719a4e4075fc36418c01c6dbc1dfd4866c5f5d65aead9
SHA51287c128676915571cd2642f6d7b3e3b8ed4c90d11cacd38512cf499ca8e99c7c74e7547e6bf9b75901393ddd05fba2c29a1fd8f5d2ce836e034dcf76d58ea6b7d
-
Filesize
295KB
MD539cf14dea333f519222bd0d39a1b794a
SHA1ccb68070f34cca2ef2de397c4ccf9631cf93a495
SHA256dfe4f7ff144bb4f346de6deac15d58365c68804f7d0ce2619336c70a885bf1c6
SHA512226e385cef31dd817175fb9d31496a631917215d012dfa0a869edc1a764d16135a328cf2217d74db6497c096e1ef7f98425af9841fae0c2fe89c24a70d6e2a65
-
Filesize
295KB
MD539cf14dea333f519222bd0d39a1b794a
SHA1ccb68070f34cca2ef2de397c4ccf9631cf93a495
SHA256dfe4f7ff144bb4f346de6deac15d58365c68804f7d0ce2619336c70a885bf1c6
SHA512226e385cef31dd817175fb9d31496a631917215d012dfa0a869edc1a764d16135a328cf2217d74db6497c096e1ef7f98425af9841fae0c2fe89c24a70d6e2a65
-
Filesize
354KB
MD59dc8725fd176a7730e6a9594c764bb8f
SHA1f18609cd546cf552cdc7f3952bb2ca79b62d93bb
SHA256c061bd036673a0695df99c27ebc8f1e8708268c9b1dbabf16ee7989e3e9d7dce
SHA512b3ad01f74adc23933e8eeb417c5f4cbb3b826e2379af5a2c5d2b51e9cf6197ca3ba13ca19ef0884e205ab282f6d1ecd394fc2e910b16189d0364030682cb89c1
-
Filesize
354KB
MD59dc8725fd176a7730e6a9594c764bb8f
SHA1f18609cd546cf552cdc7f3952bb2ca79b62d93bb
SHA256c061bd036673a0695df99c27ebc8f1e8708268c9b1dbabf16ee7989e3e9d7dce
SHA512b3ad01f74adc23933e8eeb417c5f4cbb3b826e2379af5a2c5d2b51e9cf6197ca3ba13ca19ef0884e205ab282f6d1ecd394fc2e910b16189d0364030682cb89c1