Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe
Resource
win10v2004-20230220-en
General
-
Target
0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe
-
Size
658KB
-
MD5
591b55a4fe9885d748c1fd044ae614cb
-
SHA1
6a1c1cd54df03d16af2d77e94de2d12ef2c619fd
-
SHA256
0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79
-
SHA512
59578c36a89a58bb802d90b52a8d74da023c1faf4dab2b5792e3395ebe39745aa03fd414cc7fe5094ad6e83b1ea8376b17f3ad291113baf541e8b6e021ea03ab
-
SSDEEP
12288:5Mr8y90a1yPQDfEIl5V/kJD2O+u8XJVaQCnPG0XVaKjsQoqBibUbwj7:Fyg3Il5V/kSBXJVdCnPnxIQDmUa7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7629.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4840-194-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-196-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-198-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-200-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-202-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-204-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-206-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-208-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-210-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-212-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-214-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-216-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-218-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-220-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-222-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-224-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-226-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4840-228-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3992 un010813.exe 1200 pro7629.exe 4840 qu0506.exe 1256 si604604.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7629.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un010813.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un010813.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3600 1200 WerFault.exe 83 4308 4840 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1200 pro7629.exe 1200 pro7629.exe 4840 qu0506.exe 4840 qu0506.exe 1256 si604604.exe 1256 si604604.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1200 pro7629.exe Token: SeDebugPrivilege 4840 qu0506.exe Token: SeDebugPrivilege 1256 si604604.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3996 wrote to memory of 3992 3996 0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe 82 PID 3996 wrote to memory of 3992 3996 0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe 82 PID 3996 wrote to memory of 3992 3996 0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe 82 PID 3992 wrote to memory of 1200 3992 un010813.exe 83 PID 3992 wrote to memory of 1200 3992 un010813.exe 83 PID 3992 wrote to memory of 1200 3992 un010813.exe 83 PID 3992 wrote to memory of 4840 3992 un010813.exe 89 PID 3992 wrote to memory of 4840 3992 un010813.exe 89 PID 3992 wrote to memory of 4840 3992 un010813.exe 89 PID 3996 wrote to memory of 1256 3996 0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe 94 PID 3996 wrote to memory of 1256 3996 0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe 94 PID 3996 wrote to memory of 1256 3996 0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe"C:\Users\Admin\AppData\Local\Temp\0515b06521f3d406d8956a5ecabe24a805564f3dd465e8a1e39c1aff14fc7d79.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un010813.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un010813.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7629.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7629.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 10804⤵
- Program crash
PID:3600
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0506.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0506.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 15604⤵
- Program crash
PID:4308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si604604.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si604604.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1200 -ip 12001⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4840 -ip 48401⤵PID:5004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5320ed9a07da95271730c1208187f92b7
SHA1540d7cf11521bf862f6efe15edf266b953c72645
SHA256491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af
SHA5122190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4
-
Filesize
175KB
MD5320ed9a07da95271730c1208187f92b7
SHA1540d7cf11521bf862f6efe15edf266b953c72645
SHA256491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af
SHA5122190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4
-
Filesize
517KB
MD54550402b8a74604184a3a8390d351ae0
SHA17075af9b7f9a6720148bdda4cd8838fc75f06bf3
SHA256c5354da6a5795e17abdb6ad17447da52f8bc95a848fb2af238051f023fac15de
SHA5127d3dfdf24aaeaf0ef79c59f9c1603295b17ec2012747e5fe05f723759fef0d74694f13fd7824ee6dfea935fc17b4b7ca5723ffc1db537e6d203869747839407b
-
Filesize
517KB
MD54550402b8a74604184a3a8390d351ae0
SHA17075af9b7f9a6720148bdda4cd8838fc75f06bf3
SHA256c5354da6a5795e17abdb6ad17447da52f8bc95a848fb2af238051f023fac15de
SHA5127d3dfdf24aaeaf0ef79c59f9c1603295b17ec2012747e5fe05f723759fef0d74694f13fd7824ee6dfea935fc17b4b7ca5723ffc1db537e6d203869747839407b
-
Filesize
295KB
MD5028d599331e8685115c2805bf0106160
SHA1d2b4e41ada86195ce5fca5d7e11aa700ef10a0ab
SHA256b26c9181f3f23e4856728b5d6f830a630c187a15eca8d00a0d985bcea3355cd3
SHA512842689808c970189b232f43801d9f33b16f89cc622851580c0235c3b116a8b5ffc3b82afe46fbf6cb6ace34366975dd10545f0e10937e760f3c352e62594c66b
-
Filesize
295KB
MD5028d599331e8685115c2805bf0106160
SHA1d2b4e41ada86195ce5fca5d7e11aa700ef10a0ab
SHA256b26c9181f3f23e4856728b5d6f830a630c187a15eca8d00a0d985bcea3355cd3
SHA512842689808c970189b232f43801d9f33b16f89cc622851580c0235c3b116a8b5ffc3b82afe46fbf6cb6ace34366975dd10545f0e10937e760f3c352e62594c66b
-
Filesize
354KB
MD506fc1c2c8659c7f00591e2d67309837d
SHA10eeee5d5dcc676c7c3b4408a52deb84522b09ccb
SHA256a8abde98befa51485ea173636a21d5a40af764ae8d510ed782d190c93c78628c
SHA51220cfec687e77614951cf49566063dc2602570b99dccb8884c33290f192802e7dc898d398c070fc4394db6162ca251b425874068fdd54dd67f390d16f4b31e5fb
-
Filesize
354KB
MD506fc1c2c8659c7f00591e2d67309837d
SHA10eeee5d5dcc676c7c3b4408a52deb84522b09ccb
SHA256a8abde98befa51485ea173636a21d5a40af764ae8d510ed782d190c93c78628c
SHA51220cfec687e77614951cf49566063dc2602570b99dccb8884c33290f192802e7dc898d398c070fc4394db6162ca251b425874068fdd54dd67f390d16f4b31e5fb