Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe
Resource
win10v2004-20230220-en
General
-
Target
e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe
-
Size
530KB
-
MD5
d48beece422801406fd7b2242b6dbb1a
-
SHA1
abf4f823d6f82bb91d5aed2816b8dc37f143c2c2
-
SHA256
e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1
-
SHA512
d86dc504487bc857e92763b010b8ca6f7459fecb4b71f3a09487ec0350b9387f6ba98fb70fb573f89775b0b809e799330cf453382409a2434c5d14fc4bd217bb
-
SSDEEP
12288:6MrQy90DTVHoWx1YA5iljQdxKpmQGqBfRjA0nz8VOyY83:GyL0YA5iljlwQlg0nz8r3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr462464.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr462464.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr462464.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr462464.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr462464.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr462464.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/112-157-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-158-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-160-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-162-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-164-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-166-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-168-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-170-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-172-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-174-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-176-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-178-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-180-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-182-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-184-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-186-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-188-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-190-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-192-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-194-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-196-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-198-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-200-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-202-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-204-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-206-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-208-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-210-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-212-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-216-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-214-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-218-0x0000000007150000-0x000000000718F000-memory.dmp family_redline behavioral1/memory/112-220-0x0000000007150000-0x000000000718F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1344 ziOZ5001.exe 2036 jr462464.exe 112 ku522430.exe 992 lr854864.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr462464.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziOZ5001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOZ5001.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4436 112 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2036 jr462464.exe 2036 jr462464.exe 112 ku522430.exe 112 ku522430.exe 992 lr854864.exe 992 lr854864.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2036 jr462464.exe Token: SeDebugPrivilege 112 ku522430.exe Token: SeDebugPrivilege 992 lr854864.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1344 2596 e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe 85 PID 2596 wrote to memory of 1344 2596 e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe 85 PID 2596 wrote to memory of 1344 2596 e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe 85 PID 1344 wrote to memory of 2036 1344 ziOZ5001.exe 86 PID 1344 wrote to memory of 2036 1344 ziOZ5001.exe 86 PID 1344 wrote to memory of 112 1344 ziOZ5001.exe 87 PID 1344 wrote to memory of 112 1344 ziOZ5001.exe 87 PID 1344 wrote to memory of 112 1344 ziOZ5001.exe 87 PID 2596 wrote to memory of 992 2596 e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe 91 PID 2596 wrote to memory of 992 2596 e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe 91 PID 2596 wrote to memory of 992 2596 e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe"C:\Users\Admin\AppData\Local\Temp\e086bc7b42363aca48fbb336d33f164b53dfe8de0f2bf26b2dcb8d3f635341e1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOZ5001.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOZ5001.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr462464.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr462464.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku522430.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku522430.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 112 -s 13364⤵
- Program crash
PID:4436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr854864.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr854864.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 112 -ip 1121⤵PID:2672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52a3d506fa1df72e552ac6fe2dface171
SHA11152109b0b781b6f976c6f6850fc28c2213d4cac
SHA25620375385b26c1e8059f00ef90472d7c9c5bb96fad269d12edd066c2baf81e96f
SHA512b34d8ef68b30782ee543fc95cae266b1e256105d36b856f8a2063023174d4f6ff4ffcd871c687b413b501d3dc610081d3202340ea9f53514d880aca4a5c874af
-
Filesize
175KB
MD52a3d506fa1df72e552ac6fe2dface171
SHA11152109b0b781b6f976c6f6850fc28c2213d4cac
SHA25620375385b26c1e8059f00ef90472d7c9c5bb96fad269d12edd066c2baf81e96f
SHA512b34d8ef68b30782ee543fc95cae266b1e256105d36b856f8a2063023174d4f6ff4ffcd871c687b413b501d3dc610081d3202340ea9f53514d880aca4a5c874af
-
Filesize
388KB
MD56b835d2e5222da05a490a62c0b62f1f4
SHA172232d07ab9c7315e98ca0f1c310f4ac6bd7157c
SHA2560c0d0fdc78587f014e586b39705674f2a92c304365b782828164c0ee8996597c
SHA5129fd2452dcc2774881371d981f073021673f372166ec428ca8c3987c37c604a5c9f18fd5fcac5b8978b1428f7ef023a0e7bc09940d9cc7ec251c4bb7d105a35ea
-
Filesize
388KB
MD56b835d2e5222da05a490a62c0b62f1f4
SHA172232d07ab9c7315e98ca0f1c310f4ac6bd7157c
SHA2560c0d0fdc78587f014e586b39705674f2a92c304365b782828164c0ee8996597c
SHA5129fd2452dcc2774881371d981f073021673f372166ec428ca8c3987c37c604a5c9f18fd5fcac5b8978b1428f7ef023a0e7bc09940d9cc7ec251c4bb7d105a35ea
-
Filesize
11KB
MD5c6921b21e761f37f1057703872b2daa8
SHA10eced27748a0e9cec96cc09b97e0cc8e3d477d9b
SHA256ecb3480fb39cd629ad6856a15da0b0ee8c3b9ea1e775a7d85d3681f63da1ec65
SHA5122184d409cb220e4a2e8282cba0d6b97879ff4b8e7f217d6e4711e4726e600b5ca6393e4c3a7e94e8643f538c1f1728bc3c3620c80aa1a399a691e9c754b9b006
-
Filesize
11KB
MD5c6921b21e761f37f1057703872b2daa8
SHA10eced27748a0e9cec96cc09b97e0cc8e3d477d9b
SHA256ecb3480fb39cd629ad6856a15da0b0ee8c3b9ea1e775a7d85d3681f63da1ec65
SHA5122184d409cb220e4a2e8282cba0d6b97879ff4b8e7f217d6e4711e4726e600b5ca6393e4c3a7e94e8643f538c1f1728bc3c3620c80aa1a399a691e9c754b9b006
-
Filesize
354KB
MD5a447135515a0c6bb71fe3bba6630bc70
SHA16d0e3b250e6e2eae7c9f38fd2913c067eaf40b87
SHA256eb33b5917a35c30372d1f4c1977d72830499b5c9468148e5544423db6cff2d73
SHA5120a5cf9bdd043d1488b17ce48c17eab3b1cfb905e7ce1ecf7d5d4c6f987c041fdfb2b02136fda079aa90b8b723d5f772642cde10fd9016bcf17954c16e7f55f17
-
Filesize
354KB
MD5a447135515a0c6bb71fe3bba6630bc70
SHA16d0e3b250e6e2eae7c9f38fd2913c067eaf40b87
SHA256eb33b5917a35c30372d1f4c1977d72830499b5c9468148e5544423db6cff2d73
SHA5120a5cf9bdd043d1488b17ce48c17eab3b1cfb905e7ce1ecf7d5d4c6f987c041fdfb2b02136fda079aa90b8b723d5f772642cde10fd9016bcf17954c16e7f55f17