Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
466d2fe0b85cf7d40bdd72187a051529c5bd214deea0aaf5bf2df216f96bc6ba.exe
Resource
win10v2004-20230220-en
General
-
Target
466d2fe0b85cf7d40bdd72187a051529c5bd214deea0aaf5bf2df216f96bc6ba.exe
-
Size
992KB
-
MD5
f0cd0c0fac904fe776b9ae298cdc8957
-
SHA1
380bee561b1f23849f865dbbb9556750dbc3e67b
-
SHA256
466d2fe0b85cf7d40bdd72187a051529c5bd214deea0aaf5bf2df216f96bc6ba
-
SHA512
f753c0060524f79994009b5c646d7b642c2cbebc2dadad6ff8b970faedae3f75b099dfe8c4fa87b6a24b99986436b5301e68170cf08fd7adbee71cfcda7b3fd6
-
SSDEEP
24576:oyi3ikmi8YvwacYP82mT7yx35QDEhpWAVH9ec:viyLacYu3yxp+piY
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
link
176.113.115.145:4125
-
auth_value
77e4c7bc6fea5ae755b29e8aea8f7012
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz0947.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v4111xw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v4111xw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v4111xw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz0947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz0947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz0947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v4111xw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v4111xw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz0947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz0947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v4111xw.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4392-213-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-214-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-216-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-218-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-220-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-222-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-224-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-226-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-228-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-230-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-238-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-236-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-234-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-232-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-240-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-242-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-244-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4392-246-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 320 zap2743.exe 4044 zap8115.exe 5112 zap4174.exe 4328 tz0947.exe 2292 v4111xw.exe 4392 w20gg47.exe 1340 xgpGr19.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz0947.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v4111xw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v4111xw.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 466d2fe0b85cf7d40bdd72187a051529c5bd214deea0aaf5bf2df216f96bc6ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 466d2fe0b85cf7d40bdd72187a051529c5bd214deea0aaf5bf2df216f96bc6ba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap2743.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap2743.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap8115.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap8115.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap4174.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap4174.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3080 2292 WerFault.exe 92 1356 4392 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4328 tz0947.exe 4328 tz0947.exe 2292 v4111xw.exe 2292 v4111xw.exe 4392 w20gg47.exe 4392 w20gg47.exe 1340 xgpGr19.exe 1340 xgpGr19.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4328 tz0947.exe Token: SeDebugPrivilege 2292 v4111xw.exe Token: SeDebugPrivilege 4392 w20gg47.exe Token: SeDebugPrivilege 1340 xgpGr19.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 408 wrote to memory of 320 408 466d2fe0b85cf7d40bdd72187a051529c5bd214deea0aaf5bf2df216f96bc6ba.exe 84 PID 408 wrote to memory of 320 408 466d2fe0b85cf7d40bdd72187a051529c5bd214deea0aaf5bf2df216f96bc6ba.exe 84 PID 408 wrote to memory of 320 408 466d2fe0b85cf7d40bdd72187a051529c5bd214deea0aaf5bf2df216f96bc6ba.exe 84 PID 320 wrote to memory of 4044 320 zap2743.exe 85 PID 320 wrote to memory of 4044 320 zap2743.exe 85 PID 320 wrote to memory of 4044 320 zap2743.exe 85 PID 4044 wrote to memory of 5112 4044 zap8115.exe 86 PID 4044 wrote to memory of 5112 4044 zap8115.exe 86 PID 4044 wrote to memory of 5112 4044 zap8115.exe 86 PID 5112 wrote to memory of 4328 5112 zap4174.exe 87 PID 5112 wrote to memory of 4328 5112 zap4174.exe 87 PID 5112 wrote to memory of 2292 5112 zap4174.exe 92 PID 5112 wrote to memory of 2292 5112 zap4174.exe 92 PID 5112 wrote to memory of 2292 5112 zap4174.exe 92 PID 4044 wrote to memory of 4392 4044 zap8115.exe 98 PID 4044 wrote to memory of 4392 4044 zap8115.exe 98 PID 4044 wrote to memory of 4392 4044 zap8115.exe 98 PID 320 wrote to memory of 1340 320 zap2743.exe 102 PID 320 wrote to memory of 1340 320 zap2743.exe 102 PID 320 wrote to memory of 1340 320 zap2743.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\466d2fe0b85cf7d40bdd72187a051529c5bd214deea0aaf5bf2df216f96bc6ba.exe"C:\Users\Admin\AppData\Local\Temp\466d2fe0b85cf7d40bdd72187a051529c5bd214deea0aaf5bf2df216f96bc6ba.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2743.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2743.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8115.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap8115.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4174.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap4174.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0947.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0947.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4111xw.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4111xw.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 10806⤵
- Program crash
PID:3080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w20gg47.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w20gg47.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 18805⤵
- Program crash
PID:1356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgpGr19.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgpGr19.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2292 -ip 22921⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4392 -ip 43921⤵PID:3688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
808KB
MD5152db385790c4ff0b1326adffb959741
SHA1baa8d041ce5b28c124f23975291da46ace638e2d
SHA2569a6a1843586af9ff2a12b41ad937c682ed399be3df23f1fc31ef88581e5c2fd8
SHA512318e903c31e1dc30c839d61bbe7a60eea2be0c273634c7feb3403f4e08dfad7346009f73d1029755b935fcb62d8388377ffefd84daf8de247a7b9ba7dab33ca9
-
Filesize
808KB
MD5152db385790c4ff0b1326adffb959741
SHA1baa8d041ce5b28c124f23975291da46ace638e2d
SHA2569a6a1843586af9ff2a12b41ad937c682ed399be3df23f1fc31ef88581e5c2fd8
SHA512318e903c31e1dc30c839d61bbe7a60eea2be0c273634c7feb3403f4e08dfad7346009f73d1029755b935fcb62d8388377ffefd84daf8de247a7b9ba7dab33ca9
-
Filesize
175KB
MD5fd2b9e5cc0bdceb2999ce3f2da45caf8
SHA16485498634dc2f50c00f07eac13b391b838542e0
SHA25610809e62cd0cae912ca54a499859fe3bd92c323e4905da59aec9068e71480319
SHA512d7b892e179b4402ee0dc62f9e1f7a8c912a287d5e16ab7444c8b89b9c341a9fefa48e5e578a72a75f7aff4f6e21be2a385457cac349476e9dc545ffa586cd009
-
Filesize
175KB
MD5fd2b9e5cc0bdceb2999ce3f2da45caf8
SHA16485498634dc2f50c00f07eac13b391b838542e0
SHA25610809e62cd0cae912ca54a499859fe3bd92c323e4905da59aec9068e71480319
SHA512d7b892e179b4402ee0dc62f9e1f7a8c912a287d5e16ab7444c8b89b9c341a9fefa48e5e578a72a75f7aff4f6e21be2a385457cac349476e9dc545ffa586cd009
-
Filesize
665KB
MD52ca7acbd04770ceb6e5211bf0aa3fe23
SHA1c755a7d04d990137b54276c90934afd4d34ae2b5
SHA2563c3808a39a91c6e55dc2b723b7ac9eb1a00ca8a31fd3ea63736403cda0f25635
SHA512a0b1054cf480be32b78cdbbba85fab6c7fe78d8d3f632a39c1ed68b31669e0095fd236cf8c81e5cff55ceacdbd7dde297a4f05fdff5fefa9680542b39d1642f9
-
Filesize
665KB
MD52ca7acbd04770ceb6e5211bf0aa3fe23
SHA1c755a7d04d990137b54276c90934afd4d34ae2b5
SHA2563c3808a39a91c6e55dc2b723b7ac9eb1a00ca8a31fd3ea63736403cda0f25635
SHA512a0b1054cf480be32b78cdbbba85fab6c7fe78d8d3f632a39c1ed68b31669e0095fd236cf8c81e5cff55ceacdbd7dde297a4f05fdff5fefa9680542b39d1642f9
-
Filesize
354KB
MD5395aaea530412049cba91296dcf05839
SHA110a41b7ddc1d93881f9d6643d996bb0f52b0b22a
SHA256b295b90cb75763c493dd76e02cc6714c70a855f4c1af58936d05996d89f9f2cb
SHA512c2eb2d5d6a7153100ef71958a2bbfa37d8d346f9dd5a85b798ec33ed95b52db18598aa38215a29946ed8a9722d64da6a3ca71351e739898d00e23e946b43e78c
-
Filesize
354KB
MD5395aaea530412049cba91296dcf05839
SHA110a41b7ddc1d93881f9d6643d996bb0f52b0b22a
SHA256b295b90cb75763c493dd76e02cc6714c70a855f4c1af58936d05996d89f9f2cb
SHA512c2eb2d5d6a7153100ef71958a2bbfa37d8d346f9dd5a85b798ec33ed95b52db18598aa38215a29946ed8a9722d64da6a3ca71351e739898d00e23e946b43e78c
-
Filesize
329KB
MD50325f3d9d0b79ef5b799f0d330a4eceb
SHA12d5ff5bdfec8c18a8c54c61ee75108bb24bd4956
SHA2561487a45084ed0daefefff29db32253ad62f4c648ccbec46c85c7a7dbf9f7dd79
SHA51239c2199895c713e758a0cd00bf7c3cf0f3c981bb45895d7a085f5877c870f022b991e027c38c2062381fbe06b46434a6f3d2994e36fca880ccdc67ebef1a6003
-
Filesize
329KB
MD50325f3d9d0b79ef5b799f0d330a4eceb
SHA12d5ff5bdfec8c18a8c54c61ee75108bb24bd4956
SHA2561487a45084ed0daefefff29db32253ad62f4c648ccbec46c85c7a7dbf9f7dd79
SHA51239c2199895c713e758a0cd00bf7c3cf0f3c981bb45895d7a085f5877c870f022b991e027c38c2062381fbe06b46434a6f3d2994e36fca880ccdc67ebef1a6003
-
Filesize
11KB
MD5b530de265c83d5fe298e29c97e106d63
SHA1c895f9bb76f26056719c587e2e62e23751ef3bd0
SHA2563cefc7b492ac144052388b62f1491823b9559226fd315efa8486011907fc18f7
SHA5124c415590a9862fd6256998e986982d1e03590993349dd0eda21244acf950c143992aa6929747ab8ce82457513a65f54fda8b77434da54af28f603b464f7f1fe2
-
Filesize
11KB
MD5b530de265c83d5fe298e29c97e106d63
SHA1c895f9bb76f26056719c587e2e62e23751ef3bd0
SHA2563cefc7b492ac144052388b62f1491823b9559226fd315efa8486011907fc18f7
SHA5124c415590a9862fd6256998e986982d1e03590993349dd0eda21244acf950c143992aa6929747ab8ce82457513a65f54fda8b77434da54af28f603b464f7f1fe2
-
Filesize
295KB
MD50cea702e6243767df4ef898ada1e5074
SHA18115fd819c91763177c0ede40b48392f6fc40bb9
SHA2563d39e072433714571294c05af5b88194dcfc1c3bd4265ecd71a9a30095793a2c
SHA512b09e90f320933800c5004661e05826b8cc37649549bbb665e7328c8c5051813f318f027980ffa95de8a75f4f69312aba8ae6af6eff57f39f48c9187a16a91302
-
Filesize
295KB
MD50cea702e6243767df4ef898ada1e5074
SHA18115fd819c91763177c0ede40b48392f6fc40bb9
SHA2563d39e072433714571294c05af5b88194dcfc1c3bd4265ecd71a9a30095793a2c
SHA512b09e90f320933800c5004661e05826b8cc37649549bbb665e7328c8c5051813f318f027980ffa95de8a75f4f69312aba8ae6af6eff57f39f48c9187a16a91302