Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe
Resource
win10v2004-20230220-en
General
-
Target
c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe
-
Size
529KB
-
MD5
c0007c526d38afd27f2107c6d1141f0f
-
SHA1
ef2d7deb1b497f4499b4a42549b4b9058e087983
-
SHA256
c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e
-
SHA512
f9e492545683acff464b94ac26b57e975c95e80e852a3f57779d1cee5774bc43a839ec4e130d763adcf804a6f0dfd552c7b811a58408cb3600c3f77965ff83b4
-
SSDEEP
12288:cMroy90OCYQD7bGFYBX7m5C6TNVKBTE8ZxOgoxKWt/BvBgw:MyHFQ7GyB686RV+TE8zOgwpj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr704851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr704851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr704851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr704851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr704851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr704851.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/1460-158-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-159-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-161-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-165-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-163-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-167-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-169-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-171-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-173-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-175-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-177-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-179-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-181-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-183-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-185-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-187-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-189-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-191-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-193-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-195-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-197-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-199-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-201-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-203-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-205-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-207-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-209-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-211-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-213-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-215-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-217-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-219-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1460-221-0x0000000007830000-0x000000000786F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4964 zimH3187.exe 1936 jr704851.exe 1460 ku261437.exe 4568 lr421697.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr704851.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zimH3187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zimH3187.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3480 1460 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1936 jr704851.exe 1936 jr704851.exe 1460 ku261437.exe 1460 ku261437.exe 4568 lr421697.exe 4568 lr421697.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1936 jr704851.exe Token: SeDebugPrivilege 1460 ku261437.exe Token: SeDebugPrivilege 4568 lr421697.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1220 wrote to memory of 4964 1220 c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe 84 PID 1220 wrote to memory of 4964 1220 c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe 84 PID 1220 wrote to memory of 4964 1220 c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe 84 PID 4964 wrote to memory of 1936 4964 zimH3187.exe 85 PID 4964 wrote to memory of 1936 4964 zimH3187.exe 85 PID 4964 wrote to memory of 1460 4964 zimH3187.exe 86 PID 4964 wrote to memory of 1460 4964 zimH3187.exe 86 PID 4964 wrote to memory of 1460 4964 zimH3187.exe 86 PID 1220 wrote to memory of 4568 1220 c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe 90 PID 1220 wrote to memory of 4568 1220 c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe 90 PID 1220 wrote to memory of 4568 1220 c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe"C:\Users\Admin\AppData\Local\Temp\c5a8bbd10254716026ca616bde884ce9d1df39e23c86fed97edd790fa6a3f48e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimH3187.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimH3187.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr704851.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr704851.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku261437.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku261437.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 11844⤵
- Program crash
PID:3480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr421697.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr421697.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1460 -ip 14601⤵PID:3696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD546ddaf6b51fab20041b6a93e0139a96a
SHA1d81aaea546e192b1a0316b7de0b5cbc9250840e0
SHA256343535ed6a9334ffc7d554eeb57848ddbaf673606beb25fabec67c95e399ae8f
SHA512ce855d78359f04e702d834b26ebe1bbed6a36bf36ed3ca02215e239342aed6ba6043b1365e3fb0863e55320d1c21440ea132122d474aa6720ba5ef295dc77b2a
-
Filesize
176KB
MD546ddaf6b51fab20041b6a93e0139a96a
SHA1d81aaea546e192b1a0316b7de0b5cbc9250840e0
SHA256343535ed6a9334ffc7d554eeb57848ddbaf673606beb25fabec67c95e399ae8f
SHA512ce855d78359f04e702d834b26ebe1bbed6a36bf36ed3ca02215e239342aed6ba6043b1365e3fb0863e55320d1c21440ea132122d474aa6720ba5ef295dc77b2a
-
Filesize
388KB
MD54b18b1d10f03dbe581193bfcac39924d
SHA15087a43028594c7ed9700cb724b7119b9058f12e
SHA256ea3d90bc5717d75115bd8ef026fd1eb93e9ed94230f1e7589b5b8fe19186fb3b
SHA512bf055bc016c5675cad4fa98c6857471426d692df8320b9fb3f92e48cfbe48df444c2647f589f9053c4dbfd53c2363c521290d9d1204719ea7e50d5a9e4747a20
-
Filesize
388KB
MD54b18b1d10f03dbe581193bfcac39924d
SHA15087a43028594c7ed9700cb724b7119b9058f12e
SHA256ea3d90bc5717d75115bd8ef026fd1eb93e9ed94230f1e7589b5b8fe19186fb3b
SHA512bf055bc016c5675cad4fa98c6857471426d692df8320b9fb3f92e48cfbe48df444c2647f589f9053c4dbfd53c2363c521290d9d1204719ea7e50d5a9e4747a20
-
Filesize
11KB
MD54e34e3cda458c0d0b3f5ece1c6e2cdbc
SHA1bb587ff6430bb716aa30a72dda71631eb7136c2a
SHA2562fd04e93d4cfa8ab4da43068efbc8eb54f6c22b4ce8aabce229d1de37a6a010f
SHA5121f248de0b149c17be03b1ec0e4c1e6699bcc92b363708e058539971f4cb51adf904d8c20f80fa3d904a203feabf368cbe4114354bf2c83d27dded4a21c04acc9
-
Filesize
11KB
MD54e34e3cda458c0d0b3f5ece1c6e2cdbc
SHA1bb587ff6430bb716aa30a72dda71631eb7136c2a
SHA2562fd04e93d4cfa8ab4da43068efbc8eb54f6c22b4ce8aabce229d1de37a6a010f
SHA5121f248de0b149c17be03b1ec0e4c1e6699bcc92b363708e058539971f4cb51adf904d8c20f80fa3d904a203feabf368cbe4114354bf2c83d27dded4a21c04acc9
-
Filesize
354KB
MD542d5806901c14dac408c5fffd79d84dc
SHA1f263620aba56f8a0ed4c135c46e1ca6171852cd4
SHA256844ed14f953a9cea6162d2ba54a8692f326bdbd6d55d8c83f1b397eadce1effd
SHA512b724aa919aa60132c346fbc27ceb3d39a187d93b19a321a1e859f2564c906cf8b684988a5b373c020f380d41c11f90334699180d284e15f936b25f4518810d18
-
Filesize
354KB
MD542d5806901c14dac408c5fffd79d84dc
SHA1f263620aba56f8a0ed4c135c46e1ca6171852cd4
SHA256844ed14f953a9cea6162d2ba54a8692f326bdbd6d55d8c83f1b397eadce1effd
SHA512b724aa919aa60132c346fbc27ceb3d39a187d93b19a321a1e859f2564c906cf8b684988a5b373c020f380d41c11f90334699180d284e15f936b25f4518810d18