Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2023, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe
Resource
win10v2004-20230220-en
General
-
Target
0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe
-
Size
658KB
-
MD5
e5ea72847ce39944ffc14a2381bb1edb
-
SHA1
e92fe0291fc288edf6da27b5ba3887f561f8b5a5
-
SHA256
0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7
-
SHA512
89fd9e3dfd4ffc85f6f52d8a4150d0ae19fdc10be7174cff80d565ca68e1f8a11e2c039cc3f36d46c74816ff1938f722f7d54d3bec20469eb1b61a8e18fd69f5
-
SSDEEP
12288:3MrKy90KTv0B8csAyL0XDxIE+jBWPUe9tx+E2Zx+/WnaHD:ty9r0+cVyLQxIe7x+E2zSD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5282.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3988-190-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-193-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-195-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-199-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-197-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-201-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-203-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-205-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-207-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-209-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-211-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-215-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/3988-226-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1944 un103235.exe 3384 pro5282.exe 3988 qu8572.exe 3848 si355965.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5282.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5282.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un103235.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un103235.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4828 3384 WerFault.exe 85 4736 3988 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3384 pro5282.exe 3384 pro5282.exe 3988 qu8572.exe 3988 qu8572.exe 3848 si355965.exe 3848 si355965.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3384 pro5282.exe Token: SeDebugPrivilege 3988 qu8572.exe Token: SeDebugPrivilege 3848 si355965.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3664 wrote to memory of 1944 3664 0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe 84 PID 3664 wrote to memory of 1944 3664 0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe 84 PID 3664 wrote to memory of 1944 3664 0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe 84 PID 1944 wrote to memory of 3384 1944 un103235.exe 85 PID 1944 wrote to memory of 3384 1944 un103235.exe 85 PID 1944 wrote to memory of 3384 1944 un103235.exe 85 PID 1944 wrote to memory of 3988 1944 un103235.exe 91 PID 1944 wrote to memory of 3988 1944 un103235.exe 91 PID 1944 wrote to memory of 3988 1944 un103235.exe 91 PID 3664 wrote to memory of 3848 3664 0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe 96 PID 3664 wrote to memory of 3848 3664 0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe 96 PID 3664 wrote to memory of 3848 3664 0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe"C:\Users\Admin\AppData\Local\Temp\0e1c211e2f10181e183da3b71f6951f979e1fee574bcdd4b6053a9280dc7f5f7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un103235.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un103235.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5282.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5282.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 10044⤵
- Program crash
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8572.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8572.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 15804⤵
- Program crash
PID:4736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si355965.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si355965.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3384 -ip 33841⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3988 -ip 39881⤵PID:1084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD59da77f0723675bff51fd4d37dc6f2420
SHA17b883083dafe662c8cb4820a03922c64b7e83fdd
SHA2568b747edb122bdeb48354ebc56f223c8207e352871f2e48e2668846b8832f648b
SHA51244f8755cba2f825a4dfa2d26eb04927e7d09932953060dd518b00576299cf88fbec7f4b88a49be7bb975c2f471a80618ed1c9d47fccf74855170ae217da005dd
-
Filesize
176KB
MD59da77f0723675bff51fd4d37dc6f2420
SHA17b883083dafe662c8cb4820a03922c64b7e83fdd
SHA2568b747edb122bdeb48354ebc56f223c8207e352871f2e48e2668846b8832f648b
SHA51244f8755cba2f825a4dfa2d26eb04927e7d09932953060dd518b00576299cf88fbec7f4b88a49be7bb975c2f471a80618ed1c9d47fccf74855170ae217da005dd
-
Filesize
516KB
MD5be9313886c305560f59a4975c0350193
SHA18029119fa86b6b6322c8407770c713b33a887603
SHA256726d007a6dbb4772bef9bbe2df3bf871a103a9e396a699b10bcab6b11257f762
SHA51219c9e688a96bb83b479af582112b460723a185e228c5709c011db24bfeb9b894bba3d67ca300941c4a46172633c5a0e0e43fa6dde979db1056cdd8ffdd578219
-
Filesize
516KB
MD5be9313886c305560f59a4975c0350193
SHA18029119fa86b6b6322c8407770c713b33a887603
SHA256726d007a6dbb4772bef9bbe2df3bf871a103a9e396a699b10bcab6b11257f762
SHA51219c9e688a96bb83b479af582112b460723a185e228c5709c011db24bfeb9b894bba3d67ca300941c4a46172633c5a0e0e43fa6dde979db1056cdd8ffdd578219
-
Filesize
295KB
MD5c139244de12fd747829cffa331c2053f
SHA18832bd6b55c786c292472c6019686ae96d52ac43
SHA256925f3750dc725f6ec67fbd19535614319a4ad08ab6b547ed5558b3e86ee01d95
SHA51287e82be41aa78e2138956ecb45e27efae867e9ff1716cbf7d5f8393456b14c4a7a80aa2325b5dde25469a91de8a10879efed3562c5e44cae8fc852dbe9e8c3d6
-
Filesize
295KB
MD5c139244de12fd747829cffa331c2053f
SHA18832bd6b55c786c292472c6019686ae96d52ac43
SHA256925f3750dc725f6ec67fbd19535614319a4ad08ab6b547ed5558b3e86ee01d95
SHA51287e82be41aa78e2138956ecb45e27efae867e9ff1716cbf7d5f8393456b14c4a7a80aa2325b5dde25469a91de8a10879efed3562c5e44cae8fc852dbe9e8c3d6
-
Filesize
354KB
MD5e39f57e362d953e4dc1b11c5e1e81b51
SHA11fb20214548ea6d2b8d00acb444c544cb700e2d1
SHA256063fe286a6896c8ffcccca715826bac64f38626b14feab9a8a8112f32b4d26d4
SHA512e24639612d0412d81ea3b3e3da367a41fe5eb8fd016db24503f366e807837cc2bdcf3f455733ba9c1cb397bcbfbd2c8ad819de89387dbc4d305a2c34b9818a2e
-
Filesize
354KB
MD5e39f57e362d953e4dc1b11c5e1e81b51
SHA11fb20214548ea6d2b8d00acb444c544cb700e2d1
SHA256063fe286a6896c8ffcccca715826bac64f38626b14feab9a8a8112f32b4d26d4
SHA512e24639612d0412d81ea3b3e3da367a41fe5eb8fd016db24503f366e807837cc2bdcf3f455733ba9c1cb397bcbfbd2c8ad819de89387dbc4d305a2c34b9818a2e