Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
64s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe
Resource
win10v2004-20230220-en
General
-
Target
b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe
-
Size
666KB
-
MD5
5f690812ae0079a78507adf72363674f
-
SHA1
ba1c9949aa20b7e1ace86100f0a6a540dea89241
-
SHA256
b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed
-
SHA512
59a4c4d746ac12633a8425f03712c67b59b7690c0bb6f428d5f697c17990e86b9fe0a143743fbc366f87f6e2e002f519f92e8e8469a63dfccb3ab9f3a7dd64a8
-
SSDEEP
12288:jMrWy90rKzd/h+8Y06Ky3IRAo1Hox8ZcFQxXrUlET/wh+BSsuMN268EY:ZyddsSxy3IXHoNFQlrLLwhA/9O
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1047.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1047.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/2440-191-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-192-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-195-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-201-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-198-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-203-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-205-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-207-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-209-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-211-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-213-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-215-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-217-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-219-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-221-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-223-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-225-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/2440-227-0x0000000002850000-0x000000000288F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4628 un588858.exe 2040 pro1047.exe 2440 qu9605.exe 1920 si639158.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1047.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un588858.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un588858.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 956 2040 WerFault.exe 83 3948 2440 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2040 pro1047.exe 2040 pro1047.exe 2440 qu9605.exe 2440 qu9605.exe 1920 si639158.exe 1920 si639158.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2040 pro1047.exe Token: SeDebugPrivilege 2440 qu9605.exe Token: SeDebugPrivilege 1920 si639158.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1928 wrote to memory of 4628 1928 b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe 82 PID 1928 wrote to memory of 4628 1928 b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe 82 PID 1928 wrote to memory of 4628 1928 b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe 82 PID 4628 wrote to memory of 2040 4628 un588858.exe 83 PID 4628 wrote to memory of 2040 4628 un588858.exe 83 PID 4628 wrote to memory of 2040 4628 un588858.exe 83 PID 4628 wrote to memory of 2440 4628 un588858.exe 89 PID 4628 wrote to memory of 2440 4628 un588858.exe 89 PID 4628 wrote to memory of 2440 4628 un588858.exe 89 PID 1928 wrote to memory of 1920 1928 b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe 94 PID 1928 wrote to memory of 1920 1928 b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe 94 PID 1928 wrote to memory of 1920 1928 b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe"C:\Users\Admin\AppData\Local\Temp\b082eaf2835af74a19f53aaf6e3c161153591cd69d2b7d7567c7d169dd3214ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588858.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588858.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1047.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1047.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 10924⤵
- Program crash
PID:956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9605.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9605.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 20164⤵
- Program crash
PID:3948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si639158.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si639158.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2040 -ip 20401⤵PID:3288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2440 -ip 24401⤵PID:5024
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD54c4241bc6266be94ac66b6f2ea4392e9
SHA1918948c5efc8c9c9238f83dd348e3a62c1d3286d
SHA2565e3610f23d4d6529a0456f19fa6acc8a800a5c4900d1512eda27dfc0dec1221e
SHA5129f4fc17e887cb0f435d29516560b70ded2459ab504082f86328e8db511b5867b772a6d266daa373b7c1c4c8772d3fbbca4552091cd31797e7dab4d915bba0df4
-
Filesize
176KB
MD54c4241bc6266be94ac66b6f2ea4392e9
SHA1918948c5efc8c9c9238f83dd348e3a62c1d3286d
SHA2565e3610f23d4d6529a0456f19fa6acc8a800a5c4900d1512eda27dfc0dec1221e
SHA5129f4fc17e887cb0f435d29516560b70ded2459ab504082f86328e8db511b5867b772a6d266daa373b7c1c4c8772d3fbbca4552091cd31797e7dab4d915bba0df4
-
Filesize
524KB
MD5fe4bd13a4d5214bfb5314593db831df0
SHA13219b04cb15dbdb6c43cefe514e7811ef22c7761
SHA256819303b3dd464daca38bbc682a68fd95f0a3e86f6e3a3a7014274c1f7032c834
SHA512d2db42cf9e85cb328660874c02b7459e28e8d92e177049165a28b51b44c2b3cd9145eb8f6545ece82514bd190bd39549ebbdcd9246e85661a2d4adec32006847
-
Filesize
524KB
MD5fe4bd13a4d5214bfb5314593db831df0
SHA13219b04cb15dbdb6c43cefe514e7811ef22c7761
SHA256819303b3dd464daca38bbc682a68fd95f0a3e86f6e3a3a7014274c1f7032c834
SHA512d2db42cf9e85cb328660874c02b7459e28e8d92e177049165a28b51b44c2b3cd9145eb8f6545ece82514bd190bd39549ebbdcd9246e85661a2d4adec32006847
-
Filesize
294KB
MD56e2aa774a04285d676b92275139db21c
SHA19f37ec28f7b15a7dd96479b9e6517e95fa8d7b0f
SHA2564948b19884986e6413ea52d6f017004cd429961694413855ed741e02116144ec
SHA51287afe164e078a97d54507e08018ad00b8d156fedfa1d6e50dac8beed694f73f6646317a573e2339d33111892783d5d47617bd15cac40fa87fde5d953bcbce9ec
-
Filesize
294KB
MD56e2aa774a04285d676b92275139db21c
SHA19f37ec28f7b15a7dd96479b9e6517e95fa8d7b0f
SHA2564948b19884986e6413ea52d6f017004cd429961694413855ed741e02116144ec
SHA51287afe164e078a97d54507e08018ad00b8d156fedfa1d6e50dac8beed694f73f6646317a573e2339d33111892783d5d47617bd15cac40fa87fde5d953bcbce9ec
-
Filesize
352KB
MD587cf82c49a4548290ed43530cc269306
SHA1fa97fb195bdc8150d664690d80a81c5bee0a4012
SHA2565581d2f75817546209ee65e18b1e05e43b06b7213b1fec4516c5691dd7ee75b1
SHA512bb2c0cde28da685d77c413410219e68ff83789ded536050d8bdb17a4a1ba1d30277d999a2a8f42e55be3e4d404bdc5e7ba1af04c17b7d96ac8403e67fbe2c260
-
Filesize
352KB
MD587cf82c49a4548290ed43530cc269306
SHA1fa97fb195bdc8150d664690d80a81c5bee0a4012
SHA2565581d2f75817546209ee65e18b1e05e43b06b7213b1fec4516c5691dd7ee75b1
SHA512bb2c0cde28da685d77c413410219e68ff83789ded536050d8bdb17a4a1ba1d30277d999a2a8f42e55be3e4d404bdc5e7ba1af04c17b7d96ac8403e67fbe2c260