Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe
Resource
win10v2004-20230220-en
General
-
Target
93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe
-
Size
677KB
-
MD5
081d63a9f21a400c1e9272ff3d7f7771
-
SHA1
3c9ffebf208f002744128f3fc9a9d6c99610e438
-
SHA256
93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1
-
SHA512
f692a77cfd887325e052e35c94580edd15d3f9b37344ca18eb48ec7051d9cf5d3f3f544a84124edd80e289b4eb7666c63ac203b437b42690ab9703f619108c12
-
SSDEEP
12288:7Mr2y90Rpq5LJ2qO7qs6Ks43eMSMFSNUs33z5r7mhkuX142OlIvTJoJ:xywmJbMC43eMnux5rSC842OWvTeJ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3734.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4344-192-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-194-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-191-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-196-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-198-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-200-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-202-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-204-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-206-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-208-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-210-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-212-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-214-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-216-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-218-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-220-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-222-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-224-0x0000000006E40000-0x0000000006E7F000-memory.dmp family_redline behavioral1/memory/4344-273-0x00000000041E0000-0x00000000041F0000-memory.dmp family_redline behavioral1/memory/4344-277-0x00000000041E0000-0x00000000041F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4232 un342604.exe 1516 pro3734.exe 4344 qu0614.exe 3228 si254276.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3734.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3734.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un342604.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un342604.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2216 1516 WerFault.exe 83 1600 4344 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1516 pro3734.exe 1516 pro3734.exe 4344 qu0614.exe 4344 qu0614.exe 3228 si254276.exe 3228 si254276.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1516 pro3734.exe Token: SeDebugPrivilege 4344 qu0614.exe Token: SeDebugPrivilege 3228 si254276.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2028 wrote to memory of 4232 2028 93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe 82 PID 2028 wrote to memory of 4232 2028 93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe 82 PID 2028 wrote to memory of 4232 2028 93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe 82 PID 4232 wrote to memory of 1516 4232 un342604.exe 83 PID 4232 wrote to memory of 1516 4232 un342604.exe 83 PID 4232 wrote to memory of 1516 4232 un342604.exe 83 PID 4232 wrote to memory of 4344 4232 un342604.exe 89 PID 4232 wrote to memory of 4344 4232 un342604.exe 89 PID 4232 wrote to memory of 4344 4232 un342604.exe 89 PID 2028 wrote to memory of 3228 2028 93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe 93 PID 2028 wrote to memory of 3228 2028 93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe 93 PID 2028 wrote to memory of 3228 2028 93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe"C:\Users\Admin\AppData\Local\Temp\93b837153ff81233029287fcd10e96409a0b70e7a740ffd311be6f00114d82f1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un342604.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un342604.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3734.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3734.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 10844⤵
- Program crash
PID:2216
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0614.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0614.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 13404⤵
- Program crash
PID:1600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si254276.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si254276.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1516 -ip 15161⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4344 -ip 43441⤵PID:1856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD53b5ca8e0cbfe7acf6bf2586d329229d6
SHA14d30bc7457422a87d6dea9c982a767a01985853e
SHA256ac844ee5277b029013b15119548998855f646a19b8ca23bf4b952db60310f60e
SHA5126e5e5c18ddf0d1c3553a8d76f07d039e259e109d38c8f992e5db4af5c5b708b5874e2c891338b8cbd276b267f886288241797336638a64468a3088c4867eee89
-
Filesize
176KB
MD53b5ca8e0cbfe7acf6bf2586d329229d6
SHA14d30bc7457422a87d6dea9c982a767a01985853e
SHA256ac844ee5277b029013b15119548998855f646a19b8ca23bf4b952db60310f60e
SHA5126e5e5c18ddf0d1c3553a8d76f07d039e259e109d38c8f992e5db4af5c5b708b5874e2c891338b8cbd276b267f886288241797336638a64468a3088c4867eee89
-
Filesize
535KB
MD5ca69258622b060e74319ec8ba9ca26fa
SHA180c70796a79e5157fec9d512646f012cb1ea78b4
SHA2568ac0e19777db507f976eb8f5780f9fbf0487ad1138157a3fe656ca8338fb71b1
SHA512fc1c24c7d601e8533ab0791953b4e83edf7889c4f9aa55b5caf7943cf4e45923dfb36189318cc09541b0f6d8d5c6723fa385ed288a24fe56bfd64265e4002791
-
Filesize
535KB
MD5ca69258622b060e74319ec8ba9ca26fa
SHA180c70796a79e5157fec9d512646f012cb1ea78b4
SHA2568ac0e19777db507f976eb8f5780f9fbf0487ad1138157a3fe656ca8338fb71b1
SHA512fc1c24c7d601e8533ab0791953b4e83edf7889c4f9aa55b5caf7943cf4e45923dfb36189318cc09541b0f6d8d5c6723fa385ed288a24fe56bfd64265e4002791
-
Filesize
376KB
MD56bfb3db5f44d8a643f7ff7ecc40c391f
SHA1d638f14e05ed4677e3d99cd11687ff4ec8db026a
SHA25610b51daa894a51b1a973afbe85c1c5658bcc0dcf05da0b555c40c2d3190524da
SHA51289b85fc20dda5964c157cfdf13763b7649c04e5859fdd42a3839226069da6eff0cdd1bd61c38f6de22c0cd7681e85ad87fc8e28f0028476356cbcf05d7256ef2
-
Filesize
376KB
MD56bfb3db5f44d8a643f7ff7ecc40c391f
SHA1d638f14e05ed4677e3d99cd11687ff4ec8db026a
SHA25610b51daa894a51b1a973afbe85c1c5658bcc0dcf05da0b555c40c2d3190524da
SHA51289b85fc20dda5964c157cfdf13763b7649c04e5859fdd42a3839226069da6eff0cdd1bd61c38f6de22c0cd7681e85ad87fc8e28f0028476356cbcf05d7256ef2
-
Filesize
435KB
MD54408ae31dc0cbaeefd5f17c7ed2b937d
SHA1358b18f4311c24c7fa2eb190b7d24155ac883640
SHA256a3a5967c5da9d6e257c83025a20d5e6851b9c48f6fbcacb82f42bb63d9540780
SHA512e58f56a2d48f867d694d952a4068acb72c825c4c069824ee990cc3d5de9b04953d71b667a88ec5b0fe2bd7c4ad498ad3ca61758d5acc4c5f6be20d659ab6ce27
-
Filesize
435KB
MD54408ae31dc0cbaeefd5f17c7ed2b937d
SHA1358b18f4311c24c7fa2eb190b7d24155ac883640
SHA256a3a5967c5da9d6e257c83025a20d5e6851b9c48f6fbcacb82f42bb63d9540780
SHA512e58f56a2d48f867d694d952a4068acb72c825c4c069824ee990cc3d5de9b04953d71b667a88ec5b0fe2bd7c4ad498ad3ca61758d5acc4c5f6be20d659ab6ce27