Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe
Resource
win10v2004-20230220-en
General
-
Target
86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe
-
Size
536KB
-
MD5
3f51ef96a0e45e54705191e435cc35a8
-
SHA1
d1486f9f785a3033277314d5a24d6729112bd4e3
-
SHA256
86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b
-
SHA512
7a335682bb4e5984dc2dee7c57e4615657c011b441941e702377e98be46c1174c4e04939f978f06d777cf6186a787aa5d8ff93220b204b3607c30eef8f6a78d6
-
SSDEEP
12288:tMruy90I/SA93FE3EhyDQNbzeHScLEl0TeWMk:XyT3FdyQNbJcC0dH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr041762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr041762.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr041762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr041762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr041762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr041762.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2472-158-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-159-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-161-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-163-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-165-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-167-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-169-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-171-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-173-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-175-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-177-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-179-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-181-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-183-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-185-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-187-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-189-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-191-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-193-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-195-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-197-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-199-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-201-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-205-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-203-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-207-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-209-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-211-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-213-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-215-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-217-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-219-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline behavioral1/memory/2472-221-0x0000000004DC0000-0x0000000004DFF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3168 ziiB9791.exe 1128 jr041762.exe 2472 ku073245.exe 1800 lr965445.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr041762.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziiB9791.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziiB9791.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1876 2472 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1128 jr041762.exe 1128 jr041762.exe 2472 ku073245.exe 2472 ku073245.exe 1800 lr965445.exe 1800 lr965445.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1128 jr041762.exe Token: SeDebugPrivilege 2472 ku073245.exe Token: SeDebugPrivilege 1800 lr965445.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2000 wrote to memory of 3168 2000 86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe 79 PID 2000 wrote to memory of 3168 2000 86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe 79 PID 2000 wrote to memory of 3168 2000 86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe 79 PID 3168 wrote to memory of 1128 3168 ziiB9791.exe 80 PID 3168 wrote to memory of 1128 3168 ziiB9791.exe 80 PID 3168 wrote to memory of 2472 3168 ziiB9791.exe 87 PID 3168 wrote to memory of 2472 3168 ziiB9791.exe 87 PID 3168 wrote to memory of 2472 3168 ziiB9791.exe 87 PID 2000 wrote to memory of 1800 2000 86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe 95 PID 2000 wrote to memory of 1800 2000 86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe 95 PID 2000 wrote to memory of 1800 2000 86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe"C:\Users\Admin\AppData\Local\Temp\86489bbc98dbc75db70aa76557027e893dd85a7b53f538f8c41281cb3475254b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiB9791.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiB9791.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr041762.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr041762.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku073245.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku073245.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 13604⤵
- Program crash
PID:1876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr965445.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr965445.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2472 -ip 24721⤵PID:1376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d27a7f290deb6580892af177bd22c808
SHA1f43d00b8513001127ed103ae93e31317f90c6751
SHA256d51e90103f2b8e5cd5aced604d1778fbfc0560c46ded50e9c06829d098f24927
SHA5127d9f90b18ede6f89708408dcb43e493add83517ee68a76fb129628c149974ec23a724ad7ded79c358ddd18a02f7ed2a6c6d169a877e9e5ca75633d4345bdf2b1
-
Filesize
175KB
MD5d27a7f290deb6580892af177bd22c808
SHA1f43d00b8513001127ed103ae93e31317f90c6751
SHA256d51e90103f2b8e5cd5aced604d1778fbfc0560c46ded50e9c06829d098f24927
SHA5127d9f90b18ede6f89708408dcb43e493add83517ee68a76fb129628c149974ec23a724ad7ded79c358ddd18a02f7ed2a6c6d169a877e9e5ca75633d4345bdf2b1
-
Filesize
394KB
MD50d561247d4530e3ab57af36c3e17eb01
SHA193f517503b430e8d4bd977488c60db523f4f01b3
SHA2561ab327a8f9fbd8125181951a998473473404154dcea1a7c5be39c3e028ae4712
SHA512ea472b6aa40252f24ddaff6ccf4c1ebc7d1d737652d9d7a58f622dd11995b9a04b8cef53fd4a6a25dafeeef98236c9ab6f6eb68f49abf65ee31ccba9cdea9b60
-
Filesize
394KB
MD50d561247d4530e3ab57af36c3e17eb01
SHA193f517503b430e8d4bd977488c60db523f4f01b3
SHA2561ab327a8f9fbd8125181951a998473473404154dcea1a7c5be39c3e028ae4712
SHA512ea472b6aa40252f24ddaff6ccf4c1ebc7d1d737652d9d7a58f622dd11995b9a04b8cef53fd4a6a25dafeeef98236c9ab6f6eb68f49abf65ee31ccba9cdea9b60
-
Filesize
13KB
MD54b6a1a2c1d47814b8d2cb15acdc2388b
SHA19b18a65e7ab6c4ee38bc438a6acc53ec5eb1353b
SHA2568dba03ec5b19f7c241ed425a0c706952f55f6e83df7728f16822ba21d7477a3e
SHA512328436785d1366d1e8e24e9ede70e2dc81987442d388cef8a9335cc2f4f8bee5e789c5e296c25b6495225c8356afb85b522a651f88005e369778d88e2bb14256
-
Filesize
13KB
MD54b6a1a2c1d47814b8d2cb15acdc2388b
SHA19b18a65e7ab6c4ee38bc438a6acc53ec5eb1353b
SHA2568dba03ec5b19f7c241ed425a0c706952f55f6e83df7728f16822ba21d7477a3e
SHA512328436785d1366d1e8e24e9ede70e2dc81987442d388cef8a9335cc2f4f8bee5e789c5e296c25b6495225c8356afb85b522a651f88005e369778d88e2bb14256
-
Filesize
353KB
MD56c5bf9d27765e855788aed9283ebe2ae
SHA1d168df1a11b5534fd54317410f05501b49ee032e
SHA256074364c7c5e7a3338df29f1030d08690a5a74f3467b6fc03fd8e411cdf6db77a
SHA512deece57637e27d7fe7b191bb9254a7a98e25ee2a4e99a6ac4db6d65af4bef1bb64efcea2c86c6a3e9b4a39a1c679583d91c98cd5634ea31b492c8d2a2153371e
-
Filesize
353KB
MD56c5bf9d27765e855788aed9283ebe2ae
SHA1d168df1a11b5534fd54317410f05501b49ee032e
SHA256074364c7c5e7a3338df29f1030d08690a5a74f3467b6fc03fd8e411cdf6db77a
SHA512deece57637e27d7fe7b191bb9254a7a98e25ee2a4e99a6ac4db6d65af4bef1bb64efcea2c86c6a3e9b4a39a1c679583d91c98cd5634ea31b492c8d2a2153371e