Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe
Resource
win10v2004-20230220-en
General
-
Target
cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe
-
Size
537KB
-
MD5
4137c3abcce8d3911920a8b52aae17a8
-
SHA1
8afed504eedd73a1d5851bc92f8af1108f6720ad
-
SHA256
cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b
-
SHA512
5fbc8133bd8d604d4b2c4a7cfc597ef86048847e5de96602ba5c9ddab436bd716d5d7786784e08bf16ed6f974cd976686c8150c5472f85ab19b9cbc3a0fa5b76
-
SSDEEP
12288:MMrGy90ry8k9yFZq+rKovBl3HrUNcHcwQsotSogV/RJkV:Cyw9k94Z1z/rH8wzaNgV/i
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr409696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr409696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr409696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr409696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr409696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr409696.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/1164-156-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-159-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-157-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-161-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-163-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-165-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-167-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-169-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-171-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-173-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-175-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-177-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-179-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-181-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-183-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-185-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-187-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-190-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-193-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-195-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-197-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-199-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-201-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-203-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-205-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-207-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-209-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-211-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-213-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-215-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-217-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-219-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-221-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1164-1073-0x0000000004EE0000-0x0000000004EF0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4592 ziVe9591.exe 2104 jr409696.exe 1164 ku542268.exe 4004 lr742189.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr409696.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVe9591.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziVe9591.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 640 1164 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2104 jr409696.exe 2104 jr409696.exe 1164 ku542268.exe 1164 ku542268.exe 4004 lr742189.exe 4004 lr742189.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2104 jr409696.exe Token: SeDebugPrivilege 1164 ku542268.exe Token: SeDebugPrivilege 4004 lr742189.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4592 1176 cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe 83 PID 1176 wrote to memory of 4592 1176 cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe 83 PID 1176 wrote to memory of 4592 1176 cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe 83 PID 4592 wrote to memory of 2104 4592 ziVe9591.exe 84 PID 4592 wrote to memory of 2104 4592 ziVe9591.exe 84 PID 4592 wrote to memory of 1164 4592 ziVe9591.exe 88 PID 4592 wrote to memory of 1164 4592 ziVe9591.exe 88 PID 4592 wrote to memory of 1164 4592 ziVe9591.exe 88 PID 1176 wrote to memory of 4004 1176 cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe 92 PID 1176 wrote to memory of 4004 1176 cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe 92 PID 1176 wrote to memory of 4004 1176 cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe"C:\Users\Admin\AppData\Local\Temp\cba9b38f8287f9ab974c904a34c723d423afb54aabc351bb38945e8f75f8661b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVe9591.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVe9591.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr409696.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr409696.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku542268.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku542268.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 13364⤵
- Program crash
PID:640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742189.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742189.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1164 -ip 11641⤵PID:4220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5710bc0812e3abeb3edc9d27f6605e179
SHA1c769be7e1d245bc408ddfca4ef9394c06400120c
SHA256e53e1d752f11d83a4451d39c0ce79e438a594560809ee4a76ce00acf8a556848
SHA5123c12f6d91eb28c13650c8b2ca46f77042cc50a8e4cbf408358843a07e8e78b645c3bdbc40b004fcd90be11f1949b2bd6d478ea406bb66b76eb724305e2cce260
-
Filesize
176KB
MD5710bc0812e3abeb3edc9d27f6605e179
SHA1c769be7e1d245bc408ddfca4ef9394c06400120c
SHA256e53e1d752f11d83a4451d39c0ce79e438a594560809ee4a76ce00acf8a556848
SHA5123c12f6d91eb28c13650c8b2ca46f77042cc50a8e4cbf408358843a07e8e78b645c3bdbc40b004fcd90be11f1949b2bd6d478ea406bb66b76eb724305e2cce260
-
Filesize
395KB
MD599bb8231e819e44f5d3f5b47394f0acd
SHA1fc5e5d983b92779b6559c83610173354aa81a7ab
SHA256059e869ed841670192ab3dd89e44f857a21e75275d1a1d4d20e7b299473a58e1
SHA512f2fe98361270263100b9ec6c15bfe71b0b860263fa0c535bbc3b7839d5143c75861588a32744f39779b21defc5cd7bda96c57f4af959142277c2dc6b344e418c
-
Filesize
395KB
MD599bb8231e819e44f5d3f5b47394f0acd
SHA1fc5e5d983b92779b6559c83610173354aa81a7ab
SHA256059e869ed841670192ab3dd89e44f857a21e75275d1a1d4d20e7b299473a58e1
SHA512f2fe98361270263100b9ec6c15bfe71b0b860263fa0c535bbc3b7839d5143c75861588a32744f39779b21defc5cd7bda96c57f4af959142277c2dc6b344e418c
-
Filesize
14KB
MD51773c9f85913e8fbfbb70603455f9844
SHA1922702cce7fbb429f269b2fbd4307d4e3ca8a728
SHA256a2a0de4de489c3734fecab21da431f29ab336d646674cb72047ab52a5432db82
SHA512303306573fdd5c193f58bc2aaaafd02dc351b030d56f019dc67b1506981859a8a187a56b3d4d42390bf3d9743dfe0de5f7a04d2cf96d12971ebaee6c4423e384
-
Filesize
14KB
MD51773c9f85913e8fbfbb70603455f9844
SHA1922702cce7fbb429f269b2fbd4307d4e3ca8a728
SHA256a2a0de4de489c3734fecab21da431f29ab336d646674cb72047ab52a5432db82
SHA512303306573fdd5c193f58bc2aaaafd02dc351b030d56f019dc67b1506981859a8a187a56b3d4d42390bf3d9743dfe0de5f7a04d2cf96d12971ebaee6c4423e384
-
Filesize
352KB
MD5d667283901f2c7c9d8b71d7be922992d
SHA199717cf59c93632d165cf9a91ef15afc38926bd8
SHA256aaa2ccb3a6d1c74183cbaeba1cac68312bdb4a0723db7a6a2f7f36647c6ac33f
SHA5129880a4abc28ab048e3f076c6015029ca204b927236144565b55d331d3a3e65d93805d1c322cb7928704a3bc71708da918bba2d600471f6ee5d9201470cdad606
-
Filesize
352KB
MD5d667283901f2c7c9d8b71d7be922992d
SHA199717cf59c93632d165cf9a91ef15afc38926bd8
SHA256aaa2ccb3a6d1c74183cbaeba1cac68312bdb4a0723db7a6a2f7f36647c6ac33f
SHA5129880a4abc28ab048e3f076c6015029ca204b927236144565b55d331d3a3e65d93805d1c322cb7928704a3bc71708da918bba2d600471f6ee5d9201470cdad606