Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
74s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe
Resource
win10v2004-20230220-en
General
-
Target
1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe
-
Size
537KB
-
MD5
74df1d10e0a2edb8eb8fb12a140508d1
-
SHA1
99b578e09980d4d70d383709d8b5eaa01b551b58
-
SHA256
1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6
-
SHA512
8fa145eebd8fca953c64051c9408793e40bc7179fe6362fbbe53d8b43635c53e05c8a742e283b81f0ed4618349b30b75f4e637e5f274479d6578e25864bd4cd7
-
SSDEEP
12288:7MrPy90eRQSkD0TzYFJyU3SHRw+vNFAuNgv:oypRDy0TzCJyfxwMlgv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr732791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr732791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr732791.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr732791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr732791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr732791.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2868-158-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-161-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-159-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-163-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-165-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-167-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-169-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-171-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-173-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-175-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-177-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-179-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-181-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-183-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-185-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-187-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-189-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-191-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-193-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-195-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-197-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-199-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-201-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-203-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-205-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-207-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-209-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-211-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-213-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-215-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-217-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-219-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2868-221-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3116 zimB6878.exe 4448 jr732791.exe 2868 ku992175.exe 4496 lr480870.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr732791.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zimB6878.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zimB6878.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4124 2868 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4448 jr732791.exe 4448 jr732791.exe 2868 ku992175.exe 2868 ku992175.exe 4496 lr480870.exe 4496 lr480870.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4448 jr732791.exe Token: SeDebugPrivilege 2868 ku992175.exe Token: SeDebugPrivilege 4496 lr480870.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2840 wrote to memory of 3116 2840 1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe 84 PID 2840 wrote to memory of 3116 2840 1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe 84 PID 2840 wrote to memory of 3116 2840 1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe 84 PID 3116 wrote to memory of 4448 3116 zimB6878.exe 85 PID 3116 wrote to memory of 4448 3116 zimB6878.exe 85 PID 3116 wrote to memory of 2868 3116 zimB6878.exe 88 PID 3116 wrote to memory of 2868 3116 zimB6878.exe 88 PID 3116 wrote to memory of 2868 3116 zimB6878.exe 88 PID 2840 wrote to memory of 4496 2840 1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe 92 PID 2840 wrote to memory of 4496 2840 1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe 92 PID 2840 wrote to memory of 4496 2840 1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe"C:\Users\Admin\AppData\Local\Temp\1de84a4a3b54cdf20bdcdaa05ef785f628536c302302db8430529a8dc20d6de6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimB6878.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimB6878.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr732791.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr732791.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku992175.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku992175.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 18604⤵
- Program crash
PID:4124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr480870.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr480870.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2868 -ip 28681⤵PID:4772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD51df2b1229bf72cdc0d648bad263de4ee
SHA1d7172fd421134b848874aa9892c21616d4e0e517
SHA256cffb334c2265e3c1fb54642985eb5f156a60385c169300b5dda08c9ea8f62f6d
SHA5128a1c1ef3744c009395e25be6ab491e4758081f46896c916ddd91b5c8f97cdd3d6fd875e815aec8eeef023160302e7d36675608c32e8fe9bc7953b6c1ce98ce14
-
Filesize
176KB
MD51df2b1229bf72cdc0d648bad263de4ee
SHA1d7172fd421134b848874aa9892c21616d4e0e517
SHA256cffb334c2265e3c1fb54642985eb5f156a60385c169300b5dda08c9ea8f62f6d
SHA5128a1c1ef3744c009395e25be6ab491e4758081f46896c916ddd91b5c8f97cdd3d6fd875e815aec8eeef023160302e7d36675608c32e8fe9bc7953b6c1ce98ce14
-
Filesize
395KB
MD5a9e41029d38b1752553b940f30289d2b
SHA14865d2b5650df7f6d704e58ef3b2afc39c3bf27f
SHA256b0642e4f7affec93b35367291c9d0edc21c4b4dadce465c38b25b678255ae274
SHA51263abccc4c06dc6e7b46f79e1d5233f772d20c4de8ff7b84f247747b28f739609520a89576ad31fbb132cac56f08afa2c541ee408f6f8aabcacdbe8f16c83e05e
-
Filesize
395KB
MD5a9e41029d38b1752553b940f30289d2b
SHA14865d2b5650df7f6d704e58ef3b2afc39c3bf27f
SHA256b0642e4f7affec93b35367291c9d0edc21c4b4dadce465c38b25b678255ae274
SHA51263abccc4c06dc6e7b46f79e1d5233f772d20c4de8ff7b84f247747b28f739609520a89576ad31fbb132cac56f08afa2c541ee408f6f8aabcacdbe8f16c83e05e
-
Filesize
14KB
MD5fbbeeaf452b2aaf056d99b857152652c
SHA12266a11e07d641a5905671629b42ccf096af393f
SHA25603ef53e9764d4355cfb393f08661a6fa10a93c34f8c998c385e69909e6761bbf
SHA512a9ad955c68ebf4a237ef003c5bb35608fd1a2605ebeb07ae81a60e0064b5565457cecef837c3990a1e77e63976cd53e0d5bec7df2180548b444a153fcabd10b5
-
Filesize
14KB
MD5fbbeeaf452b2aaf056d99b857152652c
SHA12266a11e07d641a5905671629b42ccf096af393f
SHA25603ef53e9764d4355cfb393f08661a6fa10a93c34f8c998c385e69909e6761bbf
SHA512a9ad955c68ebf4a237ef003c5bb35608fd1a2605ebeb07ae81a60e0064b5565457cecef837c3990a1e77e63976cd53e0d5bec7df2180548b444a153fcabd10b5
-
Filesize
352KB
MD52fde78b0da2668a9a43afe672503c036
SHA1071172e4c18667afb2c12b176ece808c52d1a8de
SHA256a6fd475231c243066546b4c08813da52a93d30960d91869082006c074c83a81b
SHA51243ac36ff41832745dc534f0612a20dbafd0e5abb3f5964d679e6a166bac2deb1c80460d3186161dd68d5ecf71b3b08c2ddba59eddce73c91130e3feb24533cf4
-
Filesize
352KB
MD52fde78b0da2668a9a43afe672503c036
SHA1071172e4c18667afb2c12b176ece808c52d1a8de
SHA256a6fd475231c243066546b4c08813da52a93d30960d91869082006c074c83a81b
SHA51243ac36ff41832745dc534f0612a20dbafd0e5abb3f5964d679e6a166bac2deb1c80460d3186161dd68d5ecf71b3b08c2ddba59eddce73c91130e3feb24533cf4