Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe
Resource
win10v2004-20230220-en
General
-
Target
15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe
-
Size
666KB
-
MD5
6d2376fb22162ee60442986367b5a27e
-
SHA1
108e1b97aeb2cea363fab766cc99e8a286ae66b8
-
SHA256
15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7
-
SHA512
a1c2f654e1371e8dc2c6d63578494616456aa9046bd85bb3e5dd35e8b5e5ce05a62c1c82eafd05ce40f1d7e48e2fd1e0ec09794942a2feb03921bd92c1a37596
-
SSDEEP
12288:EMrQy907BAVm5OXS4Nkn67gro1N6gywGrUVMr/wvm/e8bu82jt:Eyst5h4NkygSwhwGrfzwv8z6xt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6692.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/1096-191-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-192-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-194-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-196-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-198-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-200-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-202-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-204-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-206-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-208-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-210-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-212-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-214-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-216-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-218-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-220-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-222-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral1/memory/1096-224-0x0000000002850000-0x000000000288F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 548 un045828.exe 2296 pro6692.exe 1096 qu5147.exe 4576 si651576.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6692.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un045828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un045828.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4436 2296 WerFault.exe 84 4020 1096 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2296 pro6692.exe 2296 pro6692.exe 1096 qu5147.exe 1096 qu5147.exe 4576 si651576.exe 4576 si651576.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2296 pro6692.exe Token: SeDebugPrivilege 1096 qu5147.exe Token: SeDebugPrivilege 4576 si651576.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4400 wrote to memory of 548 4400 15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe 83 PID 4400 wrote to memory of 548 4400 15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe 83 PID 4400 wrote to memory of 548 4400 15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe 83 PID 548 wrote to memory of 2296 548 un045828.exe 84 PID 548 wrote to memory of 2296 548 un045828.exe 84 PID 548 wrote to memory of 2296 548 un045828.exe 84 PID 548 wrote to memory of 1096 548 un045828.exe 91 PID 548 wrote to memory of 1096 548 un045828.exe 91 PID 548 wrote to memory of 1096 548 un045828.exe 91 PID 4400 wrote to memory of 4576 4400 15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe 95 PID 4400 wrote to memory of 4576 4400 15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe 95 PID 4400 wrote to memory of 4576 4400 15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe"C:\Users\Admin\AppData\Local\Temp\15cac80cef10b0419af892a266ffffe72443db0998bacdeaaaabfb73c53d29b7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045828.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045828.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6692.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6692.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 10804⤵
- Program crash
PID:4436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5147.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5147.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 13284⤵
- Program crash
PID:4020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si651576.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si651576.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2296 -ip 22961⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1096 -ip 10961⤵PID:1268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD50f39a37a712d920291843fe6e73e1b91
SHA18128eb88fef521d251170eefa8bf8d6baf3bc20c
SHA256e66feffd4e18b658ad7fbe97e78e1b2867123b797d04c1b39bc92f5b0659f898
SHA5120f580d15550f97744f9e823f7d258f33471c4574dceabc41b6fd3f7437b1dcb78084242c7c0104ac1185bfed6b85d7df980323655b2e2db426e0af3f13b1b15d
-
Filesize
176KB
MD50f39a37a712d920291843fe6e73e1b91
SHA18128eb88fef521d251170eefa8bf8d6baf3bc20c
SHA256e66feffd4e18b658ad7fbe97e78e1b2867123b797d04c1b39bc92f5b0659f898
SHA5120f580d15550f97744f9e823f7d258f33471c4574dceabc41b6fd3f7437b1dcb78084242c7c0104ac1185bfed6b85d7df980323655b2e2db426e0af3f13b1b15d
-
Filesize
524KB
MD545862cc7ec024921b94670d6ee27b453
SHA1d2b4a839c8aa2ca6c6f52c5d5a08a59f7a221bcf
SHA25668806092659f7cb2e1ea0184d330af83c34f049d588480b413dde06a190632d0
SHA51295db386aff8033df251a16ca173537d414ac2464b656f0e8450010a54a41c77e77134362a8dc2da9c5bd1159deec6f2f66bfb27c8edd038cb8e611cf5862d831
-
Filesize
524KB
MD545862cc7ec024921b94670d6ee27b453
SHA1d2b4a839c8aa2ca6c6f52c5d5a08a59f7a221bcf
SHA25668806092659f7cb2e1ea0184d330af83c34f049d588480b413dde06a190632d0
SHA51295db386aff8033df251a16ca173537d414ac2464b656f0e8450010a54a41c77e77134362a8dc2da9c5bd1159deec6f2f66bfb27c8edd038cb8e611cf5862d831
-
Filesize
294KB
MD50c40fc04556659e9432d09a02436d2b8
SHA1b4d5a2be24e9d3387bbbe9dd3e743b404fbb0a1a
SHA256680be2be8e0e71066901761ff0bfeb50b0aea043db39efea155d5593ec20a190
SHA512415dfd16057062273b64813cd34132b88dea7d9bdfafb0c315fcdb5894f1adefa67d69ad6cd441a1907d018b39bc131daccc1d58bfa6eb927af7021b4ff5a870
-
Filesize
294KB
MD50c40fc04556659e9432d09a02436d2b8
SHA1b4d5a2be24e9d3387bbbe9dd3e743b404fbb0a1a
SHA256680be2be8e0e71066901761ff0bfeb50b0aea043db39efea155d5593ec20a190
SHA512415dfd16057062273b64813cd34132b88dea7d9bdfafb0c315fcdb5894f1adefa67d69ad6cd441a1907d018b39bc131daccc1d58bfa6eb927af7021b4ff5a870
-
Filesize
352KB
MD5806131470c64ec74d74f72b48c447a60
SHA124250cc6877430ea8a9ff365f448087c82ae40eb
SHA256fc95935c20ec7ca1b4dc7c7bdfee50ae900895f832da10527cca4bc9bed6bc4f
SHA512d10f372355d67cd4662d0f657f1ad039a6087383c3cf2c70cdc1252bb706f76132988c54e5f220d516ad7a3a053cd1db327c04e5be3f47bb1432ea423f514c49
-
Filesize
352KB
MD5806131470c64ec74d74f72b48c447a60
SHA124250cc6877430ea8a9ff365f448087c82ae40eb
SHA256fc95935c20ec7ca1b4dc7c7bdfee50ae900895f832da10527cca4bc9bed6bc4f
SHA512d10f372355d67cd4662d0f657f1ad039a6087383c3cf2c70cdc1252bb706f76132988c54e5f220d516ad7a3a053cd1db327c04e5be3f47bb1432ea423f514c49