Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
82s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 07:23
Static task
static1
Behavioral task
behavioral1
Sample
4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe
Resource
win10v2004-20230220-en
General
-
Target
4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe
-
Size
523KB
-
MD5
9ff3ff42edd49a29a1ad841136be2b96
-
SHA1
8eebf1e99d7e18bb8daf9ebfa5e1754653684c13
-
SHA256
4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e
-
SHA512
5edb5fe1f0986e315ff0076f5fd6cc8737aca97c2e522e213457a0d0f4c0cc0e01a11b4070f613151c9e97122be270bbbd87ecd384f11c37d52ec9e572e31313
-
SSDEEP
12288:nMrjy90gn5TSXsMQkdlVnqhtbBi0BjKGO:AyP5TejWb5KGO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr746813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr746813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr746813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr746813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr746813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr746813.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/5016-155-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-156-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-158-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-160-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-167-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-164-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-169-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-171-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-173-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-175-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-177-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-179-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-181-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-183-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-185-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-187-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-189-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-191-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-193-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-195-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-197-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-199-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-203-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-201-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-205-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-207-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-209-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-211-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-213-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-215-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-217-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-219-0x0000000002510000-0x000000000254F000-memory.dmp family_redline behavioral1/memory/5016-221-0x0000000002510000-0x000000000254F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2152 zizQ9075.exe 1276 jr746813.exe 5016 ku432071.exe 1564 lr723682.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr746813.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zizQ9075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizQ9075.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 392 5016 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1276 jr746813.exe 1276 jr746813.exe 5016 ku432071.exe 5016 ku432071.exe 1564 lr723682.exe 1564 lr723682.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1276 jr746813.exe Token: SeDebugPrivilege 5016 ku432071.exe Token: SeDebugPrivilege 1564 lr723682.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2152 1916 4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe 84 PID 1916 wrote to memory of 2152 1916 4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe 84 PID 1916 wrote to memory of 2152 1916 4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe 84 PID 2152 wrote to memory of 1276 2152 zizQ9075.exe 85 PID 2152 wrote to memory of 1276 2152 zizQ9075.exe 85 PID 2152 wrote to memory of 5016 2152 zizQ9075.exe 90 PID 2152 wrote to memory of 5016 2152 zizQ9075.exe 90 PID 2152 wrote to memory of 5016 2152 zizQ9075.exe 90 PID 1916 wrote to memory of 1564 1916 4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe 97 PID 1916 wrote to memory of 1564 1916 4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe 97 PID 1916 wrote to memory of 1564 1916 4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe"C:\Users\Admin\AppData\Local\Temp\4f1f420b98b6f63eb3642f43f2847954ebf316e05e6f9194ef55f0dd3a46a40e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizQ9075.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizQ9075.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr746813.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr746813.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku432071.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku432071.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 18404⤵
- Program crash
PID:392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr723682.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr723682.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5016 -ip 50161⤵PID:4716
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5c836f26614268670c47d613b9b679480
SHA1e14366a86d8be7633305f1ab9d2e34186c3c00f0
SHA256b397bfef756835614aa6d6903f39a9d7384e52de6d406d30cd2d175be692c053
SHA512a3ebe4fd67da31db33cfc7c40b76dab9c56d715a165c86be8ae6a5cffef5526e3bbb3cbbb7fac1736d9ae276c5b78473c25344e5fa3b2b3e5927d1514c90da0b
-
Filesize
176KB
MD5c836f26614268670c47d613b9b679480
SHA1e14366a86d8be7633305f1ab9d2e34186c3c00f0
SHA256b397bfef756835614aa6d6903f39a9d7384e52de6d406d30cd2d175be692c053
SHA512a3ebe4fd67da31db33cfc7c40b76dab9c56d715a165c86be8ae6a5cffef5526e3bbb3cbbb7fac1736d9ae276c5b78473c25344e5fa3b2b3e5927d1514c90da0b
-
Filesize
380KB
MD543611b7cc4d16ac817647cd06db2a8e1
SHA14c21a2d22879e501318ca8b2206e4794c2dfebc1
SHA256177cd352902b3dea315e1542d9e66f314ed3ec60d2f3850245005d128f69219e
SHA512e4a8ba8813f842a4b0cbfc9fd3530c46fbbf42cc8f385f76f1b7e7c1e102ad9d3da068659731f3d8435f76c3df0f3702955b36e87df61de1b5fe6f3e1e9556c3
-
Filesize
380KB
MD543611b7cc4d16ac817647cd06db2a8e1
SHA14c21a2d22879e501318ca8b2206e4794c2dfebc1
SHA256177cd352902b3dea315e1542d9e66f314ed3ec60d2f3850245005d128f69219e
SHA512e4a8ba8813f842a4b0cbfc9fd3530c46fbbf42cc8f385f76f1b7e7c1e102ad9d3da068659731f3d8435f76c3df0f3702955b36e87df61de1b5fe6f3e1e9556c3
-
Filesize
14KB
MD5e91d639f1b06b4421173f8770d6ba65e
SHA189892aca9e608492b6dd713ea98c7abefefd146c
SHA256f0bb76709ec843e136a38b8abfee184b479c747312fef1634d9d2631a885bc4b
SHA5124d970c23906913e9e798b0acb6d81a2818eb7281b1226d2c3f7b4ebb24bbe7df73e4cb89ca2f3fd6c67d27afdb93f6e43f06db5afb74e37352598c2332e2d6d8
-
Filesize
14KB
MD5e91d639f1b06b4421173f8770d6ba65e
SHA189892aca9e608492b6dd713ea98c7abefefd146c
SHA256f0bb76709ec843e136a38b8abfee184b479c747312fef1634d9d2631a885bc4b
SHA5124d970c23906913e9e798b0acb6d81a2818eb7281b1226d2c3f7b4ebb24bbe7df73e4cb89ca2f3fd6c67d27afdb93f6e43f06db5afb74e37352598c2332e2d6d8
-
Filesize
295KB
MD5076f050d94349c70fd78ab544b54b051
SHA1a52cb27d5b7c79bea840ba47027918e5528aaf22
SHA256f539911b53b30bb228495a09cf7d36d8ccb3600b96d680420d033cfb9cd3c352
SHA51267cc1bda764ecd5a9d2dcd7f226651283918e02cc1f34f5f78fac066815c83c27a2f6e56e3a6167c257210fb3dca6ded7a6daa137d3429b3c0064dc89c71139f
-
Filesize
295KB
MD5076f050d94349c70fd78ab544b54b051
SHA1a52cb27d5b7c79bea840ba47027918e5528aaf22
SHA256f539911b53b30bb228495a09cf7d36d8ccb3600b96d680420d033cfb9cd3c352
SHA51267cc1bda764ecd5a9d2dcd7f226651283918e02cc1f34f5f78fac066815c83c27a2f6e56e3a6167c257210fb3dca6ded7a6daa137d3429b3c0064dc89c71139f