Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe
Resource
win10v2004-20230221-en
General
-
Target
18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe
-
Size
522KB
-
MD5
9cfb9d1071fc46b3560748ab3b711285
-
SHA1
8f00593ea47f8dba5072fd246292a5bc612f32c6
-
SHA256
18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737
-
SHA512
0e8d958e4b1a39b2a29e9668116d1ae5a51726373fef3854d8f859b801ff6be3d3a4c2c5c65e8640ef778e05e44cd17269c6dc144b10d5f8d7dd4a913ae42758
-
SSDEEP
12288:jMrty90ljvNtQGGvSxVK6q0PmHJRtSAlbTyzYrSP:KyujvNtQGhxI6q0Pgz1TyzdP
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr303256.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr303256.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr303256.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr303256.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr303256.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr303256.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/2844-155-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-156-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-158-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-160-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-162-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-164-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-166-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-172-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-173-0x0000000004E50000-0x0000000004E60000-memory.dmp family_redline behavioral1/memory/2844-175-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-168-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-177-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-179-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-181-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-183-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-185-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-187-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-189-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-191-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-193-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-195-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-197-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-199-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-201-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-203-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-205-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-207-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-209-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-211-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-213-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-215-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-217-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-219-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline behavioral1/memory/2844-221-0x00000000027A0000-0x00000000027DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4808 ziuR5542.exe 2072 jr303256.exe 2844 ku547453.exe 4400 lr886411.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr303256.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziuR5542.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziuR5542.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1276 2844 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2072 jr303256.exe 2072 jr303256.exe 2844 ku547453.exe 2844 ku547453.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2072 jr303256.exe Token: SeDebugPrivilege 2844 ku547453.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2612 wrote to memory of 4808 2612 18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe 83 PID 2612 wrote to memory of 4808 2612 18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe 83 PID 2612 wrote to memory of 4808 2612 18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe 83 PID 4808 wrote to memory of 2072 4808 ziuR5542.exe 84 PID 4808 wrote to memory of 2072 4808 ziuR5542.exe 84 PID 4808 wrote to memory of 2844 4808 ziuR5542.exe 89 PID 4808 wrote to memory of 2844 4808 ziuR5542.exe 89 PID 4808 wrote to memory of 2844 4808 ziuR5542.exe 89 PID 2612 wrote to memory of 4400 2612 18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe 95 PID 2612 wrote to memory of 4400 2612 18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe 95 PID 2612 wrote to memory of 4400 2612 18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe"C:\Users\Admin\AppData\Local\Temp\18c8890a0790d0bf85e1090ce81faa07488743045b6663e8e1ee681114d9e737.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuR5542.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuR5542.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr303256.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr303256.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku547453.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku547453.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 13324⤵
- Program crash
PID:1276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr886411.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr886411.exe2⤵
- Executes dropped EXE
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2844 -ip 28441⤵PID:4560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5b103e3c00b6fc01803501daf7f16a04e
SHA1a7fd0b847ca501f3fbd1c021158f6c06ef0a5ee8
SHA25696b6caf238aeaddb269402c7c6920fb1a9f62e242ca14370d265e0ecc6c23ce3
SHA5124cf5d70361239d0764a859b4ff4e2dc5d33c94dd2da618c1ca5f894fd623273e0a8a93bce2fb881825042806bc230dfe8348db7ecbaf9a28b6cd29577992a284
-
Filesize
379KB
MD5edb2f0860442acab778307b41bb891b5
SHA10ffe3c59d631f31084a2646d0d5cd4dd29fbd6da
SHA25673943be20e501038ebd112a60c44040bd6e880efba55e12ee8598f7f4dedcaed
SHA51265c342be3c82990fee71997607961b3514afe56d6bb66fbe0022c287f206a97f7f45744654b2741751d1742db0d6dd5bd33a90d7e991762dd4eb712733e69083
-
Filesize
379KB
MD5edb2f0860442acab778307b41bb891b5
SHA10ffe3c59d631f31084a2646d0d5cd4dd29fbd6da
SHA25673943be20e501038ebd112a60c44040bd6e880efba55e12ee8598f7f4dedcaed
SHA51265c342be3c82990fee71997607961b3514afe56d6bb66fbe0022c287f206a97f7f45744654b2741751d1742db0d6dd5bd33a90d7e991762dd4eb712733e69083
-
Filesize
14KB
MD594099b28a1a6b974ca178f8265524172
SHA1310b0d5d4cacbeef4ce7f79b1a17ecf1715ec89b
SHA25606dca6cf47bb5b83a6001b08b64142b9d7c6164ffe9f72cfaed1de408d343e62
SHA512222f32c3f7e74ee44b04d16dcf343e7c74389abc15ddd1401cd62796bf750bbef3962ed5cf552e9b69fb47aeb38d7a59d7f56a4084074243189c2bf543f38fcc
-
Filesize
14KB
MD594099b28a1a6b974ca178f8265524172
SHA1310b0d5d4cacbeef4ce7f79b1a17ecf1715ec89b
SHA25606dca6cf47bb5b83a6001b08b64142b9d7c6164ffe9f72cfaed1de408d343e62
SHA512222f32c3f7e74ee44b04d16dcf343e7c74389abc15ddd1401cd62796bf750bbef3962ed5cf552e9b69fb47aeb38d7a59d7f56a4084074243189c2bf543f38fcc
-
Filesize
295KB
MD59d2d55413148acb1fb50862aa88dd399
SHA1819c22e729e5da3c58a00fbffadf1335729b0a86
SHA256ea53b858a7ad946c3cc0be6cc812179a7e4d4da3c147699a525113c88f208cc5
SHA5126f8122ee6a24c1e08462561fe9af69ed54cf55f2ecefadc7e78cdd1d4d846e1edba88b049536b17efff6ed1f853bd7233a16323ef7832bc4da99c5cbc5074b59
-
Filesize
295KB
MD59d2d55413148acb1fb50862aa88dd399
SHA1819c22e729e5da3c58a00fbffadf1335729b0a86
SHA256ea53b858a7ad946c3cc0be6cc812179a7e4d4da3c147699a525113c88f208cc5
SHA5126f8122ee6a24c1e08462561fe9af69ed54cf55f2ecefadc7e78cdd1d4d846e1edba88b049536b17efff6ed1f853bd7233a16323ef7832bc4da99c5cbc5074b59