Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe
Resource
win10v2004-20230220-en
General
-
Target
bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe
-
Size
522KB
-
MD5
5008f9f8130a21f559bfb81dc441cb25
-
SHA1
d5e83f4addd6faeaa906746a12586458123ad9ef
-
SHA256
bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00
-
SHA512
ab7e15ab4a1050d57bc17d0244310fcb9c7f16e0462d55582282c2edb213e160ed79d44d2558c44ac6224d2dc66dfb3982068b6964be2491323286e7a76fa916
-
SSDEEP
12288:oMrVy90DVBT5UDM6yz11DW7VfW32t2RvtlxrpKt:dyaBT5Kyz/KfW32t2RvtnM
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr410625.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr410625.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr410625.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr410625.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr410625.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr410625.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/312-154-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-157-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-155-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-159-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-161-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-165-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-168-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-170-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-172-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-174-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-176-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-178-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-180-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-182-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-184-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-186-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-188-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-190-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-192-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-194-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-196-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-198-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-200-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-202-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-204-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-206-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-208-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-210-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-212-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-214-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-216-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-218-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline behavioral1/memory/312-220-0x0000000004BE0000-0x0000000004C1F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3728 zidE4092.exe 2036 jr410625.exe 312 ku473317.exe 3032 lr213080.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr410625.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidE4092.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidE4092.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1012 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1800 312 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2036 jr410625.exe 2036 jr410625.exe 312 ku473317.exe 312 ku473317.exe 3032 lr213080.exe 3032 lr213080.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2036 jr410625.exe Token: SeDebugPrivilege 312 ku473317.exe Token: SeDebugPrivilege 3032 lr213080.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3620 wrote to memory of 3728 3620 bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe 83 PID 3620 wrote to memory of 3728 3620 bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe 83 PID 3620 wrote to memory of 3728 3620 bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe 83 PID 3728 wrote to memory of 2036 3728 zidE4092.exe 84 PID 3728 wrote to memory of 2036 3728 zidE4092.exe 84 PID 3728 wrote to memory of 312 3728 zidE4092.exe 88 PID 3728 wrote to memory of 312 3728 zidE4092.exe 88 PID 3728 wrote to memory of 312 3728 zidE4092.exe 88 PID 3620 wrote to memory of 3032 3620 bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe 92 PID 3620 wrote to memory of 3032 3620 bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe 92 PID 3620 wrote to memory of 3032 3620 bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe"C:\Users\Admin\AppData\Local\Temp\bf8fb710ae1d17ced7e502230092c21ad57d85ed8c2a17446699fcc76755bb00.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidE4092.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidE4092.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr410625.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr410625.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku473317.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku473317.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 312 -s 19964⤵
- Program crash
PID:1800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr213080.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr213080.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 312 -ip 3121⤵PID:1496
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5a383bc7972b4646aa20104d7beb43afa
SHA10ca859aeda6cfe94970c94efc6fc9dc539d848ba
SHA256a5dbab88a7bd697236fbf06cd82298cd2d729114c62e06a7c038ba4c08243b29
SHA5125326ba9a0b08d1f4a2275e82bfcf00b5ef96992098a13c8d3aafd115d85a1460733b6993265be96582501646a3435d4fa51aa3bfa36ef36944c650c71a1f938a
-
Filesize
177KB
MD5a383bc7972b4646aa20104d7beb43afa
SHA10ca859aeda6cfe94970c94efc6fc9dc539d848ba
SHA256a5dbab88a7bd697236fbf06cd82298cd2d729114c62e06a7c038ba4c08243b29
SHA5125326ba9a0b08d1f4a2275e82bfcf00b5ef96992098a13c8d3aafd115d85a1460733b6993265be96582501646a3435d4fa51aa3bfa36ef36944c650c71a1f938a
-
Filesize
379KB
MD577605d6e888e7c61956bb9539bf81985
SHA1cbf1f74d6bf28ad988956d0bf0f3026106c1ad3d
SHA256b89035b8ceb717413119e594a4d1ffb3c700249c72c130158e15a235e2926a9c
SHA512f65a61db08645a8039bf0d15d319f3c9e983849eca5c939f0b9857c45f69327cff482f21a45dd645ce53eed90fe52548f30e43688a74d1b79b706e44fb6f8857
-
Filesize
379KB
MD577605d6e888e7c61956bb9539bf81985
SHA1cbf1f74d6bf28ad988956d0bf0f3026106c1ad3d
SHA256b89035b8ceb717413119e594a4d1ffb3c700249c72c130158e15a235e2926a9c
SHA512f65a61db08645a8039bf0d15d319f3c9e983849eca5c939f0b9857c45f69327cff482f21a45dd645ce53eed90fe52548f30e43688a74d1b79b706e44fb6f8857
-
Filesize
14KB
MD5ce6ee279385d3d44e9ab058972a924f9
SHA12eaa2e5f24016ddc08e82eb159dbdf07adac0f2b
SHA2569662b61c6fb50263ad238c4383e1900eb2df3e2fd3b8fc6fb46acbeada1cfb37
SHA512bd86ddd2228d0f6b0348c9713ddd8bf2be6069ca406edbe1e488116513bb9f66a7d37c0b034c12803efce39a390ec4f429acdfa99bcefd736853d5d04baa9ba6
-
Filesize
14KB
MD5ce6ee279385d3d44e9ab058972a924f9
SHA12eaa2e5f24016ddc08e82eb159dbdf07adac0f2b
SHA2569662b61c6fb50263ad238c4383e1900eb2df3e2fd3b8fc6fb46acbeada1cfb37
SHA512bd86ddd2228d0f6b0348c9713ddd8bf2be6069ca406edbe1e488116513bb9f66a7d37c0b034c12803efce39a390ec4f429acdfa99bcefd736853d5d04baa9ba6
-
Filesize
295KB
MD5bd11e8bae9884b73d9cb090b88f7c8ef
SHA10a784a619c0f7bb27764cf6fb6215ee37e5759d2
SHA256f4e9144d0fdbb2650ba5bb6dc4f25330d9ee5544fce1158e7aa4bc9b7f86355c
SHA51261a23de971caaf12e80e4316d2ed13689bfab1cfd2521d03eae15b2b403b1d1e889a30b360e91d8712b60dd3873338025eef5b8c9f5b94f71841fff0f18457ca
-
Filesize
295KB
MD5bd11e8bae9884b73d9cb090b88f7c8ef
SHA10a784a619c0f7bb27764cf6fb6215ee37e5759d2
SHA256f4e9144d0fdbb2650ba5bb6dc4f25330d9ee5544fce1158e7aa4bc9b7f86355c
SHA51261a23de971caaf12e80e4316d2ed13689bfab1cfd2521d03eae15b2b403b1d1e889a30b360e91d8712b60dd3873338025eef5b8c9f5b94f71841fff0f18457ca