Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
12/04/2023, 14:09
Static task
static1
General
-
Target
03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe
-
Size
1.0MB
-
MD5
fb5b9a86aae814f1733fe3c5ccf06776
-
SHA1
0a3f267eff792f4aa08c078f0661f75b18d69d1d
-
SHA256
03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e
-
SHA512
029ea1e3337dd4efcd191be5f12b66bf023f364ab45c0a9bae610ce3c859e1329f06d6fd80663bc079ec27c1df7dc150dd2dcd6e171edc74e523b6291752783f
-
SSDEEP
24576:YymQ5DwjxMQXMoOBOPGQbAPvp8PD15zGZXKGxuX9s2uis1:fmgEqQvOOPDbCvp8Zmduts3N
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it097787.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it097787.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it097787.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it097787.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it097787.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1216 ziVj8809.exe 1472 ziHg1407.exe 1620 it097787.exe 1772 jr745649.exe 4476 1.exe 4288 kp053481.exe 1368 lr498425.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it097787.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziVj8809.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVj8809.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziHg1407.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziHg1407.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4100 1368 WerFault.exe 73 4040 1368 WerFault.exe 73 4824 1368 WerFault.exe 73 1104 1368 WerFault.exe 73 2124 1368 WerFault.exe 73 2860 1368 WerFault.exe 73 4836 1368 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1620 it097787.exe 1620 it097787.exe 4288 kp053481.exe 4476 1.exe 4288 kp053481.exe 4476 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1620 it097787.exe Token: SeDebugPrivilege 1772 jr745649.exe Token: SeDebugPrivilege 4288 kp053481.exe Token: SeDebugPrivilege 4476 1.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 5044 wrote to memory of 1216 5044 03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe 66 PID 5044 wrote to memory of 1216 5044 03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe 66 PID 5044 wrote to memory of 1216 5044 03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe 66 PID 1216 wrote to memory of 1472 1216 ziVj8809.exe 67 PID 1216 wrote to memory of 1472 1216 ziVj8809.exe 67 PID 1216 wrote to memory of 1472 1216 ziVj8809.exe 67 PID 1472 wrote to memory of 1620 1472 ziHg1407.exe 68 PID 1472 wrote to memory of 1620 1472 ziHg1407.exe 68 PID 1472 wrote to memory of 1772 1472 ziHg1407.exe 69 PID 1472 wrote to memory of 1772 1472 ziHg1407.exe 69 PID 1472 wrote to memory of 1772 1472 ziHg1407.exe 69 PID 1772 wrote to memory of 4476 1772 jr745649.exe 70 PID 1772 wrote to memory of 4476 1772 jr745649.exe 70 PID 1772 wrote to memory of 4476 1772 jr745649.exe 70 PID 1216 wrote to memory of 4288 1216 ziVj8809.exe 71 PID 1216 wrote to memory of 4288 1216 ziVj8809.exe 71 PID 1216 wrote to memory of 4288 1216 ziVj8809.exe 71 PID 5044 wrote to memory of 1368 5044 03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe 73 PID 5044 wrote to memory of 1368 5044 03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe 73 PID 5044 wrote to memory of 1368 5044 03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe"C:\Users\Admin\AppData\Local\Temp\03e86463582ad0ae7f6206d16de59637c85f8fc0914bcc9ef6f0f1114ef7c10e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVj8809.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVj8809.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHg1407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHg1407.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it097787.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it097787.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr745649.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr745649.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp053481.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp053481.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr498425.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr498425.exe2⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 6283⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 7043⤵
- Program crash
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 7763⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 8563⤵
- Program crash
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 8803⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 8163⤵
- Program crash
PID:2860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 10363⤵
- Program crash
PID:4836
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD5430a80f73c8b5fe97d7599d09fe13970
SHA15eeab7a13bba2b953dd88b384b81b771a9e0db8f
SHA256b02397ff98e7829a668e6441fdc8eb6a407a8e9c650e6e09952a1fbf58fa6740
SHA512e75c7c248bf4a778f3694821cbaae358307082813279f2783e0f738380a94dff10fd72fb9b1fce0bd641cd2701193ba4f370e485c7963951ee690b60b0cc4220
-
Filesize
394KB
MD5430a80f73c8b5fe97d7599d09fe13970
SHA15eeab7a13bba2b953dd88b384b81b771a9e0db8f
SHA256b02397ff98e7829a668e6441fdc8eb6a407a8e9c650e6e09952a1fbf58fa6740
SHA512e75c7c248bf4a778f3694821cbaae358307082813279f2783e0f738380a94dff10fd72fb9b1fce0bd641cd2701193ba4f370e485c7963951ee690b60b0cc4220
-
Filesize
713KB
MD555c9722a25acff1d7fb0b0cadab9c488
SHA1b2886173e1e46b9dd407afd8164b4068104afc18
SHA25682a54bd36ca3ca73c2acf1ba6462f669c723731c87a93abe9f79925ce6e9b298
SHA512ec2cfd7b5a60d5728cc1d5eee9f3e589f649a9412b3328a174aedc6a53b6b6a76ba545fa08e135e70c567239f91c0767c46537485ee9251cf24f2e8fd630b3fa
-
Filesize
713KB
MD555c9722a25acff1d7fb0b0cadab9c488
SHA1b2886173e1e46b9dd407afd8164b4068104afc18
SHA25682a54bd36ca3ca73c2acf1ba6462f669c723731c87a93abe9f79925ce6e9b298
SHA512ec2cfd7b5a60d5728cc1d5eee9f3e589f649a9412b3328a174aedc6a53b6b6a76ba545fa08e135e70c567239f91c0767c46537485ee9251cf24f2e8fd630b3fa
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
559KB
MD5940e74f26325bf1a4f1c2fed7479e687
SHA143bbf9b9731ceda495bca3de4fe0652aff339030
SHA2562a66ffa9698272bd17389be93af9cffbdfd048a16a5ea7c0e882db8a53d646e2
SHA5128dbf8676738c32c1c730e3dd2581dca94cac1073af193fa9a6c0d3de11707ff823e232a95fa151375c4bebb8f91705d7894ecb470fee67ee81066e1c1a564941
-
Filesize
559KB
MD5940e74f26325bf1a4f1c2fed7479e687
SHA143bbf9b9731ceda495bca3de4fe0652aff339030
SHA2562a66ffa9698272bd17389be93af9cffbdfd048a16a5ea7c0e882db8a53d646e2
SHA5128dbf8676738c32c1c730e3dd2581dca94cac1073af193fa9a6c0d3de11707ff823e232a95fa151375c4bebb8f91705d7894ecb470fee67ee81066e1c1a564941
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
586KB
MD5333892d1726b6cbdb440ee63e1a8fbd4
SHA156c62eb4f9e56519f0d1dbbb6775e18beec8f255
SHA256a88d89aedcafa959d036e5ca24761c428c483a3793c383955190379b4f2d25fa
SHA51234c5f6fd4e27716a32b2c909c3c57d2bb5c4b3acca53b23bb45ce25c77640512230b9ef61950db4ec8aba905bd48bd2a0e5f92f415693ff7b9b29690b31419b9
-
Filesize
586KB
MD5333892d1726b6cbdb440ee63e1a8fbd4
SHA156c62eb4f9e56519f0d1dbbb6775e18beec8f255
SHA256a88d89aedcafa959d036e5ca24761c428c483a3793c383955190379b4f2d25fa
SHA51234c5f6fd4e27716a32b2c909c3c57d2bb5c4b3acca53b23bb45ce25c77640512230b9ef61950db4ec8aba905bd48bd2a0e5f92f415693ff7b9b29690b31419b9
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1