Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
101s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/04/2023, 03:19
Static task
static1
General
-
Target
4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe
-
Size
1.2MB
-
MD5
7f87aaa0aaebcb6b6aa8cbd87de81473
-
SHA1
af347474443471aa6da1cf0fd7d4366a8f1adb24
-
SHA256
4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3
-
SHA512
089b381821fdc039ca05826b87518c3a2f983b1b6bb08f0f39bfdd2c4c7b9db6f848d31b1d57f7f107746f15fd3b07bfeb963adfd49dce8b2bbdfb737702a898
-
SSDEEP
24576:iy8NOIEvVZDg+FfO0CGpkhquI1Ivm8mI1nTrgroWr6mz36H:J8+lf5vpui98PgroWrD
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr536647.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr536647.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr536647.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr536647.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr536647.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4012 un326487.exe 2052 un068870.exe 3888 pr536647.exe 2672 qu155409.exe 196 1.exe 3304 rk079340.exe 5028 si527907.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr536647.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr536647.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un326487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un326487.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un068870.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un068870.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 4220 5028 WerFault.exe 73 4736 5028 WerFault.exe 73 3024 5028 WerFault.exe 73 4908 5028 WerFault.exe 73 3928 5028 WerFault.exe 73 1380 5028 WerFault.exe 73 4208 5028 WerFault.exe 73 2660 5028 WerFault.exe 73 3764 5028 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3888 pr536647.exe 3888 pr536647.exe 196 1.exe 3304 rk079340.exe 196 1.exe 3304 rk079340.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3888 pr536647.exe Token: SeDebugPrivilege 2672 qu155409.exe Token: SeDebugPrivilege 196 1.exe Token: SeDebugPrivilege 3304 rk079340.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5028 si527907.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2148 wrote to memory of 4012 2148 4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe 66 PID 2148 wrote to memory of 4012 2148 4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe 66 PID 2148 wrote to memory of 4012 2148 4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe 66 PID 4012 wrote to memory of 2052 4012 un326487.exe 67 PID 4012 wrote to memory of 2052 4012 un326487.exe 67 PID 4012 wrote to memory of 2052 4012 un326487.exe 67 PID 2052 wrote to memory of 3888 2052 un068870.exe 68 PID 2052 wrote to memory of 3888 2052 un068870.exe 68 PID 2052 wrote to memory of 3888 2052 un068870.exe 68 PID 2052 wrote to memory of 2672 2052 un068870.exe 69 PID 2052 wrote to memory of 2672 2052 un068870.exe 69 PID 2052 wrote to memory of 2672 2052 un068870.exe 69 PID 2672 wrote to memory of 196 2672 qu155409.exe 70 PID 2672 wrote to memory of 196 2672 qu155409.exe 70 PID 2672 wrote to memory of 196 2672 qu155409.exe 70 PID 4012 wrote to memory of 3304 4012 un326487.exe 71 PID 4012 wrote to memory of 3304 4012 un326487.exe 71 PID 4012 wrote to memory of 3304 4012 un326487.exe 71 PID 2148 wrote to memory of 5028 2148 4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe 73 PID 2148 wrote to memory of 5028 2148 4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe 73 PID 2148 wrote to memory of 5028 2148 4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe"C:\Users\Admin\AppData\Local\Temp\4c1c563a53c49e4a8b2033287b79033cba1f4cb4ffda2343fce10a490426bec3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un326487.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un326487.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un068870.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un068870.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr536647.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr536647.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu155409.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu155409.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk079340.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk079340.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527907.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527907.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:5028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 6363⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 7123⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 8603⤵
- Program crash
PID:3024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 8683⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 8883⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 9083⤵
- Program crash
PID:1380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 11283⤵
- Program crash
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 11843⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 12163⤵
- Program crash
PID:3764
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD54d611f4112ed8379871f8bcb211ca4a3
SHA15da68386eaf519b34f8de099d3443379ab027ef7
SHA256a76929112fba2a0c2a7eaf33e6fef368ba8f828ec791192b7a44b13fb86ed80e
SHA5124801282feec1c85982f1eceaba0293f99b64a001b7ff3c7e46e147d10f88ede3dd421c67117ccc19ac2b3e4245009bbecb5de497c5c0cd4c4ae120717ab310a7
-
Filesize
397KB
MD54d611f4112ed8379871f8bcb211ca4a3
SHA15da68386eaf519b34f8de099d3443379ab027ef7
SHA256a76929112fba2a0c2a7eaf33e6fef368ba8f828ec791192b7a44b13fb86ed80e
SHA5124801282feec1c85982f1eceaba0293f99b64a001b7ff3c7e46e147d10f88ede3dd421c67117ccc19ac2b3e4245009bbecb5de497c5c0cd4c4ae120717ab310a7
-
Filesize
862KB
MD5276df6feed43a683a9b5fec943e77961
SHA17b1027f8d809d6ce1cb2f99f00cb4f37491d2ac8
SHA2564c3e6b2b7bf48a02a145f557fc5310314f1fe5256e34d814891bfa81589549f0
SHA5127e5b45bb4ee63f2efbb72e075fec613e41b2ebae7a837c06f56dd961559b53250afb5900f2197fbf5c388e4263abbc358af3867fe25e1e897c7fae0c606f5b89
-
Filesize
862KB
MD5276df6feed43a683a9b5fec943e77961
SHA17b1027f8d809d6ce1cb2f99f00cb4f37491d2ac8
SHA2564c3e6b2b7bf48a02a145f557fc5310314f1fe5256e34d814891bfa81589549f0
SHA5127e5b45bb4ee63f2efbb72e075fec613e41b2ebae7a837c06f56dd961559b53250afb5900f2197fbf5c388e4263abbc358af3867fe25e1e897c7fae0c606f5b89
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
708KB
MD5219f5705d75b16132769651932c77062
SHA1b23f683a072036b4d4b5d46b3c033789df52dfcc
SHA256eafcc09c95b9dfd231d5b63d63c042e6a50b496149fa280280a237b524c3720e
SHA5124ba3eab0a78e0db3da6eba013bc8299947f010f4d172e4c91ec2f23717ee34d54b7381f4bc62bbdd4be726f80e2949bf91bfa71a30f9770504314b1244cd417a
-
Filesize
708KB
MD5219f5705d75b16132769651932c77062
SHA1b23f683a072036b4d4b5d46b3c033789df52dfcc
SHA256eafcc09c95b9dfd231d5b63d63c042e6a50b496149fa280280a237b524c3720e
SHA5124ba3eab0a78e0db3da6eba013bc8299947f010f4d172e4c91ec2f23717ee34d54b7381f4bc62bbdd4be726f80e2949bf91bfa71a30f9770504314b1244cd417a
-
Filesize
404KB
MD5781797e95cb4c8a228759ab450b8ea29
SHA1249c4821c9b4391146aa1634e9eccfd79b04aa54
SHA25691c252e5321c8590bf62c9c57febcfb9a28ab53b780118ea0e5697eecf273668
SHA512404eef47b820cdf8b4fb6dd2a1feecda2a317ed1b98fbade9440e5d32f0907815f3fef1a47f68ffa51e2776af761a26c01200ef7a692f617c90b783aadbb546b
-
Filesize
404KB
MD5781797e95cb4c8a228759ab450b8ea29
SHA1249c4821c9b4391146aa1634e9eccfd79b04aa54
SHA25691c252e5321c8590bf62c9c57febcfb9a28ab53b780118ea0e5697eecf273668
SHA512404eef47b820cdf8b4fb6dd2a1feecda2a317ed1b98fbade9440e5d32f0907815f3fef1a47f68ffa51e2776af761a26c01200ef7a692f617c90b783aadbb546b
-
Filesize
588KB
MD5b3d936514b7a52377ecc541c7b5fa5c0
SHA1c5bd499fe816de81ec7d28f268d63af151bd3af5
SHA256c969cfae41b8233c482fb5fc79a10b2266400299228c4890ccce6063fc4ab3f9
SHA51232be8103dec496ac87a75814d7fdec6b5954971a263a229730f6ec116462b64c6795bcd4f1ddb603a40a533b62763b29e411f6b295eb09091239ec9f19aba0f5
-
Filesize
588KB
MD5b3d936514b7a52377ecc541c7b5fa5c0
SHA1c5bd499fe816de81ec7d28f268d63af151bd3af5
SHA256c969cfae41b8233c482fb5fc79a10b2266400299228c4890ccce6063fc4ab3f9
SHA51232be8103dec496ac87a75814d7fdec6b5954971a263a229730f6ec116462b64c6795bcd4f1ddb603a40a533b62763b29e411f6b295eb09091239ec9f19aba0f5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1