Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/05/2023, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe
Resource
win10-20230220-en
General
-
Target
089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe
-
Size
1.5MB
-
MD5
1ba754a29c497ee92b101a0504a62a25
-
SHA1
e59241561d57a5a05f982fee69bc9de149f2a38b
-
SHA256
089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e
-
SHA512
6230dec10914fe14777d87f1e39b6b314e9f33e89e48a93e7e83ab2777622e6a5178cbce3e89b6489c721b47920d49b0c3ca78a0d4d7be8eb132bf4833244c37
-
SSDEEP
49152:7fTKMUdETmkjSf8q3PpIuXQZIWn/fsGNKTYT:DTKjE6RsrIWM2+
Malware Config
Extracted
redline
maza
185.161.248.73:4164
-
auth_value
474d54c1c2f5291290c53f8378acd684
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a29372705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a29372705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a29372705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a29372705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a29372705.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2608 i34288150.exe 4792 i38454802.exe 4136 i97514678.exe 4172 i93430281.exe 4512 a29372705.exe 3128 b27214626.exe 4080 c96909556.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a29372705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a29372705.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i34288150.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i38454802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i38454802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i97514678.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i93430281.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i34288150.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i97514678.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i93430281.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 4836 4080 WerFault.exe 73 3800 4080 WerFault.exe 73 3952 4080 WerFault.exe 73 4192 4080 WerFault.exe 73 3456 4080 WerFault.exe 73 4620 4080 WerFault.exe 73 3260 4080 WerFault.exe 73 4660 4080 WerFault.exe 73 5088 4080 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4512 a29372705.exe 4512 a29372705.exe 3128 b27214626.exe 3128 b27214626.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4512 a29372705.exe Token: SeDebugPrivilege 3128 b27214626.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3096 wrote to memory of 2608 3096 089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe 66 PID 3096 wrote to memory of 2608 3096 089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe 66 PID 3096 wrote to memory of 2608 3096 089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe 66 PID 2608 wrote to memory of 4792 2608 i34288150.exe 67 PID 2608 wrote to memory of 4792 2608 i34288150.exe 67 PID 2608 wrote to memory of 4792 2608 i34288150.exe 67 PID 4792 wrote to memory of 4136 4792 i38454802.exe 68 PID 4792 wrote to memory of 4136 4792 i38454802.exe 68 PID 4792 wrote to memory of 4136 4792 i38454802.exe 68 PID 4136 wrote to memory of 4172 4136 i97514678.exe 69 PID 4136 wrote to memory of 4172 4136 i97514678.exe 69 PID 4136 wrote to memory of 4172 4136 i97514678.exe 69 PID 4172 wrote to memory of 4512 4172 i93430281.exe 70 PID 4172 wrote to memory of 4512 4172 i93430281.exe 70 PID 4172 wrote to memory of 4512 4172 i93430281.exe 70 PID 4172 wrote to memory of 3128 4172 i93430281.exe 71 PID 4172 wrote to memory of 3128 4172 i93430281.exe 71 PID 4172 wrote to memory of 3128 4172 i93430281.exe 71 PID 4136 wrote to memory of 4080 4136 i97514678.exe 73 PID 4136 wrote to memory of 4080 4136 i97514678.exe 73 PID 4136 wrote to memory of 4080 4136 i97514678.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe"C:\Users\Admin\AppData\Local\Temp\089a9618b65dca0c631fb45fc0bdd6f87a43a1e8d6d03c2c6b66c2cffbc3b63e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i34288150.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i34288150.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38454802.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i38454802.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i97514678.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i97514678.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i93430281.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i93430281.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a29372705.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a29372705.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b27214626.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b27214626.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c96909556.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c96909556.exe5⤵
- Executes dropped EXE
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 6206⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 7006⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 7726⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 8526⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 8766⤵
- Program crash
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 9406⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 11246⤵
- Program crash
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 11526⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 11886⤵
- Program crash
PID:5088
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51808aecea7c95346705946d33d4ab941
SHA182f6e35273c464a1d9d88196696bc60a0773465d
SHA2568325243d99a2f66f7273b9783d3fd0c7f1caa797e96f3e9b15e081c58bc89b05
SHA512b5b6f166457832acce383b583f6dd79e1605fee524e1a4c3a1a878727dee49c7fc9ffe8c6082860a270ead38d55efb504216f4f363adb25b13e18e43cfacb319
-
Filesize
1.3MB
MD51808aecea7c95346705946d33d4ab941
SHA182f6e35273c464a1d9d88196696bc60a0773465d
SHA2568325243d99a2f66f7273b9783d3fd0c7f1caa797e96f3e9b15e081c58bc89b05
SHA512b5b6f166457832acce383b583f6dd79e1605fee524e1a4c3a1a878727dee49c7fc9ffe8c6082860a270ead38d55efb504216f4f363adb25b13e18e43cfacb319
-
Filesize
1.1MB
MD549925d0535a9f1a885e44a9ab32656ff
SHA18acad2359cc225486157be83416a861bf57d7f19
SHA25605aebf57d3ef88e6c826d16abacdabf4e1a858e572ff339fa477b796e724b0f8
SHA512ac2a9ae75e1cc70ca149417dbb71850a844cab2a59c7826246cd77a2d34944c430e1e4eafc1709db18a411d7d9b7c298a65b193d31b03c5554916f50036ccbbf
-
Filesize
1.1MB
MD549925d0535a9f1a885e44a9ab32656ff
SHA18acad2359cc225486157be83416a861bf57d7f19
SHA25605aebf57d3ef88e6c826d16abacdabf4e1a858e572ff339fa477b796e724b0f8
SHA512ac2a9ae75e1cc70ca149417dbb71850a844cab2a59c7826246cd77a2d34944c430e1e4eafc1709db18a411d7d9b7c298a65b193d31b03c5554916f50036ccbbf
-
Filesize
683KB
MD56c8dc6fa2a70493265a348247cc2deb9
SHA1b696c692d50af1a6ae97627d58ff19d8c53e661f
SHA256529fb5e16e180c6b80521aaf9dcd8927ca232f7099d2ee0053f3446fec9ba643
SHA512c1c3e6554215aafd994aa4be0989ef35f69e0ccc80d2102210b4d7464f6cafa04107c4a9255e4185ce9787a97934579bd56d803157d89c18d42f2d71ece15d77
-
Filesize
683KB
MD56c8dc6fa2a70493265a348247cc2deb9
SHA1b696c692d50af1a6ae97627d58ff19d8c53e661f
SHA256529fb5e16e180c6b80521aaf9dcd8927ca232f7099d2ee0053f3446fec9ba643
SHA512c1c3e6554215aafd994aa4be0989ef35f69e0ccc80d2102210b4d7464f6cafa04107c4a9255e4185ce9787a97934579bd56d803157d89c18d42f2d71ece15d77
-
Filesize
323KB
MD50b23176fcc8819874697230a81ab2bef
SHA1ae5af94f9e0a4e007e9b225bc98fe0c444829087
SHA25663d8d5a8dcd1d4073fe436073893b3e758c902cfcce44f2fa2ac9e8827c9cd47
SHA51260e9443226018d14e93e2fa8cdf07ddc6bacb22ccb75ee5c827f333eb2f432bbc41f9b151b7544ca9751389c5b8dbcbbed49882f5be558ebcb60d2c00c4982ca
-
Filesize
323KB
MD50b23176fcc8819874697230a81ab2bef
SHA1ae5af94f9e0a4e007e9b225bc98fe0c444829087
SHA25663d8d5a8dcd1d4073fe436073893b3e758c902cfcce44f2fa2ac9e8827c9cd47
SHA51260e9443226018d14e93e2fa8cdf07ddc6bacb22ccb75ee5c827f333eb2f432bbc41f9b151b7544ca9751389c5b8dbcbbed49882f5be558ebcb60d2c00c4982ca
-
Filesize
404KB
MD546793499b51059e5454564c5f5f32983
SHA1119ee6d6c602e73743ecb98c3cd5e79d1c04cb4f
SHA2561d7d4372452a3d1716305eee760b67691a400fa17464b1f45003da3334f6a705
SHA512bfc933b604663dce3234faea5e7af54184fdab4036a5f4e157bb8e2a33605906e48688a1b59570bc96ad3b969535ddb0d82fad1a1646628df87b6077dd6eb9a3
-
Filesize
404KB
MD546793499b51059e5454564c5f5f32983
SHA1119ee6d6c602e73743ecb98c3cd5e79d1c04cb4f
SHA2561d7d4372452a3d1716305eee760b67691a400fa17464b1f45003da3334f6a705
SHA512bfc933b604663dce3234faea5e7af54184fdab4036a5f4e157bb8e2a33605906e48688a1b59570bc96ad3b969535ddb0d82fad1a1646628df87b6077dd6eb9a3
-
Filesize
344KB
MD596306f6480434e25d9e1b684646b9bc2
SHA138278878e4317cf3009bf99d2dcd60ba563e7fe9
SHA2563dbfc20a167708008ffa2049b373050057e5c6ef6b879f7287f49c31408e4131
SHA512c473eaa4bf9a9b4e5ebafafb49bda2822e776d0d9dc2bc759360fd415f996cbc4f4060f9cccbab53cae247fb3d046197715d8422828c71ee140bd0f8eb885dc9
-
Filesize
344KB
MD596306f6480434e25d9e1b684646b9bc2
SHA138278878e4317cf3009bf99d2dcd60ba563e7fe9
SHA2563dbfc20a167708008ffa2049b373050057e5c6ef6b879f7287f49c31408e4131
SHA512c473eaa4bf9a9b4e5ebafafb49bda2822e776d0d9dc2bc759360fd415f996cbc4f4060f9cccbab53cae247fb3d046197715d8422828c71ee140bd0f8eb885dc9
-
Filesize
168KB
MD579e47e2d5558b923382d807e4afce195
SHA1c672bd98adc869d743f50d3642d3d377cc7364d6
SHA256c2ef2b7b4f9d4fb12d669ed81ba82870a8f5db169d6d7c1c3b22f092d6659316
SHA512b9ad8f843fa2dc8ac2b13993e7e1e1bf0552000283e67371b0e00a84eaba72d9924abfff5012b3702a84c0d0ff4b8f1add4b78ded2cd0ca6be10c96fcca335eb
-
Filesize
168KB
MD579e47e2d5558b923382d807e4afce195
SHA1c672bd98adc869d743f50d3642d3d377cc7364d6
SHA256c2ef2b7b4f9d4fb12d669ed81ba82870a8f5db169d6d7c1c3b22f092d6659316
SHA512b9ad8f843fa2dc8ac2b13993e7e1e1bf0552000283e67371b0e00a84eaba72d9924abfff5012b3702a84c0d0ff4b8f1add4b78ded2cd0ca6be10c96fcca335eb