Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe
Resource
win10v2004-20230220-en
General
-
Target
db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe
-
Size
936KB
-
MD5
352ac4155529ee4123900210c899962c
-
SHA1
cee48556da9207c53239edd9f2a000efad4fdf14
-
SHA256
db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006
-
SHA512
ec625eb0eaabf135aff527b39f1e5265b275b555a392d5f9058d4e18878bf853da43110766e134b134a045e29e2b60c8e2be6867e9e540330b32655078d61d30
-
SSDEEP
24576:hy2VoZVn3E+45zpW0UF6ztJJto3ryUBNFAFblsYJLQ:U2VUE5mmfJoyUeFpJ
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 868 un207061.exe 908 32240438.exe 300 1.exe 1384 rk171752.exe 604 si150027.exe -
Loads dropped DLL 11 IoCs
pid Process 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 868 un207061.exe 868 un207061.exe 868 un207061.exe 908 32240438.exe 908 32240438.exe 868 un207061.exe 868 un207061.exe 1384 rk171752.exe 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 604 si150027.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un207061.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un207061.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 300 1.exe 300 1.exe 604 si150027.exe 604 si150027.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 908 32240438.exe Token: SeDebugPrivilege 1384 rk171752.exe Token: SeDebugPrivilege 300 1.exe Token: SeDebugPrivilege 604 si150027.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 900 wrote to memory of 868 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 28 PID 900 wrote to memory of 868 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 28 PID 900 wrote to memory of 868 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 28 PID 900 wrote to memory of 868 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 28 PID 900 wrote to memory of 868 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 28 PID 900 wrote to memory of 868 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 28 PID 900 wrote to memory of 868 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 28 PID 868 wrote to memory of 908 868 un207061.exe 29 PID 868 wrote to memory of 908 868 un207061.exe 29 PID 868 wrote to memory of 908 868 un207061.exe 29 PID 868 wrote to memory of 908 868 un207061.exe 29 PID 868 wrote to memory of 908 868 un207061.exe 29 PID 868 wrote to memory of 908 868 un207061.exe 29 PID 868 wrote to memory of 908 868 un207061.exe 29 PID 908 wrote to memory of 300 908 32240438.exe 30 PID 908 wrote to memory of 300 908 32240438.exe 30 PID 908 wrote to memory of 300 908 32240438.exe 30 PID 908 wrote to memory of 300 908 32240438.exe 30 PID 908 wrote to memory of 300 908 32240438.exe 30 PID 908 wrote to memory of 300 908 32240438.exe 30 PID 908 wrote to memory of 300 908 32240438.exe 30 PID 868 wrote to memory of 1384 868 un207061.exe 31 PID 868 wrote to memory of 1384 868 un207061.exe 31 PID 868 wrote to memory of 1384 868 un207061.exe 31 PID 868 wrote to memory of 1384 868 un207061.exe 31 PID 868 wrote to memory of 1384 868 un207061.exe 31 PID 868 wrote to memory of 1384 868 un207061.exe 31 PID 868 wrote to memory of 1384 868 un207061.exe 31 PID 900 wrote to memory of 604 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 32 PID 900 wrote to memory of 604 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 32 PID 900 wrote to memory of 604 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 32 PID 900 wrote to memory of 604 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 32 PID 900 wrote to memory of 604 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 32 PID 900 wrote to memory of 604 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 32 PID 900 wrote to memory of 604 900 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe"C:\Users\Admin\AppData\Local\Temp\db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207061.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207061.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32240438.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32240438.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk171752.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk171752.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si150027.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si150027.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5ef9cd86cafecf31647376b620340a63a
SHA1146199ff1e9670cd9fbbd638d3d4aceaa8132b4f
SHA256bf8037c6afdcfb6b81738578030765dcc03775c2d7322185f686c8090c745847
SHA5121fde2aa4b43282c05a1d9206b28202f92330f0bb2f1abba4945e67d53e6468fb0e36ff16210e49ab8cd237c9f988abd01d3f8322bab1978e751c15bf2c33e89c
-
Filesize
169KB
MD5ef9cd86cafecf31647376b620340a63a
SHA1146199ff1e9670cd9fbbd638d3d4aceaa8132b4f
SHA256bf8037c6afdcfb6b81738578030765dcc03775c2d7322185f686c8090c745847
SHA5121fde2aa4b43282c05a1d9206b28202f92330f0bb2f1abba4945e67d53e6468fb0e36ff16210e49ab8cd237c9f988abd01d3f8322bab1978e751c15bf2c33e89c
-
Filesize
783KB
MD578cc5a30ebc80bfeee49fa6241b9e582
SHA108666bcceddb9709a7aa07874ca2cb2e12708edc
SHA256aa9631a419e02b29fdc3387c705d8f36ffb9dd05d7a31c4ba824bcec7299ffd6
SHA5126d62e62aa4f6dae34b96e622abffd82a2834b2bf1264290fbb1f45a485fba7a77f75605751d42a274db869c6c591c86578020f8a6bba527879481febdfad7073
-
Filesize
783KB
MD578cc5a30ebc80bfeee49fa6241b9e582
SHA108666bcceddb9709a7aa07874ca2cb2e12708edc
SHA256aa9631a419e02b29fdc3387c705d8f36ffb9dd05d7a31c4ba824bcec7299ffd6
SHA5126d62e62aa4f6dae34b96e622abffd82a2834b2bf1264290fbb1f45a485fba7a77f75605751d42a274db869c6c591c86578020f8a6bba527879481febdfad7073
-
Filesize
521KB
MD53300c51954039ea7b491eb90c28c6c77
SHA1563f9b70eafabef8a10368966bb285a2cb2f4b62
SHA256e395310bb34bcf5d731595470d5452775d49e3d483c04c0056f0d2944fb8a1be
SHA512bcb2dfe2948a63552985199c25a37953e57eab34c3c0ed572ec3695e4a24be09fee83cffa01146755c67b852474add660df5d92f8a0f6ff812e6eaa8e40633a9
-
Filesize
521KB
MD53300c51954039ea7b491eb90c28c6c77
SHA1563f9b70eafabef8a10368966bb285a2cb2f4b62
SHA256e395310bb34bcf5d731595470d5452775d49e3d483c04c0056f0d2944fb8a1be
SHA512bcb2dfe2948a63552985199c25a37953e57eab34c3c0ed572ec3695e4a24be09fee83cffa01146755c67b852474add660df5d92f8a0f6ff812e6eaa8e40633a9
-
Filesize
521KB
MD53300c51954039ea7b491eb90c28c6c77
SHA1563f9b70eafabef8a10368966bb285a2cb2f4b62
SHA256e395310bb34bcf5d731595470d5452775d49e3d483c04c0056f0d2944fb8a1be
SHA512bcb2dfe2948a63552985199c25a37953e57eab34c3c0ed572ec3695e4a24be09fee83cffa01146755c67b852474add660df5d92f8a0f6ff812e6eaa8e40633a9
-
Filesize
581KB
MD5b6a3c10157620c3824c4ac0d9c5ca316
SHA1d92a6bfdc3afd055e86e34fbc60d240790e37257
SHA25693d40c4db0e5bd65489d9c42f87a60f296c08ff0ae8d137a7f343f1b5be6dfee
SHA512744aad58720784bf723dadf7a3e0e3c8da3677cea0173bec4c7878ca10a3c41ef04a85a8c30eff2be3a6d934e47dbd898b374f689eec5eb9d0118f4906e60fd4
-
Filesize
581KB
MD5b6a3c10157620c3824c4ac0d9c5ca316
SHA1d92a6bfdc3afd055e86e34fbc60d240790e37257
SHA25693d40c4db0e5bd65489d9c42f87a60f296c08ff0ae8d137a7f343f1b5be6dfee
SHA512744aad58720784bf723dadf7a3e0e3c8da3677cea0173bec4c7878ca10a3c41ef04a85a8c30eff2be3a6d934e47dbd898b374f689eec5eb9d0118f4906e60fd4
-
Filesize
581KB
MD5b6a3c10157620c3824c4ac0d9c5ca316
SHA1d92a6bfdc3afd055e86e34fbc60d240790e37257
SHA25693d40c4db0e5bd65489d9c42f87a60f296c08ff0ae8d137a7f343f1b5be6dfee
SHA512744aad58720784bf723dadf7a3e0e3c8da3677cea0173bec4c7878ca10a3c41ef04a85a8c30eff2be3a6d934e47dbd898b374f689eec5eb9d0118f4906e60fd4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
169KB
MD5ef9cd86cafecf31647376b620340a63a
SHA1146199ff1e9670cd9fbbd638d3d4aceaa8132b4f
SHA256bf8037c6afdcfb6b81738578030765dcc03775c2d7322185f686c8090c745847
SHA5121fde2aa4b43282c05a1d9206b28202f92330f0bb2f1abba4945e67d53e6468fb0e36ff16210e49ab8cd237c9f988abd01d3f8322bab1978e751c15bf2c33e89c
-
Filesize
169KB
MD5ef9cd86cafecf31647376b620340a63a
SHA1146199ff1e9670cd9fbbd638d3d4aceaa8132b4f
SHA256bf8037c6afdcfb6b81738578030765dcc03775c2d7322185f686c8090c745847
SHA5121fde2aa4b43282c05a1d9206b28202f92330f0bb2f1abba4945e67d53e6468fb0e36ff16210e49ab8cd237c9f988abd01d3f8322bab1978e751c15bf2c33e89c
-
Filesize
783KB
MD578cc5a30ebc80bfeee49fa6241b9e582
SHA108666bcceddb9709a7aa07874ca2cb2e12708edc
SHA256aa9631a419e02b29fdc3387c705d8f36ffb9dd05d7a31c4ba824bcec7299ffd6
SHA5126d62e62aa4f6dae34b96e622abffd82a2834b2bf1264290fbb1f45a485fba7a77f75605751d42a274db869c6c591c86578020f8a6bba527879481febdfad7073
-
Filesize
783KB
MD578cc5a30ebc80bfeee49fa6241b9e582
SHA108666bcceddb9709a7aa07874ca2cb2e12708edc
SHA256aa9631a419e02b29fdc3387c705d8f36ffb9dd05d7a31c4ba824bcec7299ffd6
SHA5126d62e62aa4f6dae34b96e622abffd82a2834b2bf1264290fbb1f45a485fba7a77f75605751d42a274db869c6c591c86578020f8a6bba527879481febdfad7073
-
Filesize
521KB
MD53300c51954039ea7b491eb90c28c6c77
SHA1563f9b70eafabef8a10368966bb285a2cb2f4b62
SHA256e395310bb34bcf5d731595470d5452775d49e3d483c04c0056f0d2944fb8a1be
SHA512bcb2dfe2948a63552985199c25a37953e57eab34c3c0ed572ec3695e4a24be09fee83cffa01146755c67b852474add660df5d92f8a0f6ff812e6eaa8e40633a9
-
Filesize
521KB
MD53300c51954039ea7b491eb90c28c6c77
SHA1563f9b70eafabef8a10368966bb285a2cb2f4b62
SHA256e395310bb34bcf5d731595470d5452775d49e3d483c04c0056f0d2944fb8a1be
SHA512bcb2dfe2948a63552985199c25a37953e57eab34c3c0ed572ec3695e4a24be09fee83cffa01146755c67b852474add660df5d92f8a0f6ff812e6eaa8e40633a9
-
Filesize
521KB
MD53300c51954039ea7b491eb90c28c6c77
SHA1563f9b70eafabef8a10368966bb285a2cb2f4b62
SHA256e395310bb34bcf5d731595470d5452775d49e3d483c04c0056f0d2944fb8a1be
SHA512bcb2dfe2948a63552985199c25a37953e57eab34c3c0ed572ec3695e4a24be09fee83cffa01146755c67b852474add660df5d92f8a0f6ff812e6eaa8e40633a9
-
Filesize
581KB
MD5b6a3c10157620c3824c4ac0d9c5ca316
SHA1d92a6bfdc3afd055e86e34fbc60d240790e37257
SHA25693d40c4db0e5bd65489d9c42f87a60f296c08ff0ae8d137a7f343f1b5be6dfee
SHA512744aad58720784bf723dadf7a3e0e3c8da3677cea0173bec4c7878ca10a3c41ef04a85a8c30eff2be3a6d934e47dbd898b374f689eec5eb9d0118f4906e60fd4
-
Filesize
581KB
MD5b6a3c10157620c3824c4ac0d9c5ca316
SHA1d92a6bfdc3afd055e86e34fbc60d240790e37257
SHA25693d40c4db0e5bd65489d9c42f87a60f296c08ff0ae8d137a7f343f1b5be6dfee
SHA512744aad58720784bf723dadf7a3e0e3c8da3677cea0173bec4c7878ca10a3c41ef04a85a8c30eff2be3a6d934e47dbd898b374f689eec5eb9d0118f4906e60fd4
-
Filesize
581KB
MD5b6a3c10157620c3824c4ac0d9c5ca316
SHA1d92a6bfdc3afd055e86e34fbc60d240790e37257
SHA25693d40c4db0e5bd65489d9c42f87a60f296c08ff0ae8d137a7f343f1b5be6dfee
SHA512744aad58720784bf723dadf7a3e0e3c8da3677cea0173bec4c7878ca10a3c41ef04a85a8c30eff2be3a6d934e47dbd898b374f689eec5eb9d0118f4906e60fd4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91