Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
195s -
max time network
220s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe
Resource
win10v2004-20230220-en
General
-
Target
db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe
-
Size
936KB
-
MD5
352ac4155529ee4123900210c899962c
-
SHA1
cee48556da9207c53239edd9f2a000efad4fdf14
-
SHA256
db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006
-
SHA512
ec625eb0eaabf135aff527b39f1e5265b275b555a392d5f9058d4e18878bf853da43110766e134b134a045e29e2b60c8e2be6867e9e540330b32655078d61d30
-
SSDEEP
24576:hy2VoZVn3E+45zpW0UF6ztJJto3ryUBNFAFblsYJLQ:U2VUE5mmfJoyUeFpJ
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 32240438.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation rk171752.exe -
Executes dropped EXE 5 IoCs
pid Process 1468 un207061.exe 3116 32240438.exe 220 1.exe 1840 rk171752.exe 4608 1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un207061.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un207061.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1636 3116 WerFault.exe 84 4060 1840 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 220 1.exe 220 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3116 32240438.exe Token: SeDebugPrivilege 220 1.exe Token: SeDebugPrivilege 1840 rk171752.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3560 wrote to memory of 1468 3560 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 83 PID 3560 wrote to memory of 1468 3560 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 83 PID 3560 wrote to memory of 1468 3560 db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe 83 PID 1468 wrote to memory of 3116 1468 un207061.exe 84 PID 1468 wrote to memory of 3116 1468 un207061.exe 84 PID 1468 wrote to memory of 3116 1468 un207061.exe 84 PID 3116 wrote to memory of 220 3116 32240438.exe 85 PID 3116 wrote to memory of 220 3116 32240438.exe 85 PID 1468 wrote to memory of 1840 1468 un207061.exe 94 PID 1468 wrote to memory of 1840 1468 un207061.exe 94 PID 1468 wrote to memory of 1840 1468 un207061.exe 94 PID 1840 wrote to memory of 4608 1840 rk171752.exe 95 PID 1840 wrote to memory of 4608 1840 rk171752.exe 95 PID 1840 wrote to memory of 4608 1840 rk171752.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe"C:\Users\Admin\AppData\Local\Temp\db1586421ba97e6516ac63d247bc5af6076f9a0182b9acab4fe976064039b006.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207061.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207061.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32240438.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32240438.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 13764⤵
- Program crash
PID:1636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk171752.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk171752.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 13764⤵
- Program crash
PID:4060
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3116 -ip 31161⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1840 -ip 18401⤵PID:652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
783KB
MD578cc5a30ebc80bfeee49fa6241b9e582
SHA108666bcceddb9709a7aa07874ca2cb2e12708edc
SHA256aa9631a419e02b29fdc3387c705d8f36ffb9dd05d7a31c4ba824bcec7299ffd6
SHA5126d62e62aa4f6dae34b96e622abffd82a2834b2bf1264290fbb1f45a485fba7a77f75605751d42a274db869c6c591c86578020f8a6bba527879481febdfad7073
-
Filesize
783KB
MD578cc5a30ebc80bfeee49fa6241b9e582
SHA108666bcceddb9709a7aa07874ca2cb2e12708edc
SHA256aa9631a419e02b29fdc3387c705d8f36ffb9dd05d7a31c4ba824bcec7299ffd6
SHA5126d62e62aa4f6dae34b96e622abffd82a2834b2bf1264290fbb1f45a485fba7a77f75605751d42a274db869c6c591c86578020f8a6bba527879481febdfad7073
-
Filesize
521KB
MD53300c51954039ea7b491eb90c28c6c77
SHA1563f9b70eafabef8a10368966bb285a2cb2f4b62
SHA256e395310bb34bcf5d731595470d5452775d49e3d483c04c0056f0d2944fb8a1be
SHA512bcb2dfe2948a63552985199c25a37953e57eab34c3c0ed572ec3695e4a24be09fee83cffa01146755c67b852474add660df5d92f8a0f6ff812e6eaa8e40633a9
-
Filesize
521KB
MD53300c51954039ea7b491eb90c28c6c77
SHA1563f9b70eafabef8a10368966bb285a2cb2f4b62
SHA256e395310bb34bcf5d731595470d5452775d49e3d483c04c0056f0d2944fb8a1be
SHA512bcb2dfe2948a63552985199c25a37953e57eab34c3c0ed572ec3695e4a24be09fee83cffa01146755c67b852474add660df5d92f8a0f6ff812e6eaa8e40633a9
-
Filesize
581KB
MD5b6a3c10157620c3824c4ac0d9c5ca316
SHA1d92a6bfdc3afd055e86e34fbc60d240790e37257
SHA25693d40c4db0e5bd65489d9c42f87a60f296c08ff0ae8d137a7f343f1b5be6dfee
SHA512744aad58720784bf723dadf7a3e0e3c8da3677cea0173bec4c7878ca10a3c41ef04a85a8c30eff2be3a6d934e47dbd898b374f689eec5eb9d0118f4906e60fd4
-
Filesize
581KB
MD5b6a3c10157620c3824c4ac0d9c5ca316
SHA1d92a6bfdc3afd055e86e34fbc60d240790e37257
SHA25693d40c4db0e5bd65489d9c42f87a60f296c08ff0ae8d137a7f343f1b5be6dfee
SHA512744aad58720784bf723dadf7a3e0e3c8da3677cea0173bec4c7878ca10a3c41ef04a85a8c30eff2be3a6d934e47dbd898b374f689eec5eb9d0118f4906e60fd4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf