Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/05/2023, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe
Resource
win10v2004-20230220-en
General
-
Target
4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe
-
Size
794KB
-
MD5
fae553705958b46d8114557115cc3d87
-
SHA1
81fc9c3d22adc12696f159b97181ae8de34ee047
-
SHA256
4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30
-
SHA512
b418eb01ec5331adf8a3675d87f1d26d5fe9b4704665e91eb36f9c0f5eef8b84bbd19b6c80cda5360ec91519ea73e69a2e0b0eba272e3c64d4f2ea8d1ee579d4
-
SSDEEP
12288:ey90f8YlxtrgUIT3f8HT3m5quo4qy+duGgJQ9DHcyfUqmdtbBlj:eyCxtEMahGVD9ZUq8tL
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dork
185.161.248.73:4164
-
auth_value
e81be7d6cfb453cc812e1b4890eeadad
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection o61699442.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o61699442.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o61699442.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o61699442.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o61699442.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o61699442.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1124 x05557045.exe 596 m55996209.exe 976 1.exe 1496 n15870990.exe 1816 o61699442.exe -
Loads dropped DLL 11 IoCs
pid Process 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 1124 x05557045.exe 1124 x05557045.exe 1124 x05557045.exe 596 m55996209.exe 596 m55996209.exe 976 1.exe 1124 x05557045.exe 1496 n15870990.exe 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 1816 o61699442.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features o61699442.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o61699442.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x05557045.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x05557045.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1496 n15870990.exe 976 1.exe 976 1.exe 1496 n15870990.exe 1816 o61699442.exe 1816 o61699442.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 596 m55996209.exe Token: SeDebugPrivilege 1496 n15870990.exe Token: SeDebugPrivilege 976 1.exe Token: SeDebugPrivilege 1816 o61699442.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 928 wrote to memory of 1124 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 27 PID 928 wrote to memory of 1124 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 27 PID 928 wrote to memory of 1124 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 27 PID 928 wrote to memory of 1124 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 27 PID 928 wrote to memory of 1124 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 27 PID 928 wrote to memory of 1124 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 27 PID 928 wrote to memory of 1124 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 27 PID 1124 wrote to memory of 596 1124 x05557045.exe 28 PID 1124 wrote to memory of 596 1124 x05557045.exe 28 PID 1124 wrote to memory of 596 1124 x05557045.exe 28 PID 1124 wrote to memory of 596 1124 x05557045.exe 28 PID 1124 wrote to memory of 596 1124 x05557045.exe 28 PID 1124 wrote to memory of 596 1124 x05557045.exe 28 PID 1124 wrote to memory of 596 1124 x05557045.exe 28 PID 596 wrote to memory of 976 596 m55996209.exe 29 PID 596 wrote to memory of 976 596 m55996209.exe 29 PID 596 wrote to memory of 976 596 m55996209.exe 29 PID 596 wrote to memory of 976 596 m55996209.exe 29 PID 596 wrote to memory of 976 596 m55996209.exe 29 PID 596 wrote to memory of 976 596 m55996209.exe 29 PID 596 wrote to memory of 976 596 m55996209.exe 29 PID 1124 wrote to memory of 1496 1124 x05557045.exe 30 PID 1124 wrote to memory of 1496 1124 x05557045.exe 30 PID 1124 wrote to memory of 1496 1124 x05557045.exe 30 PID 1124 wrote to memory of 1496 1124 x05557045.exe 30 PID 1124 wrote to memory of 1496 1124 x05557045.exe 30 PID 1124 wrote to memory of 1496 1124 x05557045.exe 30 PID 1124 wrote to memory of 1496 1124 x05557045.exe 30 PID 928 wrote to memory of 1816 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 32 PID 928 wrote to memory of 1816 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 32 PID 928 wrote to memory of 1816 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 32 PID 928 wrote to memory of 1816 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 32 PID 928 wrote to memory of 1816 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 32 PID 928 wrote to memory of 1816 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 32 PID 928 wrote to memory of 1816 928 4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe"C:\Users\Admin\AppData\Local\Temp\4995f30f4b777655dd0aa5dcb9a2a6e867df99a39b43a48a9f4a19a90be66b30.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x05557045.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x05557045.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m55996209.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m55996209.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n15870990.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n15870990.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o61699442.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o61699442.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD52f355d1694c649f433582974d54254c1
SHA1fba425b8c666a3bfdb3325a58795765d74cab0c5
SHA25648fec69090fb5066ae1165b2149a7a11d1287b96003e325cbdcbc92e17b1faa5
SHA51274018355097c05d0d30ba70af74a292c4bd2aef83b6bf7b0b75168b345dae85fa9f04c8d00eacb26500ea2c91f34699607af3bd95933c2be8dee20189566bf15
-
Filesize
176KB
MD52f355d1694c649f433582974d54254c1
SHA1fba425b8c666a3bfdb3325a58795765d74cab0c5
SHA25648fec69090fb5066ae1165b2149a7a11d1287b96003e325cbdcbc92e17b1faa5
SHA51274018355097c05d0d30ba70af74a292c4bd2aef83b6bf7b0b75168b345dae85fa9f04c8d00eacb26500ea2c91f34699607af3bd95933c2be8dee20189566bf15
-
Filesize
590KB
MD52f06096e4f69c64131b6b31e9c6a0d5c
SHA1ead7a8dd57857a739fa296627d3dd3d91e500127
SHA256684cada628db7c6972076eec14ec591bb504bc9b7755a793b3d2a8ca9f30d93c
SHA5122db86b96f6987f81dfc7a615569089e96723ff447731c8fb0a88fb97028c78fd9372573fcafa5ee893f59ed59237fd4a527b056c28770feb1f35aa41dddd83ee
-
Filesize
590KB
MD52f06096e4f69c64131b6b31e9c6a0d5c
SHA1ead7a8dd57857a739fa296627d3dd3d91e500127
SHA256684cada628db7c6972076eec14ec591bb504bc9b7755a793b3d2a8ca9f30d93c
SHA5122db86b96f6987f81dfc7a615569089e96723ff447731c8fb0a88fb97028c78fd9372573fcafa5ee893f59ed59237fd4a527b056c28770feb1f35aa41dddd83ee
-
Filesize
530KB
MD53003febf140db0c3a1d606369694dba9
SHA12a86846558d25ac52d8627dbd040580011fb8ec2
SHA2561a471d915ac7dfde667cd0018b3a3b394c7b6a5d58f7f2d02f44bd5e0a5d1345
SHA51274d4f7f8313a2bbe786d5c6eb0f4034b989791744b69b8477a4c97d49afdb5e129d97fb143014f6955e4dacc82b36feb41b6dc941a94a0a79586d5cba91bf902
-
Filesize
530KB
MD53003febf140db0c3a1d606369694dba9
SHA12a86846558d25ac52d8627dbd040580011fb8ec2
SHA2561a471d915ac7dfde667cd0018b3a3b394c7b6a5d58f7f2d02f44bd5e0a5d1345
SHA51274d4f7f8313a2bbe786d5c6eb0f4034b989791744b69b8477a4c97d49afdb5e129d97fb143014f6955e4dacc82b36feb41b6dc941a94a0a79586d5cba91bf902
-
Filesize
530KB
MD53003febf140db0c3a1d606369694dba9
SHA12a86846558d25ac52d8627dbd040580011fb8ec2
SHA2561a471d915ac7dfde667cd0018b3a3b394c7b6a5d58f7f2d02f44bd5e0a5d1345
SHA51274d4f7f8313a2bbe786d5c6eb0f4034b989791744b69b8477a4c97d49afdb5e129d97fb143014f6955e4dacc82b36feb41b6dc941a94a0a79586d5cba91bf902
-
Filesize
169KB
MD5ece7218a362432733be616a9e2b92efb
SHA11b8567b92ac0ab25dc11e8e3a40d3709312fbb4d
SHA256e037a51d561daf67c34c92cfa18b9d329afd7ab74d4043798f421590451b3c03
SHA512080a1bc0f509084cef0c8ac34a0484af61181a5b79ee4251194288613b8ac1a7468cdcbb88efd0bdd4f48ebd61d2b6b1a2eeeac3b0d9bbbcd6fb6d9c44eb148b
-
Filesize
169KB
MD5ece7218a362432733be616a9e2b92efb
SHA11b8567b92ac0ab25dc11e8e3a40d3709312fbb4d
SHA256e037a51d561daf67c34c92cfa18b9d329afd7ab74d4043798f421590451b3c03
SHA512080a1bc0f509084cef0c8ac34a0484af61181a5b79ee4251194288613b8ac1a7468cdcbb88efd0bdd4f48ebd61d2b6b1a2eeeac3b0d9bbbcd6fb6d9c44eb148b
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
176KB
MD52f355d1694c649f433582974d54254c1
SHA1fba425b8c666a3bfdb3325a58795765d74cab0c5
SHA25648fec69090fb5066ae1165b2149a7a11d1287b96003e325cbdcbc92e17b1faa5
SHA51274018355097c05d0d30ba70af74a292c4bd2aef83b6bf7b0b75168b345dae85fa9f04c8d00eacb26500ea2c91f34699607af3bd95933c2be8dee20189566bf15
-
Filesize
176KB
MD52f355d1694c649f433582974d54254c1
SHA1fba425b8c666a3bfdb3325a58795765d74cab0c5
SHA25648fec69090fb5066ae1165b2149a7a11d1287b96003e325cbdcbc92e17b1faa5
SHA51274018355097c05d0d30ba70af74a292c4bd2aef83b6bf7b0b75168b345dae85fa9f04c8d00eacb26500ea2c91f34699607af3bd95933c2be8dee20189566bf15
-
Filesize
590KB
MD52f06096e4f69c64131b6b31e9c6a0d5c
SHA1ead7a8dd57857a739fa296627d3dd3d91e500127
SHA256684cada628db7c6972076eec14ec591bb504bc9b7755a793b3d2a8ca9f30d93c
SHA5122db86b96f6987f81dfc7a615569089e96723ff447731c8fb0a88fb97028c78fd9372573fcafa5ee893f59ed59237fd4a527b056c28770feb1f35aa41dddd83ee
-
Filesize
590KB
MD52f06096e4f69c64131b6b31e9c6a0d5c
SHA1ead7a8dd57857a739fa296627d3dd3d91e500127
SHA256684cada628db7c6972076eec14ec591bb504bc9b7755a793b3d2a8ca9f30d93c
SHA5122db86b96f6987f81dfc7a615569089e96723ff447731c8fb0a88fb97028c78fd9372573fcafa5ee893f59ed59237fd4a527b056c28770feb1f35aa41dddd83ee
-
Filesize
530KB
MD53003febf140db0c3a1d606369694dba9
SHA12a86846558d25ac52d8627dbd040580011fb8ec2
SHA2561a471d915ac7dfde667cd0018b3a3b394c7b6a5d58f7f2d02f44bd5e0a5d1345
SHA51274d4f7f8313a2bbe786d5c6eb0f4034b989791744b69b8477a4c97d49afdb5e129d97fb143014f6955e4dacc82b36feb41b6dc941a94a0a79586d5cba91bf902
-
Filesize
530KB
MD53003febf140db0c3a1d606369694dba9
SHA12a86846558d25ac52d8627dbd040580011fb8ec2
SHA2561a471d915ac7dfde667cd0018b3a3b394c7b6a5d58f7f2d02f44bd5e0a5d1345
SHA51274d4f7f8313a2bbe786d5c6eb0f4034b989791744b69b8477a4c97d49afdb5e129d97fb143014f6955e4dacc82b36feb41b6dc941a94a0a79586d5cba91bf902
-
Filesize
530KB
MD53003febf140db0c3a1d606369694dba9
SHA12a86846558d25ac52d8627dbd040580011fb8ec2
SHA2561a471d915ac7dfde667cd0018b3a3b394c7b6a5d58f7f2d02f44bd5e0a5d1345
SHA51274d4f7f8313a2bbe786d5c6eb0f4034b989791744b69b8477a4c97d49afdb5e129d97fb143014f6955e4dacc82b36feb41b6dc941a94a0a79586d5cba91bf902
-
Filesize
169KB
MD5ece7218a362432733be616a9e2b92efb
SHA11b8567b92ac0ab25dc11e8e3a40d3709312fbb4d
SHA256e037a51d561daf67c34c92cfa18b9d329afd7ab74d4043798f421590451b3c03
SHA512080a1bc0f509084cef0c8ac34a0484af61181a5b79ee4251194288613b8ac1a7468cdcbb88efd0bdd4f48ebd61d2b6b1a2eeeac3b0d9bbbcd6fb6d9c44eb148b
-
Filesize
169KB
MD5ece7218a362432733be616a9e2b92efb
SHA11b8567b92ac0ab25dc11e8e3a40d3709312fbb4d
SHA256e037a51d561daf67c34c92cfa18b9d329afd7ab74d4043798f421590451b3c03
SHA512080a1bc0f509084cef0c8ac34a0484af61181a5b79ee4251194288613b8ac1a7468cdcbb88efd0bdd4f48ebd61d2b6b1a2eeeac3b0d9bbbcd6fb6d9c44eb148b
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf