Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2023, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe
Resource
win10v2004-20230220-en
General
-
Target
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe
-
Size
793KB
-
MD5
f8f30664ab748bcd3257c54ad9730d90
-
SHA1
48fb7a8650a8c78e8663aacb48b0dd2ec5c95b2b
-
SHA256
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f
-
SHA512
4e677859813c2cbe2f20806e0796df70ed4d5767f1a02906903ad585a4402a9d887bf7ce0917c33c9ca9d16217fb178203890926a21c9006b5be18867a5d6cf1
-
SSDEEP
24576:7y8B4nQYkTwtnfRSHmLPOy8aoJGPJ+0TjE:u8inQYWwtfoQ+qg0Tj
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o12772460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o12772460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o12772460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o12772460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o12772460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o12772460.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation m41589402.exe -
Executes dropped EXE 5 IoCs
pid Process 1888 x74298284.exe 3712 m41589402.exe 2236 1.exe 4676 n35292321.exe 2040 o12772460.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o12772460.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o12772460.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x74298284.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x74298284.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3400 3712 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4676 n35292321.exe 2236 1.exe 4676 n35292321.exe 2236 1.exe 2040 o12772460.exe 2040 o12772460.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3712 m41589402.exe Token: SeDebugPrivilege 4676 n35292321.exe Token: SeDebugPrivilege 2236 1.exe Token: SeDebugPrivilege 2040 o12772460.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1888 4112 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe 83 PID 4112 wrote to memory of 1888 4112 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe 83 PID 4112 wrote to memory of 1888 4112 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe 83 PID 1888 wrote to memory of 3712 1888 x74298284.exe 84 PID 1888 wrote to memory of 3712 1888 x74298284.exe 84 PID 1888 wrote to memory of 3712 1888 x74298284.exe 84 PID 3712 wrote to memory of 2236 3712 m41589402.exe 89 PID 3712 wrote to memory of 2236 3712 m41589402.exe 89 PID 3712 wrote to memory of 2236 3712 m41589402.exe 89 PID 1888 wrote to memory of 4676 1888 x74298284.exe 93 PID 1888 wrote to memory of 4676 1888 x74298284.exe 93 PID 1888 wrote to memory of 4676 1888 x74298284.exe 93 PID 4112 wrote to memory of 2040 4112 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe 97 PID 4112 wrote to memory of 2040 4112 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe 97 PID 4112 wrote to memory of 2040 4112 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe"C:\Users\Admin\AppData\Local\Temp\d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x74298284.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x74298284.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m41589402.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m41589402.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 12004⤵
- Program crash
PID:3400
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n35292321.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n35292321.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o12772460.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\o12772460.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3712 -ip 37121⤵PID:968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD525f7afe3aa575e26311144dcc92d5ced
SHA11533fb7e99378262ff4c29290626472a68eb7403
SHA256f6940d4bf7b21d5f9280b08f4eda3b0ebe5e0689fb9540bafea0871434d3cdf1
SHA5126931a7b75e0346582a7a45656f8b87371d1495fa0b5b69477e57bc26239c02b24466645bd65a79abfebdb96940e385e6c5eb85aeb228e9a0db351b21cb157327
-
Filesize
176KB
MD525f7afe3aa575e26311144dcc92d5ced
SHA11533fb7e99378262ff4c29290626472a68eb7403
SHA256f6940d4bf7b21d5f9280b08f4eda3b0ebe5e0689fb9540bafea0871434d3cdf1
SHA5126931a7b75e0346582a7a45656f8b87371d1495fa0b5b69477e57bc26239c02b24466645bd65a79abfebdb96940e385e6c5eb85aeb228e9a0db351b21cb157327
-
Filesize
589KB
MD5cb41c6e952481d4e96ba50bb3238801e
SHA13f17ec63a15c00d4817b1389125b2d2053c2214b
SHA2568f874483608cbefe8b0e4756d2910723da33f39e78517d5f836352de21b15f1d
SHA5125abcb76819f5ab2470c4d2541e2b6b1aacb4a36fc3f34fc07f905e8766415f76a09e4f3c0417955877834365a552f3d72c7a9c592376d2fd878d3bc9b1fed297
-
Filesize
589KB
MD5cb41c6e952481d4e96ba50bb3238801e
SHA13f17ec63a15c00d4817b1389125b2d2053c2214b
SHA2568f874483608cbefe8b0e4756d2910723da33f39e78517d5f836352de21b15f1d
SHA5125abcb76819f5ab2470c4d2541e2b6b1aacb4a36fc3f34fc07f905e8766415f76a09e4f3c0417955877834365a552f3d72c7a9c592376d2fd878d3bc9b1fed297
-
Filesize
530KB
MD5b6e710dc31b22a2ae7b95e608fbf0b49
SHA117c57aa64000101a6a07243dddcbfb7a40b6c7c7
SHA2562b5b193a586589d4859c51c7de90285fa7a2d67a41320815407b6728f6209c98
SHA512bf22415a119fe048976da31848885120ec8ff261aa2a9bec5783ff25a8a26d14985271771422dd4640f9860c1edace4504732238babfa54cc9cb71e149519988
-
Filesize
530KB
MD5b6e710dc31b22a2ae7b95e608fbf0b49
SHA117c57aa64000101a6a07243dddcbfb7a40b6c7c7
SHA2562b5b193a586589d4859c51c7de90285fa7a2d67a41320815407b6728f6209c98
SHA512bf22415a119fe048976da31848885120ec8ff261aa2a9bec5783ff25a8a26d14985271771422dd4640f9860c1edace4504732238babfa54cc9cb71e149519988
-
Filesize
168KB
MD5a26df3463c07ca67c9ce51514ab74df7
SHA1368aea0bbc1210a7fb03c26c10648755c99a575d
SHA2564a987ff1d80f70211010889f3969863eccd2804d2b32424eae5a6af4a6a1d866
SHA512dca64ac7921b256ff9aa81722378655e7f709c8a4d2669bf49ef56ba591b64c28aea5c5035cd6bea15d1e8715f0a91553b7f00078bdfbc584817ea283ee8c451
-
Filesize
168KB
MD5a26df3463c07ca67c9ce51514ab74df7
SHA1368aea0bbc1210a7fb03c26c10648755c99a575d
SHA2564a987ff1d80f70211010889f3969863eccd2804d2b32424eae5a6af4a6a1d866
SHA512dca64ac7921b256ff9aa81722378655e7f709c8a4d2669bf49ef56ba591b64c28aea5c5035cd6bea15d1e8715f0a91553b7f00078bdfbc584817ea283ee8c451
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf