Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/05/2023, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
45041eca67b7e26048f5ba4ede5811089aecae18544e6de36b5458a1418393e9.exe
Resource
win10-20230220-en
General
-
Target
45041eca67b7e26048f5ba4ede5811089aecae18544e6de36b5458a1418393e9.exe
-
Size
1.4MB
-
MD5
2385bfe5356c1562586bec94b700f584
-
SHA1
ee7a40fd28f007f41fff13c8b8fac7aa53c8aefd
-
SHA256
45041eca67b7e26048f5ba4ede5811089aecae18544e6de36b5458a1418393e9
-
SHA512
4e457aa8abe9aa2378377fbcca34178b19c873302c4a30a20d4cfd7b24544a74b76555fbe72d68fea08d4d7cd5ae1b3ce36985ce5dc7f824366b4ce5c200dd9d
-
SSDEEP
24576:tyFbabL+kJZp3pZ/+faqrUwE5Gt2XqIGSxSYs4Q/4hxK:ItySkJZBf/wW5GtafGMSErhx
Malware Config
Extracted
redline
maxbi
185.161.248.73:4164
-
auth_value
6aa7dba884fe45693dfa04c91440daef
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a53058573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a53058573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a53058573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a53058573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a53058573.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3628 i89389783.exe 4484 i10149521.exe 4288 i54747689.exe 2120 i04722679.exe 2080 a53058573.exe 2788 b43611091.exe 4400 c31904621.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a53058573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a53058573.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45041eca67b7e26048f5ba4ede5811089aecae18544e6de36b5458a1418393e9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i10149521.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i10149521.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i54747689.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 45041eca67b7e26048f5ba4ede5811089aecae18544e6de36b5458a1418393e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i89389783.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i54747689.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i04722679.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i04722679.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i89389783.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 7 IoCs
pid pid_target Process procid_target 1664 4400 WerFault.exe 73 4008 4400 WerFault.exe 73 3800 4400 WerFault.exe 73 3828 4400 WerFault.exe 73 5000 4400 WerFault.exe 73 3124 4400 WerFault.exe 73 4516 4400 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2080 a53058573.exe 2080 a53058573.exe 2788 b43611091.exe 2788 b43611091.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2080 a53058573.exe Token: SeDebugPrivilege 2788 b43611091.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3704 wrote to memory of 3628 3704 45041eca67b7e26048f5ba4ede5811089aecae18544e6de36b5458a1418393e9.exe 66 PID 3704 wrote to memory of 3628 3704 45041eca67b7e26048f5ba4ede5811089aecae18544e6de36b5458a1418393e9.exe 66 PID 3704 wrote to memory of 3628 3704 45041eca67b7e26048f5ba4ede5811089aecae18544e6de36b5458a1418393e9.exe 66 PID 3628 wrote to memory of 4484 3628 i89389783.exe 67 PID 3628 wrote to memory of 4484 3628 i89389783.exe 67 PID 3628 wrote to memory of 4484 3628 i89389783.exe 67 PID 4484 wrote to memory of 4288 4484 i10149521.exe 68 PID 4484 wrote to memory of 4288 4484 i10149521.exe 68 PID 4484 wrote to memory of 4288 4484 i10149521.exe 68 PID 4288 wrote to memory of 2120 4288 i54747689.exe 69 PID 4288 wrote to memory of 2120 4288 i54747689.exe 69 PID 4288 wrote to memory of 2120 4288 i54747689.exe 69 PID 2120 wrote to memory of 2080 2120 i04722679.exe 70 PID 2120 wrote to memory of 2080 2120 i04722679.exe 70 PID 2120 wrote to memory of 2080 2120 i04722679.exe 70 PID 2120 wrote to memory of 2788 2120 i04722679.exe 71 PID 2120 wrote to memory of 2788 2120 i04722679.exe 71 PID 2120 wrote to memory of 2788 2120 i04722679.exe 71 PID 4288 wrote to memory of 4400 4288 i54747689.exe 73 PID 4288 wrote to memory of 4400 4288 i54747689.exe 73 PID 4288 wrote to memory of 4400 4288 i54747689.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\45041eca67b7e26048f5ba4ede5811089aecae18544e6de36b5458a1418393e9.exe"C:\Users\Admin\AppData\Local\Temp\45041eca67b7e26048f5ba4ede5811089aecae18544e6de36b5458a1418393e9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i89389783.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i89389783.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i10149521.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i10149521.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i54747689.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i54747689.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i04722679.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i04722679.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a53058573.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a53058573.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b43611091.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b43611091.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c31904621.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c31904621.exe5⤵
- Executes dropped EXE
PID:4400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 6206⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 7006⤵
- Program crash
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 8406⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 8286⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 8766⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 8806⤵
- Program crash
PID:3124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 10566⤵
- Program crash
PID:4516
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b55d2f7bf8b5f77f2bcfe770a40a425a
SHA1451b3e618ab8e03855113b60641419524031ca3e
SHA256dcc1385bc7d2344f3e4801ccdcf76ca91955b20b1a6327fbb0272095911fdb48
SHA512705e39796aaae7f57924489686c60674c270780799beba9ddb71804af69ed5c1f7397531570405094bd731084f02d99738a9858b40645f18014680998bd45627
-
Filesize
1.3MB
MD5b55d2f7bf8b5f77f2bcfe770a40a425a
SHA1451b3e618ab8e03855113b60641419524031ca3e
SHA256dcc1385bc7d2344f3e4801ccdcf76ca91955b20b1a6327fbb0272095911fdb48
SHA512705e39796aaae7f57924489686c60674c270780799beba9ddb71804af69ed5c1f7397531570405094bd731084f02d99738a9858b40645f18014680998bd45627
-
Filesize
1.1MB
MD5204cf4ff3619d90a6d95295c03b48ad5
SHA14813a570fff7dd8bdd0222eea507b2106a82c04f
SHA256dab4040f676142d9bb9b55881db9e0306ec4843a4591215f9ec4b22f2f01e410
SHA512374b72753b1c0348a981c2e58a2712d4bae51d825e433ed879a96fccc68f495cd9c4653aae32f11bccbef18b2f3ae298de5f4d42834001938495e4e012084a21
-
Filesize
1.1MB
MD5204cf4ff3619d90a6d95295c03b48ad5
SHA14813a570fff7dd8bdd0222eea507b2106a82c04f
SHA256dab4040f676142d9bb9b55881db9e0306ec4843a4591215f9ec4b22f2f01e410
SHA512374b72753b1c0348a981c2e58a2712d4bae51d825e433ed879a96fccc68f495cd9c4653aae32f11bccbef18b2f3ae298de5f4d42834001938495e4e012084a21
-
Filesize
644KB
MD5c52ce4533a74651944ec232c0d9c0eca
SHA126d22cc517ae05e8b4d2f2c44cdabb1d347eebf5
SHA256794d57c80684f71e153b8d860a35e2ef2ed6016039f5011d9472afb86754a0d5
SHA512cb3f9a21809a4bef942de68c1a4477e448bf8ea28e576a82273c8faf267f6052c15db7cb0a4f0751e2d3b63e163d5039b36251d7b8f585d3643ebdcd8e0ff900
-
Filesize
644KB
MD5c52ce4533a74651944ec232c0d9c0eca
SHA126d22cc517ae05e8b4d2f2c44cdabb1d347eebf5
SHA256794d57c80684f71e153b8d860a35e2ef2ed6016039f5011d9472afb86754a0d5
SHA512cb3f9a21809a4bef942de68c1a4477e448bf8ea28e576a82273c8faf267f6052c15db7cb0a4f0751e2d3b63e163d5039b36251d7b8f585d3643ebdcd8e0ff900
-
Filesize
273KB
MD520b0cc6b58b41c0cf6256170de8a41fd
SHA161f68cfdababd119ca9409b53c1ab90b5dc7ace1
SHA256c445502a6c925965050b45628ec55c8ed0e2be6032b7c107e97e9438574dead1
SHA512de2c4cb8f0ee0f41bc64c6737923b867a902f9fcf230c12732f876640df6f01b8d5769eccb1763e7b6b713791ee96e1f402bbad3428f22569621731b31237049
-
Filesize
273KB
MD520b0cc6b58b41c0cf6256170de8a41fd
SHA161f68cfdababd119ca9409b53c1ab90b5dc7ace1
SHA256c445502a6c925965050b45628ec55c8ed0e2be6032b7c107e97e9438574dead1
SHA512de2c4cb8f0ee0f41bc64c6737923b867a902f9fcf230c12732f876640df6f01b8d5769eccb1763e7b6b713791ee96e1f402bbad3428f22569621731b31237049
-
Filesize
385KB
MD568a12eec690e634ca4ec86daa50f69df
SHA1963cc6dac89c9b87f461358b979945b8aab07288
SHA256542bf6a5fea2504dff71b6ef822895dc935999731bcf9b3862c5ee4029cfc8a8
SHA51288647684cb851449e328f438976ff8193f858aaf8f4f714e3e6f431c47b391befe26dbefc05245580a801153f85c9b7c9897ab9e5671336a39af6343f3e6131c
-
Filesize
385KB
MD568a12eec690e634ca4ec86daa50f69df
SHA1963cc6dac89c9b87f461358b979945b8aab07288
SHA256542bf6a5fea2504dff71b6ef822895dc935999731bcf9b3862c5ee4029cfc8a8
SHA51288647684cb851449e328f438976ff8193f858aaf8f4f714e3e6f431c47b391befe26dbefc05245580a801153f85c9b7c9897ab9e5671336a39af6343f3e6131c
-
Filesize
294KB
MD510a6dc0c80d9746683e7f7bae1ed1f42
SHA195afc6ee20d910a6fcfb1936e9071f386f4d4512
SHA25607ad9d73750a3b1f8486a80507c9f17d63e9e1b3896121d7a4d55f2489eaaf98
SHA51216162157327bdd6418b771aa0e8486e7b10100098722caf3f41e1a01cb87ad7b920a07dd8dbb5faf7ac08e99454e692a4bf53a1d2b3249c0d04a817ee1fbb7a9
-
Filesize
294KB
MD510a6dc0c80d9746683e7f7bae1ed1f42
SHA195afc6ee20d910a6fcfb1936e9071f386f4d4512
SHA25607ad9d73750a3b1f8486a80507c9f17d63e9e1b3896121d7a4d55f2489eaaf98
SHA51216162157327bdd6418b771aa0e8486e7b10100098722caf3f41e1a01cb87ad7b920a07dd8dbb5faf7ac08e99454e692a4bf53a1d2b3249c0d04a817ee1fbb7a9
-
Filesize
168KB
MD527a5dc3ded48fdd5f3e985c8aaea9bf7
SHA1c06cec40cf7dcb8e8c7c48cbc20a2dc9dee28b06
SHA256704fa1e2ecff35313edb29538496c15a77eca44084b6104c0dd2f56982ea513f
SHA51217ead14394159921b01d21351f53a284e1d32ddd03dd14aba1cf2812fc4a4f9738c5da9608d20284f3d8f9d1ff37df2230beb6235dd7ef82183d18a6cb8c64b1
-
Filesize
168KB
MD527a5dc3ded48fdd5f3e985c8aaea9bf7
SHA1c06cec40cf7dcb8e8c7c48cbc20a2dc9dee28b06
SHA256704fa1e2ecff35313edb29538496c15a77eca44084b6104c0dd2f56982ea513f
SHA51217ead14394159921b01d21351f53a284e1d32ddd03dd14aba1cf2812fc4a4f9738c5da9608d20284f3d8f9d1ff37df2230beb6235dd7ef82183d18a6cb8c64b1