Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03/05/2023, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe
Resource
win10-20230220-en
General
-
Target
a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe
-
Size
1.5MB
-
MD5
026e949b0db5fadce263eb51d76a10ab
-
SHA1
989ecc966a598275fd2e97ed19ad8386b6eda4e4
-
SHA256
a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1
-
SHA512
d753bcfc4292cf67e6947155f892813b776b03642e498da1da463116fa2d0b1608e0710213cd169422353ff61f4fab320c418a03dd202615cf1ad057c52d42cc
-
SSDEEP
24576:IyBKtnl/cPT4B7+gRkZO/Ms4aWzNpMrq6fTSgHP4OEH9JbkE8/081Bo8:PB6/PIhZOks4Orq6fZHPsd9e1S
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1349782.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1349782.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1349782.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1349782.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1349782.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4068 v3298723.exe 4024 v6756129.exe 3904 v0053009.exe 4884 v9707106.exe 1536 a1349782.exe 1072 b0539529.exe 3680 c0574220.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1349782.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1349782.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3298723.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0053009.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9707106.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v9707106.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0053009.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3298723.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6756129.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6756129.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 8 IoCs
pid pid_target Process procid_target 3696 3680 WerFault.exe 73 2588 3680 WerFault.exe 73 3268 3680 WerFault.exe 73 4432 3680 WerFault.exe 73 4668 3680 WerFault.exe 73 4408 3680 WerFault.exe 73 3212 3680 WerFault.exe 73 3392 3680 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1536 a1349782.exe 1536 a1349782.exe 1072 b0539529.exe 1072 b0539529.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1536 a1349782.exe Token: SeDebugPrivilege 1072 b0539529.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3680 c0574220.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4068 4824 a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe 66 PID 4824 wrote to memory of 4068 4824 a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe 66 PID 4824 wrote to memory of 4068 4824 a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe 66 PID 4068 wrote to memory of 4024 4068 v3298723.exe 67 PID 4068 wrote to memory of 4024 4068 v3298723.exe 67 PID 4068 wrote to memory of 4024 4068 v3298723.exe 67 PID 4024 wrote to memory of 3904 4024 v6756129.exe 68 PID 4024 wrote to memory of 3904 4024 v6756129.exe 68 PID 4024 wrote to memory of 3904 4024 v6756129.exe 68 PID 3904 wrote to memory of 4884 3904 v0053009.exe 69 PID 3904 wrote to memory of 4884 3904 v0053009.exe 69 PID 3904 wrote to memory of 4884 3904 v0053009.exe 69 PID 4884 wrote to memory of 1536 4884 v9707106.exe 70 PID 4884 wrote to memory of 1536 4884 v9707106.exe 70 PID 4884 wrote to memory of 1536 4884 v9707106.exe 70 PID 4884 wrote to memory of 1072 4884 v9707106.exe 71 PID 4884 wrote to memory of 1072 4884 v9707106.exe 71 PID 4884 wrote to memory of 1072 4884 v9707106.exe 71 PID 3904 wrote to memory of 3680 3904 v0053009.exe 73 PID 3904 wrote to memory of 3680 3904 v0053009.exe 73 PID 3904 wrote to memory of 3680 3904 v0053009.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe"C:\Users\Admin\AppData\Local\Temp\a203efba7756f87edf9c9fd1e361104c543b76a2c8124572dd33718547a064e1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3298723.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3298723.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6756129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6756129.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0053009.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0053009.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9707106.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9707106.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1349782.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a1349782.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0539529.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0539529.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0574220.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c0574220.exe5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 6246⤵
- Program crash
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 7046⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 8446⤵
- Program crash
PID:3268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 8526⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 8806⤵
- Program crash
PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 8166⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 11926⤵
- Program crash
PID:3212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3680 -s 11326⤵
- Program crash
PID:3392
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD52344b8dcad0f5f153ef4285a0392065e
SHA1890a7d44b20dce41de59b4812e319d5a7a0556f2
SHA256a52beb0a0a9afcb92f0678c52803cb79713d25b0a58bcf8909f2773e3c14434f
SHA51228d27c67ab93bd98e13225243d04cf21fc0dc0fc387682bf8cd69ae801c705bd7dd2a3f9d927bc600fcbb46019062c925a37209991ab701e063346c413031458
-
Filesize
1.3MB
MD52344b8dcad0f5f153ef4285a0392065e
SHA1890a7d44b20dce41de59b4812e319d5a7a0556f2
SHA256a52beb0a0a9afcb92f0678c52803cb79713d25b0a58bcf8909f2773e3c14434f
SHA51228d27c67ab93bd98e13225243d04cf21fc0dc0fc387682bf8cd69ae801c705bd7dd2a3f9d927bc600fcbb46019062c925a37209991ab701e063346c413031458
-
Filesize
850KB
MD540cd944a508be23879b0ac9249159b36
SHA1b28fa0c5bb763641cd5740be136280db2f97755a
SHA256dcd3ae66dea737ab235670c70921a6f654ddb2e721532541063df6c4a217706d
SHA512a1926b8b823d779c3aad643cbd3c6f2e7c4061a05ed5e989dd3edcf6d434363c28d8e391c1daeefb881886f4fb35c07123a32249be3dc5f81bdc64a39339e73e
-
Filesize
850KB
MD540cd944a508be23879b0ac9249159b36
SHA1b28fa0c5bb763641cd5740be136280db2f97755a
SHA256dcd3ae66dea737ab235670c70921a6f654ddb2e721532541063df6c4a217706d
SHA512a1926b8b823d779c3aad643cbd3c6f2e7c4061a05ed5e989dd3edcf6d434363c28d8e391c1daeefb881886f4fb35c07123a32249be3dc5f81bdc64a39339e73e
-
Filesize
646KB
MD5b66d32de14847639c000ed8206cb8f67
SHA10c75290b25ad47d255ed483b463533e21769aba5
SHA256b60ce8bd221634e294b1ad587353527b35d071d0e65b280ea437a50944f0b04c
SHA512044f368d2d71fb871250bb6d80749f117b713cc6164bc850849c0d740e75e75c301d86e14366942e2b25709c2c89f43c43689825975cd3d7b559a95265b0f1ce
-
Filesize
646KB
MD5b66d32de14847639c000ed8206cb8f67
SHA10c75290b25ad47d255ed483b463533e21769aba5
SHA256b60ce8bd221634e294b1ad587353527b35d071d0e65b280ea437a50944f0b04c
SHA512044f368d2d71fb871250bb6d80749f117b713cc6164bc850849c0d740e75e75c301d86e14366942e2b25709c2c89f43c43689825975cd3d7b559a95265b0f1ce
-
Filesize
271KB
MD5d1a02ccd3a45a8f7106a1c146764fc06
SHA141cfc736195d826bc8336b156f586eb2c1994f61
SHA256eb86c484461d6e955ec57e2c7e22716e8e990422962bb02ac5f631350deea296
SHA512b15e3ae3323ac2a9c1d43b714b9c44ec50781ed8388af852d34e65eba4fd6f62a302af26cc0b557923582e2a4d797617428f834ae89d41126574604face393b9
-
Filesize
271KB
MD5d1a02ccd3a45a8f7106a1c146764fc06
SHA141cfc736195d826bc8336b156f586eb2c1994f61
SHA256eb86c484461d6e955ec57e2c7e22716e8e990422962bb02ac5f631350deea296
SHA512b15e3ae3323ac2a9c1d43b714b9c44ec50781ed8388af852d34e65eba4fd6f62a302af26cc0b557923582e2a4d797617428f834ae89d41126574604face393b9
-
Filesize
385KB
MD53928688c105941112442b5d9954ca248
SHA13fac2c4efcf02be699fbfd80a4d763d40bf62328
SHA25676aa936cc99a5a6f8dd3471a7a3b79f9bc2671907cea2768a3ca580af6aa7fb5
SHA5123554060eb865135b30c4800753f1f51f2ae5e0b85499c39f85fb3bfb224016e910e4d94dcdc669c69011aa6a4ec6691347b68020be9247a24c9e3520dad485f4
-
Filesize
385KB
MD53928688c105941112442b5d9954ca248
SHA13fac2c4efcf02be699fbfd80a4d763d40bf62328
SHA25676aa936cc99a5a6f8dd3471a7a3b79f9bc2671907cea2768a3ca580af6aa7fb5
SHA5123554060eb865135b30c4800753f1f51f2ae5e0b85499c39f85fb3bfb224016e910e4d94dcdc669c69011aa6a4ec6691347b68020be9247a24c9e3520dad485f4
-
Filesize
292KB
MD589c6816c14ad634d01ea0b1ace48ae1b
SHA16ea59669d69b433ce89d07f233b423d062fd190c
SHA256f30a4c8b4527f450f3f70cd7e82c28639cebf1328fbbb1ef10c7bedcedec6869
SHA512382750cefaf2a9565dd12507ba97204dc46f19a106bce5d42fb2eb6e18c48a6128aa87701f35e7212d2a9edde19d7cb300c2bfef5ee43de08bee89573375eef2
-
Filesize
292KB
MD589c6816c14ad634d01ea0b1ace48ae1b
SHA16ea59669d69b433ce89d07f233b423d062fd190c
SHA256f30a4c8b4527f450f3f70cd7e82c28639cebf1328fbbb1ef10c7bedcedec6869
SHA512382750cefaf2a9565dd12507ba97204dc46f19a106bce5d42fb2eb6e18c48a6128aa87701f35e7212d2a9edde19d7cb300c2bfef5ee43de08bee89573375eef2
-
Filesize
168KB
MD5e241b9b7a8009875390a57ad156b4573
SHA18c773d2189529f4dd849bfeb5448e18131805c65
SHA25611642350708839de1d89048bd13c03554c412b73caf0307dae7bc5e8b57cb1fe
SHA5122e03ba76d9e9e815279a1fcd8336379d4c207ea90f93101453fca673b6f7cb938bdbeab70d8f1aac59fd45331a1e3fba997d5cc005784a4ef7066253cec7adad
-
Filesize
168KB
MD5e241b9b7a8009875390a57ad156b4573
SHA18c773d2189529f4dd849bfeb5448e18131805c65
SHA25611642350708839de1d89048bd13c03554c412b73caf0307dae7bc5e8b57cb1fe
SHA5122e03ba76d9e9e815279a1fcd8336379d4c207ea90f93101453fca673b6f7cb938bdbeab70d8f1aac59fd45331a1e3fba997d5cc005784a4ef7066253cec7adad