Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
176s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe
Resource
win10v2004-20230220-en
General
-
Target
34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe
-
Size
1.5MB
-
MD5
c5498f7e797e3703f31249f2456c1068
-
SHA1
59ced467de55f84bd0f695435ff215d74f780d72
-
SHA256
34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8
-
SHA512
80b5f4fe1524354e35dc484fb258ff8411bb0c6af21b3946dc7fb4c1a1521edb1059c8c639c87e2141ba7eeb267cf3ce35bbd4515707b4760e22c05ce204becc
-
SSDEEP
24576:AyrgpjNc/i8n8qEUuPLy28B3EN28Rsd7f0UFG3a4YGBP8+1LmcLnAJAhN:Hg8jAUuPG/tEN28MfmYEPXqc8
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1800-217-0x00000000076C0000-0x0000000007CD8000-memory.dmp redline_stealer behavioral2/memory/1800-222-0x0000000007500000-0x0000000007566000-memory.dmp redline_stealer behavioral2/memory/1800-227-0x0000000008CA0000-0x0000000008E62000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9365779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9365779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9365779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9365779.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a9365779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9365779.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1632 v7212107.exe 2632 v6882549.exe 1840 v9604762.exe 4856 v2407895.exe 2080 a9365779.exe 1800 b1880626.exe 2076 c7788247.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9365779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9365779.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6882549.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9604762.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v2407895.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7212107.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7212107.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6882549.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9604762.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2407895.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 3 IoCs
pid pid_target Process procid_target 980 2080 WerFault.exe 84 2844 2076 WerFault.exe 90 4496 2076 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2080 a9365779.exe 2080 a9365779.exe 1800 b1880626.exe 1800 b1880626.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2080 a9365779.exe Token: SeDebugPrivilege 1800 b1880626.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4292 wrote to memory of 1632 4292 34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe 79 PID 4292 wrote to memory of 1632 4292 34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe 79 PID 4292 wrote to memory of 1632 4292 34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe 79 PID 1632 wrote to memory of 2632 1632 v7212107.exe 81 PID 1632 wrote to memory of 2632 1632 v7212107.exe 81 PID 1632 wrote to memory of 2632 1632 v7212107.exe 81 PID 2632 wrote to memory of 1840 2632 v6882549.exe 82 PID 2632 wrote to memory of 1840 2632 v6882549.exe 82 PID 2632 wrote to memory of 1840 2632 v6882549.exe 82 PID 1840 wrote to memory of 4856 1840 v9604762.exe 83 PID 1840 wrote to memory of 4856 1840 v9604762.exe 83 PID 1840 wrote to memory of 4856 1840 v9604762.exe 83 PID 4856 wrote to memory of 2080 4856 v2407895.exe 84 PID 4856 wrote to memory of 2080 4856 v2407895.exe 84 PID 4856 wrote to memory of 2080 4856 v2407895.exe 84 PID 4856 wrote to memory of 1800 4856 v2407895.exe 88 PID 4856 wrote to memory of 1800 4856 v2407895.exe 88 PID 4856 wrote to memory of 1800 4856 v2407895.exe 88 PID 1840 wrote to memory of 2076 1840 v9604762.exe 90 PID 1840 wrote to memory of 2076 1840 v9604762.exe 90 PID 1840 wrote to memory of 2076 1840 v9604762.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe"C:\Users\Admin\AppData\Local\Temp\34e5b10aaed3cf88dbd078ea9bf182908a94e314d2c769de2233063ea2c0d7a8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7212107.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7212107.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6882549.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6882549.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9604762.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9604762.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2407895.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2407895.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9365779.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9365779.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 10527⤵
- Program crash
PID:980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1880626.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1880626.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7788247.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7788247.exe5⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 6966⤵
- Program crash
PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 7806⤵
- Program crash
PID:4496
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2080 -ip 20801⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2076 -ip 20761⤵PID:1636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2076 -ip 20761⤵PID:3552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD556f0b12b09472bf19528f884a407e3f9
SHA1a69ec36e53496aa5d2b821319ab1d57b98341797
SHA256a560285af2241e3eaeeef70c1680464fa3aaf04fc31281435acd5112944b837c
SHA51284aca1dca40675d6697f5e2a3dbc59272609144785fc0e8d67f756f809e206d441019e07acbc3398dbe3b9fb5e5bc2a611d89ab64bd77b959e82ad8976459be1
-
Filesize
1.4MB
MD556f0b12b09472bf19528f884a407e3f9
SHA1a69ec36e53496aa5d2b821319ab1d57b98341797
SHA256a560285af2241e3eaeeef70c1680464fa3aaf04fc31281435acd5112944b837c
SHA51284aca1dca40675d6697f5e2a3dbc59272609144785fc0e8d67f756f809e206d441019e07acbc3398dbe3b9fb5e5bc2a611d89ab64bd77b959e82ad8976459be1
-
Filesize
912KB
MD51d4999c8ada1bc2bf14cb0189940264b
SHA1c1c8689111298efb4ad34fb9fb22b648eaad95a8
SHA2561448a5eb1955ae4006cfbf68ce5871cd65181dadde5335d191e7eaeb0a22b2c7
SHA51225277a43a3afe2e59c817f5a6a9396f9158972f07559c22432600412bd0c2b89c2b772160193317b79a7d7e95b06d933f409f520270c92fac50e532fc077f0c8
-
Filesize
912KB
MD51d4999c8ada1bc2bf14cb0189940264b
SHA1c1c8689111298efb4ad34fb9fb22b648eaad95a8
SHA2561448a5eb1955ae4006cfbf68ce5871cd65181dadde5335d191e7eaeb0a22b2c7
SHA51225277a43a3afe2e59c817f5a6a9396f9158972f07559c22432600412bd0c2b89c2b772160193317b79a7d7e95b06d933f409f520270c92fac50e532fc077f0c8
-
Filesize
708KB
MD51b07163d82fac2295f941384b41d09c7
SHA1a1198f14bd1b9516ed3f6b14b06794cc8ebc52ed
SHA25642b5985aa9c2063c8b9f778c38fedfcf80e01e50f67533a613a69cd8e24fa54c
SHA5124fca2203fc074b163c3bb9c5bbe12bc113b0211929d292c64ee57f116e762bdcfad4c8a8807d969e1d1cd14a095cb940a7ef99b41e8c52163642a5dbfcba8913
-
Filesize
708KB
MD51b07163d82fac2295f941384b41d09c7
SHA1a1198f14bd1b9516ed3f6b14b06794cc8ebc52ed
SHA25642b5985aa9c2063c8b9f778c38fedfcf80e01e50f67533a613a69cd8e24fa54c
SHA5124fca2203fc074b163c3bb9c5bbe12bc113b0211929d292c64ee57f116e762bdcfad4c8a8807d969e1d1cd14a095cb940a7ef99b41e8c52163642a5dbfcba8913
-
Filesize
340KB
MD59939987c76d1e99c47b8a4ff43a8c9a2
SHA1a99a0eb5401c68c8985da32d4a198fc2a819838c
SHA256efdebd3bbe060b47f617378264a9fe89d47f949af0ca90baa4730f1408a868ce
SHA5127e10e3c585253fd17e44a75d359468c6b5b3b27ca6c33badbdf46f1ef59b571722fc1a8550635d7266e2a0e94d8b706b087290099d54657f3f5959dddaed7516
-
Filesize
340KB
MD59939987c76d1e99c47b8a4ff43a8c9a2
SHA1a99a0eb5401c68c8985da32d4a198fc2a819838c
SHA256efdebd3bbe060b47f617378264a9fe89d47f949af0ca90baa4730f1408a868ce
SHA5127e10e3c585253fd17e44a75d359468c6b5b3b27ca6c33badbdf46f1ef59b571722fc1a8550635d7266e2a0e94d8b706b087290099d54657f3f5959dddaed7516
-
Filesize
417KB
MD5879580ced09f1303c8a57341c1b40228
SHA162ebb8319b31eae40b5b1063672f15cf001d9185
SHA256fe03cd9dc128abdea6f651391a1d2ec3ece92cef3f7edc393f2db0232fad2efe
SHA51268e44a4f1b7725536c2110836f9daa0e34b12c6deff6205f933e2751356b9dae3ab498a9726ba06ca691b428c9153f169f6215c94e0025d92c990ae9c01bba5d
-
Filesize
417KB
MD5879580ced09f1303c8a57341c1b40228
SHA162ebb8319b31eae40b5b1063672f15cf001d9185
SHA256fe03cd9dc128abdea6f651391a1d2ec3ece92cef3f7edc393f2db0232fad2efe
SHA51268e44a4f1b7725536c2110836f9daa0e34b12c6deff6205f933e2751356b9dae3ab498a9726ba06ca691b428c9153f169f6215c94e0025d92c990ae9c01bba5d
-
Filesize
360KB
MD54b1d321a746599576a771f3b938d6c0c
SHA167399d167abd6ca480c702fd8b9af6583ae9dd57
SHA25648d1c0a6af3e4cfd86df0eb1cb87a0db85afb99c6be4c2e1bdd7d9f98544a951
SHA5126d14799700780fbd7add743b88c16601988fd1dcfcc5d3ea6a483bf0864227e028118735a7f6103684b57c9f4bcd690fc105e3f76cc44783ed0e69fd6651a718
-
Filesize
360KB
MD54b1d321a746599576a771f3b938d6c0c
SHA167399d167abd6ca480c702fd8b9af6583ae9dd57
SHA25648d1c0a6af3e4cfd86df0eb1cb87a0db85afb99c6be4c2e1bdd7d9f98544a951
SHA5126d14799700780fbd7add743b88c16601988fd1dcfcc5d3ea6a483bf0864227e028118735a7f6103684b57c9f4bcd690fc105e3f76cc44783ed0e69fd6651a718
-
Filesize
136KB
MD5293ddadbaf173742b5515aee3bca1311
SHA18d9fb23352072c3d723c57608111a25233629965
SHA256101960f6116c71c905a8d4d64675d1192e0193b6cce6db514da96c7dbf744ad8
SHA512790b11661d2a9300942d3f632a954bfaf94b921c9b97e0e57b133443aacab05b3eb761c5696b7c952293309f0252eba99d8488f2fbdedb3e22097e83dd7c2c3b
-
Filesize
136KB
MD5293ddadbaf173742b5515aee3bca1311
SHA18d9fb23352072c3d723c57608111a25233629965
SHA256101960f6116c71c905a8d4d64675d1192e0193b6cce6db514da96c7dbf744ad8
SHA512790b11661d2a9300942d3f632a954bfaf94b921c9b97e0e57b133443aacab05b3eb761c5696b7c952293309f0252eba99d8488f2fbdedb3e22097e83dd7c2c3b