Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe
Resource
win10v2004-20230220-en
General
-
Target
4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe
-
Size
1.4MB
-
MD5
f123219c68b39a1151a8d00d893f3d63
-
SHA1
b55b25fb0ac9c3b4fcfc2bcb2c6f1124a90af3fc
-
SHA256
4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012
-
SHA512
c923b826ee9055c8255580244a305aa6b7de59d2c25f5c05de225fd421e045d65c8adeab4363cd7d72f3bae720e5d63fd5ae22f1467345ad12301bbfe2de68da
-
SSDEEP
24576:Ly/npwKqOKalPvePftrXHlSdZovNsl5fbMX9GP/NIB/vpKd8iE8jE1k:+hlktrXHlSEv+kX98Nb8irjE
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2900-214-0x000000000ABE0000-0x000000000B1F8000-memory.dmp redline_stealer behavioral2/memory/2900-221-0x000000000AB20000-0x000000000AB86000-memory.dmp redline_stealer behavioral2/memory/2900-222-0x000000000BE60000-0x000000000C022000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4791648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4791648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4791648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4791648.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4791648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4791648.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3500 v3704053.exe 4700 v1980960.exe 1444 v5915740.exe 32 v0168013.exe 2264 a4791648.exe 2900 b0686800.exe 4176 c1955619.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4791648.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4791648.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5915740.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0168013.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1980960.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1980960.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3704053.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3704053.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5915740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0168013.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
pid pid_target Process procid_target 4480 2264 WerFault.exe 88 3424 4176 WerFault.exe 92 536 4176 WerFault.exe 92 4188 4176 WerFault.exe 92 2760 4176 WerFault.exe 92 2180 4176 WerFault.exe 92 400 4176 WerFault.exe 92 3432 4176 WerFault.exe 92 3008 4176 WerFault.exe 92 4808 4176 WerFault.exe 92 4704 4176 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2264 a4791648.exe 2264 a4791648.exe 2900 b0686800.exe 2900 b0686800.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2264 a4791648.exe Token: SeDebugPrivilege 2900 b0686800.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4176 c1955619.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4440 wrote to memory of 3500 4440 4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe 82 PID 4440 wrote to memory of 3500 4440 4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe 82 PID 4440 wrote to memory of 3500 4440 4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe 82 PID 3500 wrote to memory of 4700 3500 v3704053.exe 85 PID 3500 wrote to memory of 4700 3500 v3704053.exe 85 PID 3500 wrote to memory of 4700 3500 v3704053.exe 85 PID 4700 wrote to memory of 1444 4700 v1980960.exe 86 PID 4700 wrote to memory of 1444 4700 v1980960.exe 86 PID 4700 wrote to memory of 1444 4700 v1980960.exe 86 PID 1444 wrote to memory of 32 1444 v5915740.exe 87 PID 1444 wrote to memory of 32 1444 v5915740.exe 87 PID 1444 wrote to memory of 32 1444 v5915740.exe 87 PID 32 wrote to memory of 2264 32 v0168013.exe 88 PID 32 wrote to memory of 2264 32 v0168013.exe 88 PID 32 wrote to memory of 2264 32 v0168013.exe 88 PID 32 wrote to memory of 2900 32 v0168013.exe 91 PID 32 wrote to memory of 2900 32 v0168013.exe 91 PID 32 wrote to memory of 2900 32 v0168013.exe 91 PID 1444 wrote to memory of 4176 1444 v5915740.exe 92 PID 1444 wrote to memory of 4176 1444 v5915740.exe 92 PID 1444 wrote to memory of 4176 1444 v5915740.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe"C:\Users\Admin\AppData\Local\Temp\4745329d76cd60b98eb98a1167bda2059b01fcfc446e3a789a0616f0a02b3012.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3704053.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3704053.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1980960.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1980960.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5915740.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5915740.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0168013.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0168013.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4791648.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4791648.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 10847⤵
- Program crash
PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0686800.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0686800.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1955619.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1955619.exe5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 6966⤵
- Program crash
PID:3424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 7806⤵
- Program crash
PID:536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 8006⤵
- Program crash
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 9606⤵
- Program crash
PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 9806⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 9806⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 12246⤵
- Program crash
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 12606⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 12886⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 13366⤵
- Program crash
PID:4704
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2264 -ip 22641⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4176 -ip 41761⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4176 -ip 41761⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4176 -ip 41761⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4176 -ip 41761⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4176 -ip 41761⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4176 -ip 41761⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4176 -ip 41761⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4176 -ip 41761⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4176 -ip 41761⤵PID:1848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4176 -ip 41761⤵PID:4816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51bfdb8edf8aa32969b6be42189a8c8df
SHA1b799ef112a6e89014e37f442060a96504908bd3a
SHA2564c858ae3c1b7c3f39bf518a0e04996cd37164fb47c19ddfadcc7174da4021031
SHA512b4b644e5697e6a78e8e3428205088a2dc6316d8f0838abda89ce5f585840beac8b4fd7c30ece474c5b6a35a86c0123c6b57e652e4c8661a301db064a77d07180
-
Filesize
1.3MB
MD51bfdb8edf8aa32969b6be42189a8c8df
SHA1b799ef112a6e89014e37f442060a96504908bd3a
SHA2564c858ae3c1b7c3f39bf518a0e04996cd37164fb47c19ddfadcc7174da4021031
SHA512b4b644e5697e6a78e8e3428205088a2dc6316d8f0838abda89ce5f585840beac8b4fd7c30ece474c5b6a35a86c0123c6b57e652e4c8661a301db064a77d07180
-
Filesize
845KB
MD5c1644ec1446dffbdcd6fd551a5bbf3af
SHA125385019a143b99b2489674acff7132abc45e1f6
SHA256dc42c2ad19ef6a247e448759e6de0f53acc9548fef1cfed9c8e3f77a9447daa6
SHA5126127d39ac57445ee7c9b533f38f0ee52377aaf46d10ceb9e791a8f7e78d40cc9994ea87e2eba1a8c4cf1d48227fc4cdf9d561553d7a969476711b50b24e21949
-
Filesize
845KB
MD5c1644ec1446dffbdcd6fd551a5bbf3af
SHA125385019a143b99b2489674acff7132abc45e1f6
SHA256dc42c2ad19ef6a247e448759e6de0f53acc9548fef1cfed9c8e3f77a9447daa6
SHA5126127d39ac57445ee7c9b533f38f0ee52377aaf46d10ceb9e791a8f7e78d40cc9994ea87e2eba1a8c4cf1d48227fc4cdf9d561553d7a969476711b50b24e21949
-
Filesize
641KB
MD5a0761a87fd898c089ecd9e6e0916c0d9
SHA13909f71a0aae0bfe859e7705d3b1ac3aee999d8e
SHA256111c3fb60284f144913e7f545cb2c0f034d886d7466b40f9e635137be03d8599
SHA512a72b495cb1a8db47043db2cae6b7a59ccd726deba5ceff51cc71c9d30d68090b873c7ba90e84bfb7873ddd9ca72eb61f0868b83a9040525004a4939617bbd21a
-
Filesize
641KB
MD5a0761a87fd898c089ecd9e6e0916c0d9
SHA13909f71a0aae0bfe859e7705d3b1ac3aee999d8e
SHA256111c3fb60284f144913e7f545cb2c0f034d886d7466b40f9e635137be03d8599
SHA512a72b495cb1a8db47043db2cae6b7a59ccd726deba5ceff51cc71c9d30d68090b873c7ba90e84bfb7873ddd9ca72eb61f0868b83a9040525004a4939617bbd21a
-
Filesize
268KB
MD54ecd78a69c30031bc8e9e5eda6ccf6ab
SHA1edf1a592d01921bc108010b81f2a611c1fd1b9cb
SHA25650f8f51f7c6d869be8329f771acf547126e04e1fbc80c9f110830d96202b3521
SHA51223a12853d76410295ad81afb405f8ed2bd39393d3b49bf7d46a43faf1ead744f398ff7d7e8c630f7259d5d1512ced596f57160f01774f12e546337066e421b87
-
Filesize
268KB
MD54ecd78a69c30031bc8e9e5eda6ccf6ab
SHA1edf1a592d01921bc108010b81f2a611c1fd1b9cb
SHA25650f8f51f7c6d869be8329f771acf547126e04e1fbc80c9f110830d96202b3521
SHA51223a12853d76410295ad81afb405f8ed2bd39393d3b49bf7d46a43faf1ead744f398ff7d7e8c630f7259d5d1512ced596f57160f01774f12e546337066e421b87
-
Filesize
383KB
MD5c83e3da0dd44ad02374698199ae9ed10
SHA150178e325e4536132ff35b1f476f6e21b1c079da
SHA2566b8cfc47f80ce52b78060a108e30996a58dd96ba1d33580301221e2ae7814b1b
SHA5125d534b3e34d94dca5d75fc93c01520caf22008b9d6221f365d19dd7b6d9718a4642ad23538fe2e8aa426d3e5761823d0c8c4cea28254e0b4ffe92552aece2af8
-
Filesize
383KB
MD5c83e3da0dd44ad02374698199ae9ed10
SHA150178e325e4536132ff35b1f476f6e21b1c079da
SHA2566b8cfc47f80ce52b78060a108e30996a58dd96ba1d33580301221e2ae7814b1b
SHA5125d534b3e34d94dca5d75fc93c01520caf22008b9d6221f365d19dd7b6d9718a4642ad23538fe2e8aa426d3e5761823d0c8c4cea28254e0b4ffe92552aece2af8
-
Filesize
289KB
MD50ba4c6db747a8c107cb4b7d52dd62739
SHA1bd34aabba4c1bdeee0b781e458f209309fc8eb55
SHA256cba1b269d954637caffd046a11f0ffedcda85d92ff0a39a9703e5d5a2700d58a
SHA512ede615bd3c293c142b3f413bf18fee35dd32f4ffb771817ceff769b9051c653e222f13b7baaf822873f7e6a8686b08725da142f1631d7196d70b18fcc98c14d6
-
Filesize
289KB
MD50ba4c6db747a8c107cb4b7d52dd62739
SHA1bd34aabba4c1bdeee0b781e458f209309fc8eb55
SHA256cba1b269d954637caffd046a11f0ffedcda85d92ff0a39a9703e5d5a2700d58a
SHA512ede615bd3c293c142b3f413bf18fee35dd32f4ffb771817ceff769b9051c653e222f13b7baaf822873f7e6a8686b08725da142f1631d7196d70b18fcc98c14d6
-
Filesize
168KB
MD5931c1824844f1fe2d32fbaffdf8ec048
SHA18e9ad49785cc6ba9c1b530e07dc0f15f3efb8cb8
SHA25676eeb90f7ec3929072019a6cd58a57faa20d95f963b5db28a29baf8d3010a75c
SHA51211bb518b82fcbeceb18efe42550e93cf4a064c84000344de6838c6d00818688bd30e482a7dc01badaaf7bd43fb41dc884c10a534f4ed873ef344bbf0cc0701cd
-
Filesize
168KB
MD5931c1824844f1fe2d32fbaffdf8ec048
SHA18e9ad49785cc6ba9c1b530e07dc0f15f3efb8cb8
SHA25676eeb90f7ec3929072019a6cd58a57faa20d95f963b5db28a29baf8d3010a75c
SHA51211bb518b82fcbeceb18efe42550e93cf4a064c84000344de6838c6d00818688bd30e482a7dc01badaaf7bd43fb41dc884c10a534f4ed873ef344bbf0cc0701cd