Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe
Resource
win10v2004-20230220-en
General
-
Target
69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe
-
Size
934KB
-
MD5
baebcb29052de8caa8aabaf105c26784
-
SHA1
013abd1f46591da06e79979fea0082fe389fac78
-
SHA256
69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c
-
SHA512
5dde310300c937656a2c397fb623fbd926c203dcfb47ac340e0f7699510a1dff513ff4dd876c047a2679626eb7998f02f50e5e122fec459f1b72502d8b62e20e
-
SSDEEP
24576:DyJ8vrKB1w0nZOXgkOFX/l8p3nDTTfiPbduPvx:WKT4w0MwRFXtODqPEn
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1708 un015561.exe 1364 85940504.exe 560 1.exe 1040 rk904859.exe 1572 si042132.exe -
Loads dropped DLL 11 IoCs
pid Process 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 1708 un015561.exe 1708 un015561.exe 1708 un015561.exe 1364 85940504.exe 1364 85940504.exe 1708 un015561.exe 1708 un015561.exe 1040 rk904859.exe 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 1572 si042132.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un015561.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un015561.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 560 1.exe 560 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1364 85940504.exe Token: SeDebugPrivilege 1040 rk904859.exe Token: SeDebugPrivilege 560 1.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1708 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 28 PID 1244 wrote to memory of 1708 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 28 PID 1244 wrote to memory of 1708 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 28 PID 1244 wrote to memory of 1708 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 28 PID 1244 wrote to memory of 1708 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 28 PID 1244 wrote to memory of 1708 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 28 PID 1244 wrote to memory of 1708 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 28 PID 1708 wrote to memory of 1364 1708 un015561.exe 29 PID 1708 wrote to memory of 1364 1708 un015561.exe 29 PID 1708 wrote to memory of 1364 1708 un015561.exe 29 PID 1708 wrote to memory of 1364 1708 un015561.exe 29 PID 1708 wrote to memory of 1364 1708 un015561.exe 29 PID 1708 wrote to memory of 1364 1708 un015561.exe 29 PID 1708 wrote to memory of 1364 1708 un015561.exe 29 PID 1364 wrote to memory of 560 1364 85940504.exe 30 PID 1364 wrote to memory of 560 1364 85940504.exe 30 PID 1364 wrote to memory of 560 1364 85940504.exe 30 PID 1364 wrote to memory of 560 1364 85940504.exe 30 PID 1364 wrote to memory of 560 1364 85940504.exe 30 PID 1364 wrote to memory of 560 1364 85940504.exe 30 PID 1364 wrote to memory of 560 1364 85940504.exe 30 PID 1708 wrote to memory of 1040 1708 un015561.exe 31 PID 1708 wrote to memory of 1040 1708 un015561.exe 31 PID 1708 wrote to memory of 1040 1708 un015561.exe 31 PID 1708 wrote to memory of 1040 1708 un015561.exe 31 PID 1708 wrote to memory of 1040 1708 un015561.exe 31 PID 1708 wrote to memory of 1040 1708 un015561.exe 31 PID 1708 wrote to memory of 1040 1708 un015561.exe 31 PID 1244 wrote to memory of 1572 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 32 PID 1244 wrote to memory of 1572 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 32 PID 1244 wrote to memory of 1572 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 32 PID 1244 wrote to memory of 1572 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 32 PID 1244 wrote to memory of 1572 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 32 PID 1244 wrote to memory of 1572 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 32 PID 1244 wrote to memory of 1572 1244 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe"C:\Users\Admin\AppData\Local\Temp\69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un015561.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un015561.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85940504.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85940504.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk904859.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk904859.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042132.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042132.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD52b51c6b70e77afdbd275c80eae26c30d
SHA1af59cb3982cf578734d2ca82d849a35adb5b0465
SHA25629fdf4d1cd97ab492bd487e03c71c045c00cb7d70f9f2e77e29aab061f08d77f
SHA512c80c605934f005fffceec5667b0d1367dceffb8ca55f61fda9111e5e83be6c25a3aa56d57d77ab658e0fb8370417353c39d95e051455e034674ac0c87a109d47
-
Filesize
169KB
MD52b51c6b70e77afdbd275c80eae26c30d
SHA1af59cb3982cf578734d2ca82d849a35adb5b0465
SHA25629fdf4d1cd97ab492bd487e03c71c045c00cb7d70f9f2e77e29aab061f08d77f
SHA512c80c605934f005fffceec5667b0d1367dceffb8ca55f61fda9111e5e83be6c25a3aa56d57d77ab658e0fb8370417353c39d95e051455e034674ac0c87a109d47
-
Filesize
781KB
MD599c9a2bf4700a390fbbd5c3cb80187ff
SHA14ca59ed616f895f81be69cec43ec1ac8683563ed
SHA256680307999368a50af38452eea760f7748d1740046b8653d6fa036df321774fc3
SHA5125eb44e4a6363baebd4842851e1eec5a0b09913b93f93914732cec6d225a814e741f3ed0729479f251dace6b68bbc375f4e1182b8603a93b1a217184ab7ebb1b8
-
Filesize
781KB
MD599c9a2bf4700a390fbbd5c3cb80187ff
SHA14ca59ed616f895f81be69cec43ec1ac8683563ed
SHA256680307999368a50af38452eea760f7748d1740046b8653d6fa036df321774fc3
SHA5125eb44e4a6363baebd4842851e1eec5a0b09913b93f93914732cec6d225a814e741f3ed0729479f251dace6b68bbc375f4e1182b8603a93b1a217184ab7ebb1b8
-
Filesize
522KB
MD53c766f3934aa8493f4ded0ff78ae2eac
SHA1c92cfe3632e5828f459c479bf95302b7d7e8c0d4
SHA25622293adb26e21eafd80820bcdc35034796aacf1fa069890cf2d44c9056c338c0
SHA512747ca5fdaad4fa16861e1dd73bee51e63cd926fbc417f08354f8a89891c643f135bf26814a465771b605c921d5275481cf32fa72655489968d7a6152848d939b
-
Filesize
522KB
MD53c766f3934aa8493f4ded0ff78ae2eac
SHA1c92cfe3632e5828f459c479bf95302b7d7e8c0d4
SHA25622293adb26e21eafd80820bcdc35034796aacf1fa069890cf2d44c9056c338c0
SHA512747ca5fdaad4fa16861e1dd73bee51e63cd926fbc417f08354f8a89891c643f135bf26814a465771b605c921d5275481cf32fa72655489968d7a6152848d939b
-
Filesize
522KB
MD53c766f3934aa8493f4ded0ff78ae2eac
SHA1c92cfe3632e5828f459c479bf95302b7d7e8c0d4
SHA25622293adb26e21eafd80820bcdc35034796aacf1fa069890cf2d44c9056c338c0
SHA512747ca5fdaad4fa16861e1dd73bee51e63cd926fbc417f08354f8a89891c643f135bf26814a465771b605c921d5275481cf32fa72655489968d7a6152848d939b
-
Filesize
582KB
MD574488419d2cbc53efac89dd1de83db0c
SHA14cd8e825f0ecaf0991a4a91847cbe800743bf00a
SHA256bf1233501e5aab411a3c50748f3b0281b6d5bd198f4b965edad6a6cac95d2cd3
SHA512037d044cd5437a3e17c6dc4a563f7d4a28865b64a219d1231f5500bc28c4ffe84c5a65c7bdfcabcf8f3dd3368fd05ca4284706a9e946427dbd9cd905406b71e0
-
Filesize
582KB
MD574488419d2cbc53efac89dd1de83db0c
SHA14cd8e825f0ecaf0991a4a91847cbe800743bf00a
SHA256bf1233501e5aab411a3c50748f3b0281b6d5bd198f4b965edad6a6cac95d2cd3
SHA512037d044cd5437a3e17c6dc4a563f7d4a28865b64a219d1231f5500bc28c4ffe84c5a65c7bdfcabcf8f3dd3368fd05ca4284706a9e946427dbd9cd905406b71e0
-
Filesize
582KB
MD574488419d2cbc53efac89dd1de83db0c
SHA14cd8e825f0ecaf0991a4a91847cbe800743bf00a
SHA256bf1233501e5aab411a3c50748f3b0281b6d5bd198f4b965edad6a6cac95d2cd3
SHA512037d044cd5437a3e17c6dc4a563f7d4a28865b64a219d1231f5500bc28c4ffe84c5a65c7bdfcabcf8f3dd3368fd05ca4284706a9e946427dbd9cd905406b71e0
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
169KB
MD52b51c6b70e77afdbd275c80eae26c30d
SHA1af59cb3982cf578734d2ca82d849a35adb5b0465
SHA25629fdf4d1cd97ab492bd487e03c71c045c00cb7d70f9f2e77e29aab061f08d77f
SHA512c80c605934f005fffceec5667b0d1367dceffb8ca55f61fda9111e5e83be6c25a3aa56d57d77ab658e0fb8370417353c39d95e051455e034674ac0c87a109d47
-
Filesize
169KB
MD52b51c6b70e77afdbd275c80eae26c30d
SHA1af59cb3982cf578734d2ca82d849a35adb5b0465
SHA25629fdf4d1cd97ab492bd487e03c71c045c00cb7d70f9f2e77e29aab061f08d77f
SHA512c80c605934f005fffceec5667b0d1367dceffb8ca55f61fda9111e5e83be6c25a3aa56d57d77ab658e0fb8370417353c39d95e051455e034674ac0c87a109d47
-
Filesize
781KB
MD599c9a2bf4700a390fbbd5c3cb80187ff
SHA14ca59ed616f895f81be69cec43ec1ac8683563ed
SHA256680307999368a50af38452eea760f7748d1740046b8653d6fa036df321774fc3
SHA5125eb44e4a6363baebd4842851e1eec5a0b09913b93f93914732cec6d225a814e741f3ed0729479f251dace6b68bbc375f4e1182b8603a93b1a217184ab7ebb1b8
-
Filesize
781KB
MD599c9a2bf4700a390fbbd5c3cb80187ff
SHA14ca59ed616f895f81be69cec43ec1ac8683563ed
SHA256680307999368a50af38452eea760f7748d1740046b8653d6fa036df321774fc3
SHA5125eb44e4a6363baebd4842851e1eec5a0b09913b93f93914732cec6d225a814e741f3ed0729479f251dace6b68bbc375f4e1182b8603a93b1a217184ab7ebb1b8
-
Filesize
522KB
MD53c766f3934aa8493f4ded0ff78ae2eac
SHA1c92cfe3632e5828f459c479bf95302b7d7e8c0d4
SHA25622293adb26e21eafd80820bcdc35034796aacf1fa069890cf2d44c9056c338c0
SHA512747ca5fdaad4fa16861e1dd73bee51e63cd926fbc417f08354f8a89891c643f135bf26814a465771b605c921d5275481cf32fa72655489968d7a6152848d939b
-
Filesize
522KB
MD53c766f3934aa8493f4ded0ff78ae2eac
SHA1c92cfe3632e5828f459c479bf95302b7d7e8c0d4
SHA25622293adb26e21eafd80820bcdc35034796aacf1fa069890cf2d44c9056c338c0
SHA512747ca5fdaad4fa16861e1dd73bee51e63cd926fbc417f08354f8a89891c643f135bf26814a465771b605c921d5275481cf32fa72655489968d7a6152848d939b
-
Filesize
522KB
MD53c766f3934aa8493f4ded0ff78ae2eac
SHA1c92cfe3632e5828f459c479bf95302b7d7e8c0d4
SHA25622293adb26e21eafd80820bcdc35034796aacf1fa069890cf2d44c9056c338c0
SHA512747ca5fdaad4fa16861e1dd73bee51e63cd926fbc417f08354f8a89891c643f135bf26814a465771b605c921d5275481cf32fa72655489968d7a6152848d939b
-
Filesize
582KB
MD574488419d2cbc53efac89dd1de83db0c
SHA14cd8e825f0ecaf0991a4a91847cbe800743bf00a
SHA256bf1233501e5aab411a3c50748f3b0281b6d5bd198f4b965edad6a6cac95d2cd3
SHA512037d044cd5437a3e17c6dc4a563f7d4a28865b64a219d1231f5500bc28c4ffe84c5a65c7bdfcabcf8f3dd3368fd05ca4284706a9e946427dbd9cd905406b71e0
-
Filesize
582KB
MD574488419d2cbc53efac89dd1de83db0c
SHA14cd8e825f0ecaf0991a4a91847cbe800743bf00a
SHA256bf1233501e5aab411a3c50748f3b0281b6d5bd198f4b965edad6a6cac95d2cd3
SHA512037d044cd5437a3e17c6dc4a563f7d4a28865b64a219d1231f5500bc28c4ffe84c5a65c7bdfcabcf8f3dd3368fd05ca4284706a9e946427dbd9cd905406b71e0
-
Filesize
582KB
MD574488419d2cbc53efac89dd1de83db0c
SHA14cd8e825f0ecaf0991a4a91847cbe800743bf00a
SHA256bf1233501e5aab411a3c50748f3b0281b6d5bd198f4b965edad6a6cac95d2cd3
SHA512037d044cd5437a3e17c6dc4a563f7d4a28865b64a219d1231f5500bc28c4ffe84c5a65c7bdfcabcf8f3dd3368fd05ca4284706a9e946427dbd9cd905406b71e0
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91