Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe
Resource
win10v2004-20230220-en
General
-
Target
4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe
-
Size
1.2MB
-
MD5
cbbf23173cf8bd5242f60a1ccbc45908
-
SHA1
b67264dc99de0dec524f4c6add8227fdaec22488
-
SHA256
4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827
-
SHA512
849e62bd6dcfc52aff5f3aaf63b226863cb1a0a0f70d3c1c1c4122946a3c3d4264d17f34863e3bb122f2d5f521a0d0070fda7a8b09a5f98aa5cfb1285597bea3
-
SSDEEP
24576:Ey9a7z+vNhAESkepzPK0d/soL3q7XLRBQ3+RpYW186UQS69MphJoABB4eaNycQ:Tw7UhGkeCQkQyk0186ZChJ/D4Ry
Malware Config
Extracted
redline
lisa
185.161.248.73:4164
-
auth_value
c2dc311db9820012377b054447d37949
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection s38675019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s38675019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s38675019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s38675019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s38675019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s38675019.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1772 z23873104.exe 1704 z42658170.exe 648 z45010082.exe 816 s38675019.exe 1068 t97918376.exe -
Loads dropped DLL 10 IoCs
pid Process 1520 4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe 1772 z23873104.exe 1772 z23873104.exe 1704 z42658170.exe 1704 z42658170.exe 648 z45010082.exe 648 z45010082.exe 816 s38675019.exe 648 z45010082.exe 1068 t97918376.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features s38675019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s38675019.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z23873104.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z23873104.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z42658170.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z42658170.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z45010082.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z45010082.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 816 s38675019.exe 816 s38675019.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 816 s38675019.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1772 1520 4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe 27 PID 1520 wrote to memory of 1772 1520 4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe 27 PID 1520 wrote to memory of 1772 1520 4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe 27 PID 1520 wrote to memory of 1772 1520 4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe 27 PID 1520 wrote to memory of 1772 1520 4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe 27 PID 1520 wrote to memory of 1772 1520 4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe 27 PID 1520 wrote to memory of 1772 1520 4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe 27 PID 1772 wrote to memory of 1704 1772 z23873104.exe 28 PID 1772 wrote to memory of 1704 1772 z23873104.exe 28 PID 1772 wrote to memory of 1704 1772 z23873104.exe 28 PID 1772 wrote to memory of 1704 1772 z23873104.exe 28 PID 1772 wrote to memory of 1704 1772 z23873104.exe 28 PID 1772 wrote to memory of 1704 1772 z23873104.exe 28 PID 1772 wrote to memory of 1704 1772 z23873104.exe 28 PID 1704 wrote to memory of 648 1704 z42658170.exe 29 PID 1704 wrote to memory of 648 1704 z42658170.exe 29 PID 1704 wrote to memory of 648 1704 z42658170.exe 29 PID 1704 wrote to memory of 648 1704 z42658170.exe 29 PID 1704 wrote to memory of 648 1704 z42658170.exe 29 PID 1704 wrote to memory of 648 1704 z42658170.exe 29 PID 1704 wrote to memory of 648 1704 z42658170.exe 29 PID 648 wrote to memory of 816 648 z45010082.exe 30 PID 648 wrote to memory of 816 648 z45010082.exe 30 PID 648 wrote to memory of 816 648 z45010082.exe 30 PID 648 wrote to memory of 816 648 z45010082.exe 30 PID 648 wrote to memory of 816 648 z45010082.exe 30 PID 648 wrote to memory of 816 648 z45010082.exe 30 PID 648 wrote to memory of 816 648 z45010082.exe 30 PID 648 wrote to memory of 1068 648 z45010082.exe 31 PID 648 wrote to memory of 1068 648 z45010082.exe 31 PID 648 wrote to memory of 1068 648 z45010082.exe 31 PID 648 wrote to memory of 1068 648 z45010082.exe 31 PID 648 wrote to memory of 1068 648 z45010082.exe 31 PID 648 wrote to memory of 1068 648 z45010082.exe 31 PID 648 wrote to memory of 1068 648 z45010082.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe"C:\Users\Admin\AppData\Local\Temp\4afecafd9263399c310ffb56d798ba6e051b80d42528dec575a44cddfd921827.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z23873104.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z23873104.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z42658170.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z42658170.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z45010082.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z45010082.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s38675019.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s38675019.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t97918376.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t97918376.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1068
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
979KB
MD531953c9f076d1c69d513c2a618069d2c
SHA1fe2859ad7d7c6732365c36697a2f7928a65f4467
SHA256ef738c944a139974a74a721e84c3d362d2d98f7c7c7dffca3316678670b0ea17
SHA512b3ec6f7671808628167b4cd462be5efccdf2f2dc04765d71a627656a2b9c018447cd2ed57650696b3467d3bf2b96d1679b0c2040b2d68b6580458130d102eb57
-
Filesize
979KB
MD531953c9f076d1c69d513c2a618069d2c
SHA1fe2859ad7d7c6732365c36697a2f7928a65f4467
SHA256ef738c944a139974a74a721e84c3d362d2d98f7c7c7dffca3316678670b0ea17
SHA512b3ec6f7671808628167b4cd462be5efccdf2f2dc04765d71a627656a2b9c018447cd2ed57650696b3467d3bf2b96d1679b0c2040b2d68b6580458130d102eb57
-
Filesize
796KB
MD5330ac57c86fec59668bdd9dae812c878
SHA112ab083683a90447c06e429826322356530ae652
SHA256ecd6b351fde5b64310d30ffe755c6966e024ccdcec4e5a6ead2d2575e875c5b1
SHA5123cb8ee193d6f426ba8b7c07fabc480d1eaf7f18bad1cbb9361c58d9e7e14352aa2317915061028a37c1ced294d49007cc261660efb660aa3337fac0113b1581b
-
Filesize
796KB
MD5330ac57c86fec59668bdd9dae812c878
SHA112ab083683a90447c06e429826322356530ae652
SHA256ecd6b351fde5b64310d30ffe755c6966e024ccdcec4e5a6ead2d2575e875c5b1
SHA5123cb8ee193d6f426ba8b7c07fabc480d1eaf7f18bad1cbb9361c58d9e7e14352aa2317915061028a37c1ced294d49007cc261660efb660aa3337fac0113b1581b
-
Filesize
310KB
MD5abca68df3f4f6466b63718b736d8d153
SHA12f56d7bf51a6873865584257e4332b4e06f9d866
SHA2564e448d09ddc1d1180dcad1e48ef4de9203794a7a65b990431c8962eefa46d997
SHA5122e66b9e2a03549674dd237418e753255caba4191511da55ff3b66353b5b402ad64739d1dd1e233b28841ef7bc5d5c4f19c079a6a675ab6d733e2ce850f44029e
-
Filesize
310KB
MD5abca68df3f4f6466b63718b736d8d153
SHA12f56d7bf51a6873865584257e4332b4e06f9d866
SHA2564e448d09ddc1d1180dcad1e48ef4de9203794a7a65b990431c8962eefa46d997
SHA5122e66b9e2a03549674dd237418e753255caba4191511da55ff3b66353b5b402ad64739d1dd1e233b28841ef7bc5d5c4f19c079a6a675ab6d733e2ce850f44029e
-
Filesize
177KB
MD591d0c3b6e77179c684f13d8bbbc8cae8
SHA15c2ad6889d11f1c29ba0fa841c3183b55709d3d6
SHA256381126de7389a9b5dc3573bd0e645a6496624bb59984c6d9c3a2c5fe88de0470
SHA512b55fb7617d1b2dbd2842c49dbe71bc21fe3d96be7fe3cbedc341ec612d6dbc10706acad61ea35f4aa43487389fc0e32856185fbaa516e7ddd70b6318254b35ab
-
Filesize
177KB
MD591d0c3b6e77179c684f13d8bbbc8cae8
SHA15c2ad6889d11f1c29ba0fa841c3183b55709d3d6
SHA256381126de7389a9b5dc3573bd0e645a6496624bb59984c6d9c3a2c5fe88de0470
SHA512b55fb7617d1b2dbd2842c49dbe71bc21fe3d96be7fe3cbedc341ec612d6dbc10706acad61ea35f4aa43487389fc0e32856185fbaa516e7ddd70b6318254b35ab
-
Filesize
168KB
MD50d942096841d1785127b0230909eb11d
SHA140de3ec80f4f0decd8f047485b81004e937682a1
SHA256d42d4b26a03b7e3f5c3561625b992e8673a28fb8a89f326a31c83b2d8568ce56
SHA512962b2a2f22dd648326cd87acd554def66dc756d2b9dd4a0caa4496df96ceac10be1e6b8df28ed84799ac451362e59b64519ccda69adffee4d628f81c24cea3d7
-
Filesize
168KB
MD50d942096841d1785127b0230909eb11d
SHA140de3ec80f4f0decd8f047485b81004e937682a1
SHA256d42d4b26a03b7e3f5c3561625b992e8673a28fb8a89f326a31c83b2d8568ce56
SHA512962b2a2f22dd648326cd87acd554def66dc756d2b9dd4a0caa4496df96ceac10be1e6b8df28ed84799ac451362e59b64519ccda69adffee4d628f81c24cea3d7
-
Filesize
979KB
MD531953c9f076d1c69d513c2a618069d2c
SHA1fe2859ad7d7c6732365c36697a2f7928a65f4467
SHA256ef738c944a139974a74a721e84c3d362d2d98f7c7c7dffca3316678670b0ea17
SHA512b3ec6f7671808628167b4cd462be5efccdf2f2dc04765d71a627656a2b9c018447cd2ed57650696b3467d3bf2b96d1679b0c2040b2d68b6580458130d102eb57
-
Filesize
979KB
MD531953c9f076d1c69d513c2a618069d2c
SHA1fe2859ad7d7c6732365c36697a2f7928a65f4467
SHA256ef738c944a139974a74a721e84c3d362d2d98f7c7c7dffca3316678670b0ea17
SHA512b3ec6f7671808628167b4cd462be5efccdf2f2dc04765d71a627656a2b9c018447cd2ed57650696b3467d3bf2b96d1679b0c2040b2d68b6580458130d102eb57
-
Filesize
796KB
MD5330ac57c86fec59668bdd9dae812c878
SHA112ab083683a90447c06e429826322356530ae652
SHA256ecd6b351fde5b64310d30ffe755c6966e024ccdcec4e5a6ead2d2575e875c5b1
SHA5123cb8ee193d6f426ba8b7c07fabc480d1eaf7f18bad1cbb9361c58d9e7e14352aa2317915061028a37c1ced294d49007cc261660efb660aa3337fac0113b1581b
-
Filesize
796KB
MD5330ac57c86fec59668bdd9dae812c878
SHA112ab083683a90447c06e429826322356530ae652
SHA256ecd6b351fde5b64310d30ffe755c6966e024ccdcec4e5a6ead2d2575e875c5b1
SHA5123cb8ee193d6f426ba8b7c07fabc480d1eaf7f18bad1cbb9361c58d9e7e14352aa2317915061028a37c1ced294d49007cc261660efb660aa3337fac0113b1581b
-
Filesize
310KB
MD5abca68df3f4f6466b63718b736d8d153
SHA12f56d7bf51a6873865584257e4332b4e06f9d866
SHA2564e448d09ddc1d1180dcad1e48ef4de9203794a7a65b990431c8962eefa46d997
SHA5122e66b9e2a03549674dd237418e753255caba4191511da55ff3b66353b5b402ad64739d1dd1e233b28841ef7bc5d5c4f19c079a6a675ab6d733e2ce850f44029e
-
Filesize
310KB
MD5abca68df3f4f6466b63718b736d8d153
SHA12f56d7bf51a6873865584257e4332b4e06f9d866
SHA2564e448d09ddc1d1180dcad1e48ef4de9203794a7a65b990431c8962eefa46d997
SHA5122e66b9e2a03549674dd237418e753255caba4191511da55ff3b66353b5b402ad64739d1dd1e233b28841ef7bc5d5c4f19c079a6a675ab6d733e2ce850f44029e
-
Filesize
177KB
MD591d0c3b6e77179c684f13d8bbbc8cae8
SHA15c2ad6889d11f1c29ba0fa841c3183b55709d3d6
SHA256381126de7389a9b5dc3573bd0e645a6496624bb59984c6d9c3a2c5fe88de0470
SHA512b55fb7617d1b2dbd2842c49dbe71bc21fe3d96be7fe3cbedc341ec612d6dbc10706acad61ea35f4aa43487389fc0e32856185fbaa516e7ddd70b6318254b35ab
-
Filesize
177KB
MD591d0c3b6e77179c684f13d8bbbc8cae8
SHA15c2ad6889d11f1c29ba0fa841c3183b55709d3d6
SHA256381126de7389a9b5dc3573bd0e645a6496624bb59984c6d9c3a2c5fe88de0470
SHA512b55fb7617d1b2dbd2842c49dbe71bc21fe3d96be7fe3cbedc341ec612d6dbc10706acad61ea35f4aa43487389fc0e32856185fbaa516e7ddd70b6318254b35ab
-
Filesize
168KB
MD50d942096841d1785127b0230909eb11d
SHA140de3ec80f4f0decd8f047485b81004e937682a1
SHA256d42d4b26a03b7e3f5c3561625b992e8673a28fb8a89f326a31c83b2d8568ce56
SHA512962b2a2f22dd648326cd87acd554def66dc756d2b9dd4a0caa4496df96ceac10be1e6b8df28ed84799ac451362e59b64519ccda69adffee4d628f81c24cea3d7
-
Filesize
168KB
MD50d942096841d1785127b0230909eb11d
SHA140de3ec80f4f0decd8f047485b81004e937682a1
SHA256d42d4b26a03b7e3f5c3561625b992e8673a28fb8a89f326a31c83b2d8568ce56
SHA512962b2a2f22dd648326cd87acd554def66dc756d2b9dd4a0caa4496df96ceac10be1e6b8df28ed84799ac451362e59b64519ccda69adffee4d628f81c24cea3d7