Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
199s -
max time network
305s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe
Resource
win10v2004-20230220-en
General
-
Target
33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe
-
Size
893KB
-
MD5
8d71a0856eabe171e0d709cfb34d99c2
-
SHA1
76ab242fb9762c36c97d92ac57ce759a504c8325
-
SHA256
33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68
-
SHA512
c67d91c2fb8a219c7be8cce5220f3592f59563b364f71fe1fe815b780b72ceb2de19bd160a3ef7307f316d1651ae36dacb778320edbb3152e546e0a3069eb176
-
SSDEEP
12288:vy906JSsvYY051u8Z/42PKitNKkAFi/BUUL4rDOAHUl/P9YVapFAW/rKIEGH7Hqz:vyVrYYa1u8NFtoYLeiJH9KafAhI1bUj
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 524 st225415.exe 1644 74090918.exe 1388 1.exe 936 kp615047.exe 568 lr555981.exe -
Loads dropped DLL 10 IoCs
pid Process 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 524 st225415.exe 524 st225415.exe 1644 74090918.exe 1644 74090918.exe 524 st225415.exe 524 st225415.exe 936 kp615047.exe 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 568 lr555981.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st225415.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce st225415.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1388 1.exe 1388 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1644 74090918.exe Token: SeDebugPrivilege 1388 1.exe Token: SeDebugPrivilege 936 kp615047.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1324 wrote to memory of 524 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 28 PID 1324 wrote to memory of 524 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 28 PID 1324 wrote to memory of 524 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 28 PID 1324 wrote to memory of 524 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 28 PID 1324 wrote to memory of 524 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 28 PID 1324 wrote to memory of 524 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 28 PID 1324 wrote to memory of 524 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 28 PID 524 wrote to memory of 1644 524 st225415.exe 29 PID 524 wrote to memory of 1644 524 st225415.exe 29 PID 524 wrote to memory of 1644 524 st225415.exe 29 PID 524 wrote to memory of 1644 524 st225415.exe 29 PID 524 wrote to memory of 1644 524 st225415.exe 29 PID 524 wrote to memory of 1644 524 st225415.exe 29 PID 524 wrote to memory of 1644 524 st225415.exe 29 PID 1644 wrote to memory of 1388 1644 74090918.exe 30 PID 1644 wrote to memory of 1388 1644 74090918.exe 30 PID 1644 wrote to memory of 1388 1644 74090918.exe 30 PID 1644 wrote to memory of 1388 1644 74090918.exe 30 PID 1644 wrote to memory of 1388 1644 74090918.exe 30 PID 1644 wrote to memory of 1388 1644 74090918.exe 30 PID 1644 wrote to memory of 1388 1644 74090918.exe 30 PID 524 wrote to memory of 936 524 st225415.exe 31 PID 524 wrote to memory of 936 524 st225415.exe 31 PID 524 wrote to memory of 936 524 st225415.exe 31 PID 524 wrote to memory of 936 524 st225415.exe 31 PID 524 wrote to memory of 936 524 st225415.exe 31 PID 524 wrote to memory of 936 524 st225415.exe 31 PID 524 wrote to memory of 936 524 st225415.exe 31 PID 1324 wrote to memory of 568 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 32 PID 1324 wrote to memory of 568 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 32 PID 1324 wrote to memory of 568 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 32 PID 1324 wrote to memory of 568 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 32 PID 1324 wrote to memory of 568 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 32 PID 1324 wrote to memory of 568 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 32 PID 1324 wrote to memory of 568 1324 33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe"C:\Users\Admin\AppData\Local\Temp\33155b84fd323e44f3800fc499ee5daaa9e862411063d0b1cde03776e0564d68.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st225415.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st225415.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74090918.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\74090918.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp615047.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp615047.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr555981.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr555981.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:568
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD576e1cf062d03a20f55cd5a19de3c6df9
SHA1f5ed2ce1c6d531afab85eb5a6f8c4f09fe9e2f66
SHA256605a83e97a81eeac7871875eba11917542082a4d227cc004381de0c5906917a4
SHA5125fcf81b43665f34941b05d39f1ba75c250c0d92bf068a2188c5e61174c10e233f29134808fd74b3de33eed6519381209a409089c800b9ef43ee4ed6f5fdf2000
-
Filesize
168KB
MD576e1cf062d03a20f55cd5a19de3c6df9
SHA1f5ed2ce1c6d531afab85eb5a6f8c4f09fe9e2f66
SHA256605a83e97a81eeac7871875eba11917542082a4d227cc004381de0c5906917a4
SHA5125fcf81b43665f34941b05d39f1ba75c250c0d92bf068a2188c5e61174c10e233f29134808fd74b3de33eed6519381209a409089c800b9ef43ee4ed6f5fdf2000
-
Filesize
739KB
MD57f01eb21c57d75a933d35d143f2f808c
SHA168289c02f61e17f9e95436d74f85da6bead04814
SHA2563c81df066b5539f8b1cc983c0236d3c3c73e048785449a735b1c5723e80e15b7
SHA5125ec23bdb3e91291fe656953b930e842bacdfb63e82cb521068e45a809e00099ede61e261cd047b9ab0bc51e78a6689d1cbd85a2fcfef5d27d43a951e7ff92a51
-
Filesize
739KB
MD57f01eb21c57d75a933d35d143f2f808c
SHA168289c02f61e17f9e95436d74f85da6bead04814
SHA2563c81df066b5539f8b1cc983c0236d3c3c73e048785449a735b1c5723e80e15b7
SHA5125ec23bdb3e91291fe656953b930e842bacdfb63e82cb521068e45a809e00099ede61e261cd047b9ab0bc51e78a6689d1cbd85a2fcfef5d27d43a951e7ff92a51
-
Filesize
300KB
MD543cfc61b49931deedf22c6c1a6d4d57c
SHA19d5d4003eba631367764c1ceb415be078027e417
SHA256bf24ce35bc501f530a7f99df3542d76788709b5dcf2427154285614cd3d6b36c
SHA512de518bcbd57b833109688951adffa8ab33c6a7ed30fcacd85b7bffc49d37555e0b0b54b76b792c4336f76149b0c8de147d37786a53b415fa98d7aa27bf937a65
-
Filesize
300KB
MD543cfc61b49931deedf22c6c1a6d4d57c
SHA19d5d4003eba631367764c1ceb415be078027e417
SHA256bf24ce35bc501f530a7f99df3542d76788709b5dcf2427154285614cd3d6b36c
SHA512de518bcbd57b833109688951adffa8ab33c6a7ed30fcacd85b7bffc49d37555e0b0b54b76b792c4336f76149b0c8de147d37786a53b415fa98d7aa27bf937a65
-
Filesize
582KB
MD5d7553cbd240566865245e3af79cdae1e
SHA1ae211434d4970733b1a06795e72f34a4a378ee9c
SHA2569535640355488796fbadd9bb9612c74e911b9485e895effacc39aa1364b83b56
SHA512bb7eec0f7ea814325a686e05883310bd4c321169fc94aa0420b5ebaea584e2ebbf340777dbaef769f8ff4bde1d42eae66c98974948c3399466190c7355e0e20f
-
Filesize
582KB
MD5d7553cbd240566865245e3af79cdae1e
SHA1ae211434d4970733b1a06795e72f34a4a378ee9c
SHA2569535640355488796fbadd9bb9612c74e911b9485e895effacc39aa1364b83b56
SHA512bb7eec0f7ea814325a686e05883310bd4c321169fc94aa0420b5ebaea584e2ebbf340777dbaef769f8ff4bde1d42eae66c98974948c3399466190c7355e0e20f
-
Filesize
582KB
MD5d7553cbd240566865245e3af79cdae1e
SHA1ae211434d4970733b1a06795e72f34a4a378ee9c
SHA2569535640355488796fbadd9bb9612c74e911b9485e895effacc39aa1364b83b56
SHA512bb7eec0f7ea814325a686e05883310bd4c321169fc94aa0420b5ebaea584e2ebbf340777dbaef769f8ff4bde1d42eae66c98974948c3399466190c7355e0e20f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD576e1cf062d03a20f55cd5a19de3c6df9
SHA1f5ed2ce1c6d531afab85eb5a6f8c4f09fe9e2f66
SHA256605a83e97a81eeac7871875eba11917542082a4d227cc004381de0c5906917a4
SHA5125fcf81b43665f34941b05d39f1ba75c250c0d92bf068a2188c5e61174c10e233f29134808fd74b3de33eed6519381209a409089c800b9ef43ee4ed6f5fdf2000
-
Filesize
168KB
MD576e1cf062d03a20f55cd5a19de3c6df9
SHA1f5ed2ce1c6d531afab85eb5a6f8c4f09fe9e2f66
SHA256605a83e97a81eeac7871875eba11917542082a4d227cc004381de0c5906917a4
SHA5125fcf81b43665f34941b05d39f1ba75c250c0d92bf068a2188c5e61174c10e233f29134808fd74b3de33eed6519381209a409089c800b9ef43ee4ed6f5fdf2000
-
Filesize
739KB
MD57f01eb21c57d75a933d35d143f2f808c
SHA168289c02f61e17f9e95436d74f85da6bead04814
SHA2563c81df066b5539f8b1cc983c0236d3c3c73e048785449a735b1c5723e80e15b7
SHA5125ec23bdb3e91291fe656953b930e842bacdfb63e82cb521068e45a809e00099ede61e261cd047b9ab0bc51e78a6689d1cbd85a2fcfef5d27d43a951e7ff92a51
-
Filesize
739KB
MD57f01eb21c57d75a933d35d143f2f808c
SHA168289c02f61e17f9e95436d74f85da6bead04814
SHA2563c81df066b5539f8b1cc983c0236d3c3c73e048785449a735b1c5723e80e15b7
SHA5125ec23bdb3e91291fe656953b930e842bacdfb63e82cb521068e45a809e00099ede61e261cd047b9ab0bc51e78a6689d1cbd85a2fcfef5d27d43a951e7ff92a51
-
Filesize
300KB
MD543cfc61b49931deedf22c6c1a6d4d57c
SHA19d5d4003eba631367764c1ceb415be078027e417
SHA256bf24ce35bc501f530a7f99df3542d76788709b5dcf2427154285614cd3d6b36c
SHA512de518bcbd57b833109688951adffa8ab33c6a7ed30fcacd85b7bffc49d37555e0b0b54b76b792c4336f76149b0c8de147d37786a53b415fa98d7aa27bf937a65
-
Filesize
300KB
MD543cfc61b49931deedf22c6c1a6d4d57c
SHA19d5d4003eba631367764c1ceb415be078027e417
SHA256bf24ce35bc501f530a7f99df3542d76788709b5dcf2427154285614cd3d6b36c
SHA512de518bcbd57b833109688951adffa8ab33c6a7ed30fcacd85b7bffc49d37555e0b0b54b76b792c4336f76149b0c8de147d37786a53b415fa98d7aa27bf937a65
-
Filesize
582KB
MD5d7553cbd240566865245e3af79cdae1e
SHA1ae211434d4970733b1a06795e72f34a4a378ee9c
SHA2569535640355488796fbadd9bb9612c74e911b9485e895effacc39aa1364b83b56
SHA512bb7eec0f7ea814325a686e05883310bd4c321169fc94aa0420b5ebaea584e2ebbf340777dbaef769f8ff4bde1d42eae66c98974948c3399466190c7355e0e20f
-
Filesize
582KB
MD5d7553cbd240566865245e3af79cdae1e
SHA1ae211434d4970733b1a06795e72f34a4a378ee9c
SHA2569535640355488796fbadd9bb9612c74e911b9485e895effacc39aa1364b83b56
SHA512bb7eec0f7ea814325a686e05883310bd4c321169fc94aa0420b5ebaea584e2ebbf340777dbaef769f8ff4bde1d42eae66c98974948c3399466190c7355e0e20f
-
Filesize
582KB
MD5d7553cbd240566865245e3af79cdae1e
SHA1ae211434d4970733b1a06795e72f34a4a378ee9c
SHA2569535640355488796fbadd9bb9612c74e911b9485e895effacc39aa1364b83b56
SHA512bb7eec0f7ea814325a686e05883310bd4c321169fc94aa0420b5ebaea584e2ebbf340777dbaef769f8ff4bde1d42eae66c98974948c3399466190c7355e0e20f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91