Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
56s -
max time network
77s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
08/05/2023, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
df99ffded671130a004acb37d537829c12c179679ec1f0c3d16d1332c5e08c95.exe
Resource
win10-20230220-en
General
-
Target
df99ffded671130a004acb37d537829c12c179679ec1f0c3d16d1332c5e08c95.exe
-
Size
491KB
-
MD5
b69b22db3b1bd42061c0b43a8b4c56fd
-
SHA1
04cb58877d703add816759bd83a5233590521115
-
SHA256
df99ffded671130a004acb37d537829c12c179679ec1f0c3d16d1332c5e08c95
-
SHA512
eb142a3f450edc1d8eccb94a3f7a76511b433eca05af691dc480fd2ea24ede9c9deedc406c7efda62408d6960ca9c874772187825cdca68264584ae1c31f95e8
-
SSDEEP
6144:Kyy+bnr+op0yN90QE0zFFreWEQZC6Awc8ZZLtKl1JiIfRiV5Bykl2DK6ADkkpuzM:2MrUy90+Pkxwc8Zcr5iVqQ2fPjVh4
Malware Config
Extracted
redline
lipo
217.196.96.101:4132
-
auth_value
3183df2d03b17daa3c5ecc95e60086a5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o3113083.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o3113083.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o3113083.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o3113083.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o3113083.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2332 z1492966.exe 2576 o3113083.exe 3540 r3120475.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o3113083.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o3113083.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce df99ffded671130a004acb37d537829c12c179679ec1f0c3d16d1332c5e08c95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" df99ffded671130a004acb37d537829c12c179679ec1f0c3d16d1332c5e08c95.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1492966.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1492966.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4744 3540 WerFault.exe 68 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2576 o3113083.exe 2576 o3113083.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2576 o3113083.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2332 2132 df99ffded671130a004acb37d537829c12c179679ec1f0c3d16d1332c5e08c95.exe 66 PID 2132 wrote to memory of 2332 2132 df99ffded671130a004acb37d537829c12c179679ec1f0c3d16d1332c5e08c95.exe 66 PID 2132 wrote to memory of 2332 2132 df99ffded671130a004acb37d537829c12c179679ec1f0c3d16d1332c5e08c95.exe 66 PID 2332 wrote to memory of 2576 2332 z1492966.exe 67 PID 2332 wrote to memory of 2576 2332 z1492966.exe 67 PID 2332 wrote to memory of 2576 2332 z1492966.exe 67 PID 2332 wrote to memory of 3540 2332 z1492966.exe 68 PID 2332 wrote to memory of 3540 2332 z1492966.exe 68 PID 2332 wrote to memory of 3540 2332 z1492966.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\df99ffded671130a004acb37d537829c12c179679ec1f0c3d16d1332c5e08c95.exe"C:\Users\Admin\AppData\Local\Temp\df99ffded671130a004acb37d537829c12c179679ec1f0c3d16d1332c5e08c95.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1492966.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1492966.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o3113083.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o3113083.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3120475.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3120475.exe3⤵
- Executes dropped EXE
PID:3540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 9564⤵
- Program crash
PID:4744
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD5b9a990cb237dd9c8d010e1cb5c996da8
SHA196e950ed7b348bfb3c6c1b4c96aa3eed6bb593ab
SHA256cae8d0f0d8c43bbbe3b1c9e3d03821b595c8baeffc476314ac449505b6eeb729
SHA51237aa5923aed060bf26766005c2fdb5cde35be63859981f4d2f60b5a81d17dfa0d5b6a6ac89917bbe1d7490a6a309b910435eb2d6d407d9d789f337873f11713c
-
Filesize
309KB
MD5b9a990cb237dd9c8d010e1cb5c996da8
SHA196e950ed7b348bfb3c6c1b4c96aa3eed6bb593ab
SHA256cae8d0f0d8c43bbbe3b1c9e3d03821b595c8baeffc476314ac449505b6eeb729
SHA51237aa5923aed060bf26766005c2fdb5cde35be63859981f4d2f60b5a81d17dfa0d5b6a6ac89917bbe1d7490a6a309b910435eb2d6d407d9d789f337873f11713c
-
Filesize
178KB
MD595c7e498c2d25edb397bdea1fd8ce313
SHA14aabd49de41bcb3156f384a451bdce27d3062323
SHA25631b647b4208d8800d029056aa9b5c57189139f12ef33c19a368f362b55be376d
SHA5127331a4c1c43a3d6d6a226836cdd3c2673b5afded82cd711d430cfbb55db36ecb7a2b3f7b3fdee84cde69f145cef7b4365a6f211c88f8e586cbe940c73822fd10
-
Filesize
178KB
MD595c7e498c2d25edb397bdea1fd8ce313
SHA14aabd49de41bcb3156f384a451bdce27d3062323
SHA25631b647b4208d8800d029056aa9b5c57189139f12ef33c19a368f362b55be376d
SHA5127331a4c1c43a3d6d6a226836cdd3c2673b5afded82cd711d430cfbb55db36ecb7a2b3f7b3fdee84cde69f145cef7b4365a6f211c88f8e586cbe940c73822fd10
-
Filesize
168KB
MD5189f6a3fbdd517366d584e514842573a
SHA125e37e17cddfeb12b08c4c5ed4219c922066c7ab
SHA2565376259dc59686c341284eb3132924c087dce4896da609599d8577f74917c4b9
SHA51275120d2413d923d5eeb285a83511e0ff0a84c9c9f7852ccc7c8450e02284e93e4a45de0f1370834e7e191db52638cf51feb9443b115753889e04ea1722da33c1
-
Filesize
168KB
MD5189f6a3fbdd517366d584e514842573a
SHA125e37e17cddfeb12b08c4c5ed4219c922066c7ab
SHA2565376259dc59686c341284eb3132924c087dce4896da609599d8577f74917c4b9
SHA51275120d2413d923d5eeb285a83511e0ff0a84c9c9f7852ccc7c8450e02284e93e4a45de0f1370834e7e191db52638cf51feb9443b115753889e04ea1722da33c1