Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
11/05/2023, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe
Resource
win10-20230220-en
General
-
Target
eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe
-
Size
560KB
-
MD5
be335d601e2c6e34197ce189533dabad
-
SHA1
0627bb8020d664229f3e20ed56bb996bd480ce08
-
SHA256
eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf
-
SHA512
b2dfbba5d0578fa8d92e5496a11db6c2027c58b10a1b659683511320449ef3efe59cfa1dd7bab5521aad7d7be05150862504b60f7162071611cbeedf596fcb27
-
SSDEEP
12288:QMrLy90YmNbZ+o+kg/rfPt1ut0w5eVHNbHMH0Np:LyOVd+kgPut0w5IeHKp
Malware Config
Extracted
redline
gogen
185.161.248.75:4132
-
auth_value
dfb27ce11afd52277523c8e405853d53
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2525353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2525353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2525353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2525353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2525353.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 392 a2525353.exe 2848 d9397249.exe 4744 d9397249.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2525353.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2525353.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2848 set thread context of 4744 2848 d9397249.exe 68 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 392 a2525353.exe 392 a2525353.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 392 a2525353.exe Token: SeDebugPrivilege 2848 d9397249.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3644 wrote to memory of 392 3644 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 66 PID 3644 wrote to memory of 392 3644 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 66 PID 3644 wrote to memory of 392 3644 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 66 PID 3644 wrote to memory of 2848 3644 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 67 PID 3644 wrote to memory of 2848 3644 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 67 PID 3644 wrote to memory of 2848 3644 eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe 67 PID 2848 wrote to memory of 4744 2848 d9397249.exe 68 PID 2848 wrote to memory of 4744 2848 d9397249.exe 68 PID 2848 wrote to memory of 4744 2848 d9397249.exe 68 PID 2848 wrote to memory of 4744 2848 d9397249.exe 68 PID 2848 wrote to memory of 4744 2848 d9397249.exe 68 PID 2848 wrote to memory of 4744 2848 d9397249.exe 68 PID 2848 wrote to memory of 4744 2848 d9397249.exe 68 PID 2848 wrote to memory of 4744 2848 d9397249.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe"C:\Users\Admin\AppData\Local\Temp\eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe3⤵
- Executes dropped EXE
PID:4744
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570