Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
77s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14/05/2023, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
a0c7b6c2f67ec7f2af88253d585ca89ecce7d15e67a3c8aee148a306d954b4d9.exe
Resource
win10-20230220-en
General
-
Target
a0c7b6c2f67ec7f2af88253d585ca89ecce7d15e67a3c8aee148a306d954b4d9.exe
-
Size
1.1MB
-
MD5
853ecd6b699d3bdef75ba5d943867379
-
SHA1
267dfac5f010530ae88d421e4f23966a7044f68c
-
SHA256
a0c7b6c2f67ec7f2af88253d585ca89ecce7d15e67a3c8aee148a306d954b4d9
-
SHA512
ba5f12e54312c2a381517053dd7c6a65c450a41ad1de4127ce0c294c427b43214f95d7481ec2d4e271aa4d025738f3567195bfd3bfe4dd2b7813044ac3f1e5df
-
SSDEEP
24576:JyZzafrCv2Qs8wOyukig0M1k+NcdjCxrgPKFSoK:8NwnQBwFudIrUCxrh8o
Malware Config
Extracted
redline
linda
185.161.248.75:4132
-
auth_value
21cdc21d041667b9c1679f88a1146770
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o3306843.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o3306843.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o3306843.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o3306843.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o3306843.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1684 z7388881.exe 4256 z4179574.exe 3068 o3306843.exe 952 p3796038.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o3306843.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o3306843.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4179574.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4179574.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a0c7b6c2f67ec7f2af88253d585ca89ecce7d15e67a3c8aee148a306d954b4d9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a0c7b6c2f67ec7f2af88253d585ca89ecce7d15e67a3c8aee148a306d954b4d9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7388881.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7388881.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3584 952 WerFault.exe 69 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3068 o3306843.exe 3068 o3306843.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3068 o3306843.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1684 1480 a0c7b6c2f67ec7f2af88253d585ca89ecce7d15e67a3c8aee148a306d954b4d9.exe 66 PID 1480 wrote to memory of 1684 1480 a0c7b6c2f67ec7f2af88253d585ca89ecce7d15e67a3c8aee148a306d954b4d9.exe 66 PID 1480 wrote to memory of 1684 1480 a0c7b6c2f67ec7f2af88253d585ca89ecce7d15e67a3c8aee148a306d954b4d9.exe 66 PID 1684 wrote to memory of 4256 1684 z7388881.exe 67 PID 1684 wrote to memory of 4256 1684 z7388881.exe 67 PID 1684 wrote to memory of 4256 1684 z7388881.exe 67 PID 4256 wrote to memory of 3068 4256 z4179574.exe 68 PID 4256 wrote to memory of 3068 4256 z4179574.exe 68 PID 4256 wrote to memory of 3068 4256 z4179574.exe 68 PID 4256 wrote to memory of 952 4256 z4179574.exe 69 PID 4256 wrote to memory of 952 4256 z4179574.exe 69 PID 4256 wrote to memory of 952 4256 z4179574.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0c7b6c2f67ec7f2af88253d585ca89ecce7d15e67a3c8aee148a306d954b4d9.exe"C:\Users\Admin\AppData\Local\Temp\a0c7b6c2f67ec7f2af88253d585ca89ecce7d15e67a3c8aee148a306d954b4d9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7388881.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7388881.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4179574.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4179574.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3306843.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3306843.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3796038.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3796038.exe4⤵
- Executes dropped EXE
PID:952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 9485⤵
- Program crash
PID:3584
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702KB
MD548da9a60265390ab7ae3e05edde07c9d
SHA1c9237d1a715927e89c9c79d3e58811f22d953d1f
SHA256d8ef96abd8b41defacf3621721875f6c64823aefe3f08514f7cb4211ae78b509
SHA5121e8ede23da788b72983b2d65283a45dfad624e9eb2a4340694b8b7149c8824ee0b78d22610c80c7dc7bd125e16661ac6ddf809aca663f54a5f75f1b09a439105
-
Filesize
702KB
MD548da9a60265390ab7ae3e05edde07c9d
SHA1c9237d1a715927e89c9c79d3e58811f22d953d1f
SHA256d8ef96abd8b41defacf3621721875f6c64823aefe3f08514f7cb4211ae78b509
SHA5121e8ede23da788b72983b2d65283a45dfad624e9eb2a4340694b8b7149c8824ee0b78d22610c80c7dc7bd125e16661ac6ddf809aca663f54a5f75f1b09a439105
-
Filesize
305KB
MD5b3a539a8410b0941c888e41a849011f5
SHA1a597564857411ed1fa08fe5441ae19c436ea94de
SHA2561ae166997a0e57e9a2bdb536a81d5d16676fd8c9d9115d345e27215489f02552
SHA512b91149eda6aad181058e24a33b7ae30d77ce76dd00262b2edc251111b0bff1d6241a43f85e1326a0124af30284556fcfa688b5f81e61e4aaef3d5c5882b10787
-
Filesize
305KB
MD5b3a539a8410b0941c888e41a849011f5
SHA1a597564857411ed1fa08fe5441ae19c436ea94de
SHA2561ae166997a0e57e9a2bdb536a81d5d16676fd8c9d9115d345e27215489f02552
SHA512b91149eda6aad181058e24a33b7ae30d77ce76dd00262b2edc251111b0bff1d6241a43f85e1326a0124af30284556fcfa688b5f81e61e4aaef3d5c5882b10787
-
Filesize
184KB
MD5e4e852e2ff905387102681bcd0b8ab9e
SHA172e5a8791486c936f4f7c63af9d694807e8a70ef
SHA256d480e001b66d3374b2298e4af994822542099945e5c6724b346fa94e2393b5e1
SHA512901bfcc5983d36168d71bd21d7d44bbfb6b9e613fb7e778b62bb04488368a3fc4fe618ee504d00a48ff8ad8cf62ab03984e03f76fb0a5b1efd637e89bfd63c18
-
Filesize
184KB
MD5e4e852e2ff905387102681bcd0b8ab9e
SHA172e5a8791486c936f4f7c63af9d694807e8a70ef
SHA256d480e001b66d3374b2298e4af994822542099945e5c6724b346fa94e2393b5e1
SHA512901bfcc5983d36168d71bd21d7d44bbfb6b9e613fb7e778b62bb04488368a3fc4fe618ee504d00a48ff8ad8cf62ab03984e03f76fb0a5b1efd637e89bfd63c18
-
Filesize
145KB
MD5b774b26ddaff329ea136d1f096d66e6a
SHA16651888c411db7563a1076faa9d159ee03564567
SHA256bca379abfcd5cedb487f42ab050d0193c6d4ac96e5cfe19d5fef8257ca8baa42
SHA51234a4075589faaca603504e4b94cb436f2e20cd43212526b37f6b392b67d76b1485f058877ef9fa4050e5f3011d558e7ccf3e305af24c7ba13e095c151d12e394
-
Filesize
145KB
MD5b774b26ddaff329ea136d1f096d66e6a
SHA16651888c411db7563a1076faa9d159ee03564567
SHA256bca379abfcd5cedb487f42ab050d0193c6d4ac96e5cfe19d5fef8257ca8baa42
SHA51234a4075589faaca603504e4b94cb436f2e20cd43212526b37f6b392b67d76b1485f058877ef9fa4050e5f3011d558e7ccf3e305af24c7ba13e095c151d12e394