Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2023, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe
Resource
win10v2004-20230220-en
General
-
Target
9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe
-
Size
1.1MB
-
MD5
72361b9ac961ae2ec3e94022f1ccb0a6
-
SHA1
e93797dc19520ba933ffb860449c12b5c6beccdd
-
SHA256
9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89
-
SHA512
20807737781e7f55d716185ccf585658bc3d0bc4b78c52e9185742297cb5a64558e51eadecd145a232078c0e70e7cde79b088727adf00883b2d121b23e0f4b8f
-
SSDEEP
24576:5ygV7gU38KOObckOMCYOMSNdA3kLfycOBVh1YWNmo:sgiUlOUckOMCBiUTyvY
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o4121760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o4121760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o4121760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o4121760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o4121760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o4121760.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 1656 z2427314.exe 652 z4621129.exe 2184 o4121760.exe 824 p7935157.exe 3296 r4381038.exe 2820 r4381038.exe 4464 r4381038.exe 4944 s9868492.exe 2132 s9868492.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o4121760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o4121760.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2427314.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4621129.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4621129.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z2427314.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3296 set thread context of 4464 3296 r4381038.exe 93 PID 4944 set thread context of 2132 4944 s9868492.exe 95 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1608 sc.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1824 824 WerFault.exe 88 4744 2132 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2184 o4121760.exe 2184 o4121760.exe 4464 r4381038.exe 4464 r4381038.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2184 o4121760.exe Token: SeDebugPrivilege 3296 r4381038.exe Token: SeDebugPrivilege 4944 s9868492.exe Token: SeDebugPrivilege 4464 r4381038.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2132 s9868492.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 228 wrote to memory of 1656 228 9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe 82 PID 228 wrote to memory of 1656 228 9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe 82 PID 228 wrote to memory of 1656 228 9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe 82 PID 1656 wrote to memory of 652 1656 z2427314.exe 83 PID 1656 wrote to memory of 652 1656 z2427314.exe 83 PID 1656 wrote to memory of 652 1656 z2427314.exe 83 PID 652 wrote to memory of 2184 652 z4621129.exe 84 PID 652 wrote to memory of 2184 652 z4621129.exe 84 PID 652 wrote to memory of 2184 652 z4621129.exe 84 PID 652 wrote to memory of 824 652 z4621129.exe 88 PID 652 wrote to memory of 824 652 z4621129.exe 88 PID 652 wrote to memory of 824 652 z4621129.exe 88 PID 1656 wrote to memory of 3296 1656 z2427314.exe 91 PID 1656 wrote to memory of 3296 1656 z2427314.exe 91 PID 1656 wrote to memory of 3296 1656 z2427314.exe 91 PID 3296 wrote to memory of 2820 3296 r4381038.exe 92 PID 3296 wrote to memory of 2820 3296 r4381038.exe 92 PID 3296 wrote to memory of 2820 3296 r4381038.exe 92 PID 3296 wrote to memory of 2820 3296 r4381038.exe 92 PID 3296 wrote to memory of 4464 3296 r4381038.exe 93 PID 3296 wrote to memory of 4464 3296 r4381038.exe 93 PID 3296 wrote to memory of 4464 3296 r4381038.exe 93 PID 3296 wrote to memory of 4464 3296 r4381038.exe 93 PID 3296 wrote to memory of 4464 3296 r4381038.exe 93 PID 3296 wrote to memory of 4464 3296 r4381038.exe 93 PID 3296 wrote to memory of 4464 3296 r4381038.exe 93 PID 3296 wrote to memory of 4464 3296 r4381038.exe 93 PID 228 wrote to memory of 4944 228 9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe 94 PID 228 wrote to memory of 4944 228 9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe 94 PID 228 wrote to memory of 4944 228 9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe 94 PID 4944 wrote to memory of 2132 4944 s9868492.exe 95 PID 4944 wrote to memory of 2132 4944 s9868492.exe 95 PID 4944 wrote to memory of 2132 4944 s9868492.exe 95 PID 4944 wrote to memory of 2132 4944 s9868492.exe 95 PID 4944 wrote to memory of 2132 4944 s9868492.exe 95 PID 4944 wrote to memory of 2132 4944 s9868492.exe 95 PID 4944 wrote to memory of 2132 4944 s9868492.exe 95 PID 4944 wrote to memory of 2132 4944 s9868492.exe 95 PID 4944 wrote to memory of 2132 4944 s9868492.exe 95 PID 4944 wrote to memory of 2132 4944 s9868492.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe"C:\Users\Admin\AppData\Local\Temp\9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2427314.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2427314.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4621129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4621129.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4121760.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4121760.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7935157.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7935157.exe4⤵
- Executes dropped EXE
PID:824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 9285⤵
- Program crash
PID:1824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe4⤵
- Executes dropped EXE
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9868492.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9868492.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9868492.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9868492.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 124⤵
- Program crash
PID:4744
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 824 -ip 8241⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2132 -ip 21321⤵PID:1472
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
961KB
MD5776adfc7ed3705fd0930ba7f773cb8fe
SHA179731d62afb9e8dba31e070a6e191fb54dc217ba
SHA2565d7a35afdae4aa87d17028f2ab121b368fc056e9c6e225372c44fe0ed8c51960
SHA512702640924022a74033e8704778572b3b486bd00defff3fe781e16572ba1c3a6ae51d2ebc8a40d858278592c04a6d36bd9c7bf05c7c7e991dc551223e64dffb78
-
Filesize
961KB
MD5776adfc7ed3705fd0930ba7f773cb8fe
SHA179731d62afb9e8dba31e070a6e191fb54dc217ba
SHA2565d7a35afdae4aa87d17028f2ab121b368fc056e9c6e225372c44fe0ed8c51960
SHA512702640924022a74033e8704778572b3b486bd00defff3fe781e16572ba1c3a6ae51d2ebc8a40d858278592c04a6d36bd9c7bf05c7c7e991dc551223e64dffb78
-
Filesize
961KB
MD5776adfc7ed3705fd0930ba7f773cb8fe
SHA179731d62afb9e8dba31e070a6e191fb54dc217ba
SHA2565d7a35afdae4aa87d17028f2ab121b368fc056e9c6e225372c44fe0ed8c51960
SHA512702640924022a74033e8704778572b3b486bd00defff3fe781e16572ba1c3a6ae51d2ebc8a40d858278592c04a6d36bd9c7bf05c7c7e991dc551223e64dffb78
-
Filesize
702KB
MD5ea7e03b063b764d4a33aa050255eb572
SHA16e72363f75dc7313e239fe0d9ab4dafca909bae2
SHA256da7b0beef0c648f81f511ac269b4281c981346eca1f213fb143f52c1145530bb
SHA512cb14e53d0961827f3607ab7ae43076f98c0d896d6079564b7b14f416fdd1e1e4e273b743ab9dd00c623e2ff5c2a3ae31f84062cf976b24390af82ccb1cb09761
-
Filesize
702KB
MD5ea7e03b063b764d4a33aa050255eb572
SHA16e72363f75dc7313e239fe0d9ab4dafca909bae2
SHA256da7b0beef0c648f81f511ac269b4281c981346eca1f213fb143f52c1145530bb
SHA512cb14e53d0961827f3607ab7ae43076f98c0d896d6079564b7b14f416fdd1e1e4e273b743ab9dd00c623e2ff5c2a3ae31f84062cf976b24390af82ccb1cb09761
-
Filesize
905KB
MD5474d34638b034d85552ab4f3fa83dc76
SHA1dc7c2218b856dc8d784c96d6d6ab858b4a69dca4
SHA256bb87ec91755b9bf43da17dfad82034ac8f93a6bcf99447fde9406e8a1414cdba
SHA51238caf1e224706894c53341a7e9a5ee818d1988180f93416690139051857c7d1d926926981a8a5caa2cb605f09313f773c2de41217a5d3bd6347edc6d31a153ae
-
Filesize
905KB
MD5474d34638b034d85552ab4f3fa83dc76
SHA1dc7c2218b856dc8d784c96d6d6ab858b4a69dca4
SHA256bb87ec91755b9bf43da17dfad82034ac8f93a6bcf99447fde9406e8a1414cdba
SHA51238caf1e224706894c53341a7e9a5ee818d1988180f93416690139051857c7d1d926926981a8a5caa2cb605f09313f773c2de41217a5d3bd6347edc6d31a153ae
-
Filesize
905KB
MD5474d34638b034d85552ab4f3fa83dc76
SHA1dc7c2218b856dc8d784c96d6d6ab858b4a69dca4
SHA256bb87ec91755b9bf43da17dfad82034ac8f93a6bcf99447fde9406e8a1414cdba
SHA51238caf1e224706894c53341a7e9a5ee818d1988180f93416690139051857c7d1d926926981a8a5caa2cb605f09313f773c2de41217a5d3bd6347edc6d31a153ae
-
Filesize
905KB
MD5474d34638b034d85552ab4f3fa83dc76
SHA1dc7c2218b856dc8d784c96d6d6ab858b4a69dca4
SHA256bb87ec91755b9bf43da17dfad82034ac8f93a6bcf99447fde9406e8a1414cdba
SHA51238caf1e224706894c53341a7e9a5ee818d1988180f93416690139051857c7d1d926926981a8a5caa2cb605f09313f773c2de41217a5d3bd6347edc6d31a153ae
-
Filesize
306KB
MD511dcc7eaca5aac80005ee12173d4e8f6
SHA1649c031de38c908109ffa5ace5e691fbe495ba10
SHA25643af8c4054d0a07b350b4c294896f16777302f710583a319eab0d944a698ce2c
SHA512145523af2c306674a9d74bb8ff44792eac7715fbb41c56e8e7fb50390c09aab63bd432df7dfe4178a7ffecb7ec6240f99c7c9a1acfc5ba181713c82b1b94f7b7
-
Filesize
306KB
MD511dcc7eaca5aac80005ee12173d4e8f6
SHA1649c031de38c908109ffa5ace5e691fbe495ba10
SHA25643af8c4054d0a07b350b4c294896f16777302f710583a319eab0d944a698ce2c
SHA512145523af2c306674a9d74bb8ff44792eac7715fbb41c56e8e7fb50390c09aab63bd432df7dfe4178a7ffecb7ec6240f99c7c9a1acfc5ba181713c82b1b94f7b7
-
Filesize
185KB
MD556205c6f5577698cff55e2d9f4a12b6d
SHA1661ca413a809e4944b8062d3af90b3465c6904fa
SHA256e3d17d5fcaba58bd0ed2fdc24107554d55b17f0fecc441c2ca8105f31c3ac07d
SHA51278ac675c4bfb2a560c5b30b3b244e6a0eb03b88174aae85b643da81d5e84bf716b63dd11b2f8a2920e9e85e66850311a71a2a5b8203fcaa5338cca89e0612b98
-
Filesize
185KB
MD556205c6f5577698cff55e2d9f4a12b6d
SHA1661ca413a809e4944b8062d3af90b3465c6904fa
SHA256e3d17d5fcaba58bd0ed2fdc24107554d55b17f0fecc441c2ca8105f31c3ac07d
SHA51278ac675c4bfb2a560c5b30b3b244e6a0eb03b88174aae85b643da81d5e84bf716b63dd11b2f8a2920e9e85e66850311a71a2a5b8203fcaa5338cca89e0612b98
-
Filesize
145KB
MD50c487bf083aceca95866ac96176bbc4d
SHA198edd695b88dfe5c9a6277e0b36264cd9371517a
SHA256bfc4a3a03a2ba1d1c0c2702319aac204ba4d09406002ed267eb8ed114cb9206c
SHA512c288e1dabf9fe60048511dd55de32827b9be806cba02ad58eb5fb5380d959f42df4acbd88f0aea88dbf99374f2a22c9625812b20d6754f6ddf0f7d0a15b8140e
-
Filesize
145KB
MD50c487bf083aceca95866ac96176bbc4d
SHA198edd695b88dfe5c9a6277e0b36264cd9371517a
SHA256bfc4a3a03a2ba1d1c0c2702319aac204ba4d09406002ed267eb8ed114cb9206c
SHA512c288e1dabf9fe60048511dd55de32827b9be806cba02ad58eb5fb5380d959f42df4acbd88f0aea88dbf99374f2a22c9625812b20d6754f6ddf0f7d0a15b8140e