Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2023, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe
Resource
win10v2004-20230220-en
General
-
Target
4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe
-
Size
1.1MB
-
MD5
6ebca2a77054da695d23d99488a9c573
-
SHA1
510ccb61f13c0c68a285d5dc3e58c4f836c1dd02
-
SHA256
4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a
-
SHA512
1e103fa2b733ea995af6dfaaff6d8e795abf1668bd9fbdc1d63a10aef5f8d594254386fce9ff1ea4c913f130eb06d51856d5f54b78413b9ed821f3f13664f146
-
SSDEEP
24576:tyc2UCSTgKddXMGWS0kPG4nTXSaBr932tNCKoNFvn9mYgfwgRaB:IgvgKddXkS0kemd1IgJNl9mmgRa
Malware Config
Extracted
redline
lopuh
185.161.248.75:4132
-
auth_value
5852b05de9da526581993068a4e7e915
Extracted
redline
horor
185.161.248.75:4132
-
auth_value
b8d506fe48db15c38fb031d07f42d529
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o0349115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o0349115.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o0349115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o0349115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o0349115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o0349115.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 2696 z1233563.exe 3140 z4510314.exe 2024 o0349115.exe 1848 p3709956.exe 3308 r3938882.exe 3836 r3938882.exe 3228 s4441571.exe 3156 s4441571.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o0349115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o0349115.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1233563.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1233563.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4510314.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4510314.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3308 set thread context of 3836 3308 r3938882.exe 94 PID 3228 set thread context of 3156 3228 s4441571.exe 96 -
Program crash 1 IoCs
pid pid_target Process procid_target 856 3156 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2024 o0349115.exe 2024 o0349115.exe 1848 p3709956.exe 1848 p3709956.exe 3836 r3938882.exe 3836 r3938882.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2024 o0349115.exe Token: SeDebugPrivilege 1848 p3709956.exe Token: SeDebugPrivilege 3308 r3938882.exe Token: SeDebugPrivilege 3228 s4441571.exe Token: SeDebugPrivilege 3836 r3938882.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3156 s4441571.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2696 1924 4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe 82 PID 1924 wrote to memory of 2696 1924 4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe 82 PID 1924 wrote to memory of 2696 1924 4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe 82 PID 2696 wrote to memory of 3140 2696 z1233563.exe 83 PID 2696 wrote to memory of 3140 2696 z1233563.exe 83 PID 2696 wrote to memory of 3140 2696 z1233563.exe 83 PID 3140 wrote to memory of 2024 3140 z4510314.exe 84 PID 3140 wrote to memory of 2024 3140 z4510314.exe 84 PID 3140 wrote to memory of 2024 3140 z4510314.exe 84 PID 3140 wrote to memory of 1848 3140 z4510314.exe 91 PID 3140 wrote to memory of 1848 3140 z4510314.exe 91 PID 3140 wrote to memory of 1848 3140 z4510314.exe 91 PID 2696 wrote to memory of 3308 2696 z1233563.exe 93 PID 2696 wrote to memory of 3308 2696 z1233563.exe 93 PID 2696 wrote to memory of 3308 2696 z1233563.exe 93 PID 3308 wrote to memory of 3836 3308 r3938882.exe 94 PID 3308 wrote to memory of 3836 3308 r3938882.exe 94 PID 3308 wrote to memory of 3836 3308 r3938882.exe 94 PID 3308 wrote to memory of 3836 3308 r3938882.exe 94 PID 3308 wrote to memory of 3836 3308 r3938882.exe 94 PID 3308 wrote to memory of 3836 3308 r3938882.exe 94 PID 3308 wrote to memory of 3836 3308 r3938882.exe 94 PID 3308 wrote to memory of 3836 3308 r3938882.exe 94 PID 1924 wrote to memory of 3228 1924 4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe 95 PID 1924 wrote to memory of 3228 1924 4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe 95 PID 1924 wrote to memory of 3228 1924 4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe 95 PID 3228 wrote to memory of 3156 3228 s4441571.exe 96 PID 3228 wrote to memory of 3156 3228 s4441571.exe 96 PID 3228 wrote to memory of 3156 3228 s4441571.exe 96 PID 3228 wrote to memory of 3156 3228 s4441571.exe 96 PID 3228 wrote to memory of 3156 3228 s4441571.exe 96 PID 3228 wrote to memory of 3156 3228 s4441571.exe 96 PID 3228 wrote to memory of 3156 3228 s4441571.exe 96 PID 3228 wrote to memory of 3156 3228 s4441571.exe 96 PID 3228 wrote to memory of 3156 3228 s4441571.exe 96 PID 3228 wrote to memory of 3156 3228 s4441571.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe"C:\Users\Admin\AppData\Local\Temp\4183b876a8505780698f05d98169007a212816a194dc2daf4802dc351aa6535a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1233563.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1233563.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4510314.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4510314.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0349115.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0349115.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3709956.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3709956.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3938882.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3938882.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3938882.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3938882.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4441571.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4441571.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4441571.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4441571.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 124⤵
- Program crash
PID:856
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3156 -ip 31561⤵PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
961KB
MD55d849045d7a1307b45188599092c2e44
SHA10321164653307bd28ea6c3c08cc57fe6898ec573
SHA2567774d6cfb57d229891cfb249c47dc572b3836858c013c1b54abdc08957908626
SHA5128e4fbbf056265e040cefe0c52340708434f8d500018bb7b70837a5e24a5d017fe1d8b94dc9314000c5cbf2a813d2d0a36c8c16cfe33032bbe1df927168de68ba
-
Filesize
961KB
MD55d849045d7a1307b45188599092c2e44
SHA10321164653307bd28ea6c3c08cc57fe6898ec573
SHA2567774d6cfb57d229891cfb249c47dc572b3836858c013c1b54abdc08957908626
SHA5128e4fbbf056265e040cefe0c52340708434f8d500018bb7b70837a5e24a5d017fe1d8b94dc9314000c5cbf2a813d2d0a36c8c16cfe33032bbe1df927168de68ba
-
Filesize
961KB
MD55d849045d7a1307b45188599092c2e44
SHA10321164653307bd28ea6c3c08cc57fe6898ec573
SHA2567774d6cfb57d229891cfb249c47dc572b3836858c013c1b54abdc08957908626
SHA5128e4fbbf056265e040cefe0c52340708434f8d500018bb7b70837a5e24a5d017fe1d8b94dc9314000c5cbf2a813d2d0a36c8c16cfe33032bbe1df927168de68ba
-
Filesize
701KB
MD507f0f4d690dc418bcafb50dcff91c892
SHA1314887625cd9f6fe15a5394ebbb5cd8c72746d03
SHA2569ef2e74971005c1bd07cf8c0cff267f425c0d3aa96608c655a68c8b63759e661
SHA512887a5dc59954d97cee3e74d7fea74bb313287ddab9bd2f24dca5766a892de974c9d37a1a1c90898fc885b9a437ae221eea624a68ffb266514fbf2f194f91af94
-
Filesize
701KB
MD507f0f4d690dc418bcafb50dcff91c892
SHA1314887625cd9f6fe15a5394ebbb5cd8c72746d03
SHA2569ef2e74971005c1bd07cf8c0cff267f425c0d3aa96608c655a68c8b63759e661
SHA512887a5dc59954d97cee3e74d7fea74bb313287ddab9bd2f24dca5766a892de974c9d37a1a1c90898fc885b9a437ae221eea624a68ffb266514fbf2f194f91af94
-
Filesize
904KB
MD56a27ca557cf8ac7b454a5c231160975a
SHA1b058c3af993da43f4b3908c6abba86a3d5112dbd
SHA256cdb0be38750aa1ed8d81ebf78bf70c8fa53faae037c7fd6ee5349351edf7e7ff
SHA512dcc078490c6491446ad3a3a35728db05b8aea131ab2d49d83f1d475e569b52b4d60663188592655c644f7b961f1905a0574dcb7920379d324e76be52ffc4911a
-
Filesize
904KB
MD56a27ca557cf8ac7b454a5c231160975a
SHA1b058c3af993da43f4b3908c6abba86a3d5112dbd
SHA256cdb0be38750aa1ed8d81ebf78bf70c8fa53faae037c7fd6ee5349351edf7e7ff
SHA512dcc078490c6491446ad3a3a35728db05b8aea131ab2d49d83f1d475e569b52b4d60663188592655c644f7b961f1905a0574dcb7920379d324e76be52ffc4911a
-
Filesize
904KB
MD56a27ca557cf8ac7b454a5c231160975a
SHA1b058c3af993da43f4b3908c6abba86a3d5112dbd
SHA256cdb0be38750aa1ed8d81ebf78bf70c8fa53faae037c7fd6ee5349351edf7e7ff
SHA512dcc078490c6491446ad3a3a35728db05b8aea131ab2d49d83f1d475e569b52b4d60663188592655c644f7b961f1905a0574dcb7920379d324e76be52ffc4911a
-
Filesize
305KB
MD56028b9e20ab87fbea63f592e0088fc58
SHA1f247f91951c7dee5353f4f42095b041d3c1b9321
SHA256c5aaf2d4f527d190faf4e4de015c867b218f59b32feafa2b5ae99cd391c46544
SHA5121f0c438a028aae4735b2383c53bec67438aade2016255f3cd3520efaf9296282f1a436df5b4f997c52145895f933107b65c3b785b31543bc984e9a5d96c7e6ae
-
Filesize
305KB
MD56028b9e20ab87fbea63f592e0088fc58
SHA1f247f91951c7dee5353f4f42095b041d3c1b9321
SHA256c5aaf2d4f527d190faf4e4de015c867b218f59b32feafa2b5ae99cd391c46544
SHA5121f0c438a028aae4735b2383c53bec67438aade2016255f3cd3520efaf9296282f1a436df5b4f997c52145895f933107b65c3b785b31543bc984e9a5d96c7e6ae
-
Filesize
185KB
MD59849d9adf777a426b91b6281ef8d4f99
SHA1f3d9f01fc1d0466ffb5c3633a2a8856962a35d67
SHA256f25ea1f85490ac6ec63828fb2ad0b798a7c4569501c8766370fbccf46d57ff77
SHA51211e37d68626b5a88330bf25091e19db03078042e236cf4abad939bd22158365daaeb5c3a6c51a41fa37f73d8e93702e7beab26757dd08450e667852712d2af46
-
Filesize
185KB
MD59849d9adf777a426b91b6281ef8d4f99
SHA1f3d9f01fc1d0466ffb5c3633a2a8856962a35d67
SHA256f25ea1f85490ac6ec63828fb2ad0b798a7c4569501c8766370fbccf46d57ff77
SHA51211e37d68626b5a88330bf25091e19db03078042e236cf4abad939bd22158365daaeb5c3a6c51a41fa37f73d8e93702e7beab26757dd08450e667852712d2af46
-
Filesize
145KB
MD513a25ac5822ba1fe8d84bbf10f90a87d
SHA11df7663dcac98b8bc5bde966009859a0175420f9
SHA25623fb823ff90b656adecd76722d95153702cb07bfa1771ee254be38d4de51694f
SHA512f4c3686d14bde3dedc81aa248d8f08a6ec14a12ce6aaec7d3de7a79a8a8c0b0068a83f536da3a1bef3a8dd8ab68e07ef6c1ede0f20fec162134c024cb357e518
-
Filesize
145KB
MD513a25ac5822ba1fe8d84bbf10f90a87d
SHA11df7663dcac98b8bc5bde966009859a0175420f9
SHA25623fb823ff90b656adecd76722d95153702cb07bfa1771ee254be38d4de51694f
SHA512f4c3686d14bde3dedc81aa248d8f08a6ec14a12ce6aaec7d3de7a79a8a8c0b0068a83f536da3a1bef3a8dd8ab68e07ef6c1ede0f20fec162134c024cb357e518