Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
68s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15/05/2023, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe
Resource
win10-20230220-en
General
-
Target
b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe
-
Size
1.1MB
-
MD5
7006df4de3d82834f0fd0fc2c4342238
-
SHA1
eb9e639b232273c24b853a6e27566a5dc2dc7135
-
SHA256
b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df
-
SHA512
6b0812be9512fd585677a1022d2a1a57df247b5244c1c7d3ca0ce4796e7b48924406737473d4e8e5540a3fb9f4f75561516b98ca17faeda0058714d260a95d5d
-
SSDEEP
24576:iyT96Gv3A18DpeES4neHN2j0VSMRn7w64+Guvx:JR6Gv3+8YEcHYjI7l4
Malware Config
Extracted
redline
muza
185.161.248.75:4132
-
auth_value
99f39e1ac98e0c0a729ab27594e72bc3
Extracted
redline
horor
185.161.248.75:4132
-
auth_value
b8d506fe48db15c38fb031d07f42d529
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4232941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4232941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4232941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4232941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4232941.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 2508 v1088469.exe 2552 v7725769.exe 2996 a4232941.exe 3680 b6280636.exe 4872 c3181573.exe 4964 c3181573.exe 752 d7806555.exe 4548 d7806555.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4232941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4232941.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1088469.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7725769.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7725769.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1088469.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4872 set thread context of 4964 4872 c3181573.exe 72 PID 752 set thread context of 4548 752 d7806555.exe 76 -
Program crash 1 IoCs
pid pid_target Process procid_target 1276 4964 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2996 a4232941.exe 2996 a4232941.exe 3680 b6280636.exe 3680 b6280636.exe 4548 d7806555.exe 4548 d7806555.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2996 a4232941.exe Token: SeDebugPrivilege 3680 b6280636.exe Token: SeDebugPrivilege 4872 c3181573.exe Token: SeDebugPrivilege 752 d7806555.exe Token: SeDebugPrivilege 4548 d7806555.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2508 2156 b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe 66 PID 2156 wrote to memory of 2508 2156 b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe 66 PID 2156 wrote to memory of 2508 2156 b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe 66 PID 2508 wrote to memory of 2552 2508 v1088469.exe 67 PID 2508 wrote to memory of 2552 2508 v1088469.exe 67 PID 2508 wrote to memory of 2552 2508 v1088469.exe 67 PID 2552 wrote to memory of 2996 2552 v7725769.exe 68 PID 2552 wrote to memory of 2996 2552 v7725769.exe 68 PID 2552 wrote to memory of 2996 2552 v7725769.exe 68 PID 2552 wrote to memory of 3680 2552 v7725769.exe 69 PID 2552 wrote to memory of 3680 2552 v7725769.exe 69 PID 2552 wrote to memory of 3680 2552 v7725769.exe 69 PID 2508 wrote to memory of 4872 2508 v1088469.exe 71 PID 2508 wrote to memory of 4872 2508 v1088469.exe 71 PID 2508 wrote to memory of 4872 2508 v1088469.exe 71 PID 4872 wrote to memory of 4964 4872 c3181573.exe 72 PID 4872 wrote to memory of 4964 4872 c3181573.exe 72 PID 4872 wrote to memory of 4964 4872 c3181573.exe 72 PID 4872 wrote to memory of 4964 4872 c3181573.exe 72 PID 4872 wrote to memory of 4964 4872 c3181573.exe 72 PID 4872 wrote to memory of 4964 4872 c3181573.exe 72 PID 4872 wrote to memory of 4964 4872 c3181573.exe 72 PID 4872 wrote to memory of 4964 4872 c3181573.exe 72 PID 4872 wrote to memory of 4964 4872 c3181573.exe 72 PID 4872 wrote to memory of 4964 4872 c3181573.exe 72 PID 2156 wrote to memory of 752 2156 b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe 74 PID 2156 wrote to memory of 752 2156 b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe 74 PID 2156 wrote to memory of 752 2156 b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe 74 PID 752 wrote to memory of 4548 752 d7806555.exe 76 PID 752 wrote to memory of 4548 752 d7806555.exe 76 PID 752 wrote to memory of 4548 752 d7806555.exe 76 PID 752 wrote to memory of 4548 752 d7806555.exe 76 PID 752 wrote to memory of 4548 752 d7806555.exe 76 PID 752 wrote to memory of 4548 752 d7806555.exe 76 PID 752 wrote to memory of 4548 752 d7806555.exe 76 PID 752 wrote to memory of 4548 752 d7806555.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe"C:\Users\Admin\AppData\Local\Temp\b93ee8cc50c3d3bdfd6ae1bd258e343926c45574587f1d3dc725e376071ca1df.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1088469.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1088469.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7725769.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7725769.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4232941.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4232941.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6280636.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b6280636.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3181573.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3181573.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3181573.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3181573.exe4⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 245⤵
- Program crash
PID:1276
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7806555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7806555.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7806555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7806555.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
904KB
MD5ca853cd790087289d87a76f39a6372fa
SHA11ad354c54493abd2a637009a402fe49f23f4567c
SHA25669031c08302829e3eccf631a7ce52609a32e275c83d8dd867aaca25e56ecc6ca
SHA512bf2901e6b598e88e13075de2ccdfd25f9460d163547fbd727672b34cadbb118ae8c4ce0d7f2884f7b02801e8847176ccc48cdc052ef30ddc847c363b6e291e4f
-
Filesize
904KB
MD5ca853cd790087289d87a76f39a6372fa
SHA11ad354c54493abd2a637009a402fe49f23f4567c
SHA25669031c08302829e3eccf631a7ce52609a32e275c83d8dd867aaca25e56ecc6ca
SHA512bf2901e6b598e88e13075de2ccdfd25f9460d163547fbd727672b34cadbb118ae8c4ce0d7f2884f7b02801e8847176ccc48cdc052ef30ddc847c363b6e291e4f
-
Filesize
904KB
MD5ca853cd790087289d87a76f39a6372fa
SHA11ad354c54493abd2a637009a402fe49f23f4567c
SHA25669031c08302829e3eccf631a7ce52609a32e275c83d8dd867aaca25e56ecc6ca
SHA512bf2901e6b598e88e13075de2ccdfd25f9460d163547fbd727672b34cadbb118ae8c4ce0d7f2884f7b02801e8847176ccc48cdc052ef30ddc847c363b6e291e4f
-
Filesize
751KB
MD5cddf52f818ddf0de26615f2a1a26b5ce
SHA15fb0fd41479a34ceff42f8df32354f954e3c8816
SHA256c9f67fd7e7d18d37fd710c376a0c84548eaf9aae8ff147c994c5ac31a37d7d2b
SHA5122ba274a264b15e0b9cee60fa2d1f835fa2d699e6dff4c8facdb0c3e02fe26cc2a939f71d1e481b13ef08cbc5b094fa3e37a66a96b07492f1c44c8291f2d8285e
-
Filesize
751KB
MD5cddf52f818ddf0de26615f2a1a26b5ce
SHA15fb0fd41479a34ceff42f8df32354f954e3c8816
SHA256c9f67fd7e7d18d37fd710c376a0c84548eaf9aae8ff147c994c5ac31a37d7d2b
SHA5122ba274a264b15e0b9cee60fa2d1f835fa2d699e6dff4c8facdb0c3e02fe26cc2a939f71d1e481b13ef08cbc5b094fa3e37a66a96b07492f1c44c8291f2d8285e
-
Filesize
963KB
MD54f558aa073030a0fd3569d02c5415d06
SHA1ce5603e3931df62c5a6ab56386ff0067c6db9add
SHA2561233f13fe819aba36c9b876696e257bca18cbe2806305867b099210265c66e95
SHA51225da7ffc557b98065857f1befb6aad705fb3210d5bfb77f590d9b54aa3e4ad4b7b64d6abe23ebff16d7c35be2fb060194f1cb88264eb3e48638c93f2bd381225
-
Filesize
963KB
MD54f558aa073030a0fd3569d02c5415d06
SHA1ce5603e3931df62c5a6ab56386ff0067c6db9add
SHA2561233f13fe819aba36c9b876696e257bca18cbe2806305867b099210265c66e95
SHA51225da7ffc557b98065857f1befb6aad705fb3210d5bfb77f590d9b54aa3e4ad4b7b64d6abe23ebff16d7c35be2fb060194f1cb88264eb3e48638c93f2bd381225
-
Filesize
963KB
MD54f558aa073030a0fd3569d02c5415d06
SHA1ce5603e3931df62c5a6ab56386ff0067c6db9add
SHA2561233f13fe819aba36c9b876696e257bca18cbe2806305867b099210265c66e95
SHA51225da7ffc557b98065857f1befb6aad705fb3210d5bfb77f590d9b54aa3e4ad4b7b64d6abe23ebff16d7c35be2fb060194f1cb88264eb3e48638c93f2bd381225
-
Filesize
305KB
MD5b35dc3bf4dce0808b6de386b44958e31
SHA19a7b1a2e513c6264d2a8b763141f1b97ed1d85a7
SHA2563f4728a814082a6b27e2396262c3b81fac0cad70a54428e6199b1f68e0158bb9
SHA5129a8be77fac00ebcdb18641273d0ecd087ca0f1a9601ecab1d1cb96e0ac12a63b3f3a1852f3bce139bc02d6b3f95160fe507a24ddecf25eae10922634d2119413
-
Filesize
305KB
MD5b35dc3bf4dce0808b6de386b44958e31
SHA19a7b1a2e513c6264d2a8b763141f1b97ed1d85a7
SHA2563f4728a814082a6b27e2396262c3b81fac0cad70a54428e6199b1f68e0158bb9
SHA5129a8be77fac00ebcdb18641273d0ecd087ca0f1a9601ecab1d1cb96e0ac12a63b3f3a1852f3bce139bc02d6b3f95160fe507a24ddecf25eae10922634d2119413
-
Filesize
185KB
MD58a44a044e39dc56829eba074b50fca62
SHA1e5e478f09a44f001689ce7fc7ea9f30c346280c5
SHA256da97d6ba58b018db0050c845430a3c7d2e36cd1931a79ea036d3a18e0f2c75ec
SHA512a7a2ad9d8e21eb82960bc5b7a2b13e1533872225e65c999f91d96cfb169196e9319c53a64c738608a19e65877dbd714334133da08560e8bce07044506771ced2
-
Filesize
185KB
MD58a44a044e39dc56829eba074b50fca62
SHA1e5e478f09a44f001689ce7fc7ea9f30c346280c5
SHA256da97d6ba58b018db0050c845430a3c7d2e36cd1931a79ea036d3a18e0f2c75ec
SHA512a7a2ad9d8e21eb82960bc5b7a2b13e1533872225e65c999f91d96cfb169196e9319c53a64c738608a19e65877dbd714334133da08560e8bce07044506771ced2
-
Filesize
145KB
MD57b8b5cc2fd5cb4c3ae42b63d45ad9b72
SHA13eaffc56a2acce444a8786681f3bf357e1f92800
SHA256b61162f7f734907434342507fcc398a7cda7c6564f67be4773e05882dbb03152
SHA51263a1c21ee757c52ad080af37bb71f6b97a1e4eff8a17f3056573a9548bf00689b725e5afc8d35fc5ea4f96f8ec8440ad9d8a539e10f5dcc5f70cc5faac021c62
-
Filesize
145KB
MD57b8b5cc2fd5cb4c3ae42b63d45ad9b72
SHA13eaffc56a2acce444a8786681f3bf357e1f92800
SHA256b61162f7f734907434342507fcc398a7cda7c6564f67be4773e05882dbb03152
SHA51263a1c21ee757c52ad080af37bb71f6b97a1e4eff8a17f3056573a9548bf00689b725e5afc8d35fc5ea4f96f8ec8440ad9d8a539e10f5dcc5f70cc5faac021c62