Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
93s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15/05/2023, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe
Resource
win10-20230220-en
General
-
Target
b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe
-
Size
1.1MB
-
MD5
d751c801c8b6018830159a74b6e0be93
-
SHA1
d11733f998c8bbd482b0d5fe28cfb7fa613545df
-
SHA256
b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104
-
SHA512
f96d4833837ad8aaa94759bf4ebedd5096e439553f63f2f3eb1fcf859a579e9612ca6869acbd5897b2f978c5fcbaeef2eef6ff33a4753b837ea4666222764f9e
-
SSDEEP
24576:Uy0uqe5AgFfIJCumAk0Lu1tOb8auQkz6WKEcIktVDyym:j5HLuR9u1wb8aWQVDyy
Malware Config
Extracted
redline
ment
185.161.248.25:4132
-
auth_value
650f2fd9e43f18bed6e23c78d8cfb0af
Extracted
redline
naher
185.161.248.25:4132
-
auth_value
91f06fcf80f600c56b2797e1c73d214d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6551953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6551953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6551953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6551953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6551953.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 4556 v8147650.exe 4800 v0391532.exe 4832 a6551953.exe 1516 b5094593.exe 4492 c5979213.exe 4384 c5979213.exe 4652 d0533351.exe 4880 d0533351.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a6551953.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6551953.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8147650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8147650.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0391532.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0391532.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4492 set thread context of 4384 4492 c5979213.exe 72 PID 4652 set thread context of 4880 4652 d0533351.exe 76 -
Program crash 1 IoCs
pid pid_target Process procid_target 1308 4384 WerFault.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4832 a6551953.exe 4832 a6551953.exe 1516 b5094593.exe 1516 b5094593.exe 4880 d0533351.exe 4880 d0533351.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4832 a6551953.exe Token: SeDebugPrivilege 1516 b5094593.exe Token: SeDebugPrivilege 4492 c5979213.exe Token: SeDebugPrivilege 4652 d0533351.exe Token: SeDebugPrivilege 4880 d0533351.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4188 wrote to memory of 4556 4188 b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe 66 PID 4188 wrote to memory of 4556 4188 b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe 66 PID 4188 wrote to memory of 4556 4188 b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe 66 PID 4556 wrote to memory of 4800 4556 v8147650.exe 67 PID 4556 wrote to memory of 4800 4556 v8147650.exe 67 PID 4556 wrote to memory of 4800 4556 v8147650.exe 67 PID 4800 wrote to memory of 4832 4800 v0391532.exe 68 PID 4800 wrote to memory of 4832 4800 v0391532.exe 68 PID 4800 wrote to memory of 4832 4800 v0391532.exe 68 PID 4800 wrote to memory of 1516 4800 v0391532.exe 69 PID 4800 wrote to memory of 1516 4800 v0391532.exe 69 PID 4800 wrote to memory of 1516 4800 v0391532.exe 69 PID 4556 wrote to memory of 4492 4556 v8147650.exe 71 PID 4556 wrote to memory of 4492 4556 v8147650.exe 71 PID 4556 wrote to memory of 4492 4556 v8147650.exe 71 PID 4492 wrote to memory of 4384 4492 c5979213.exe 72 PID 4492 wrote to memory of 4384 4492 c5979213.exe 72 PID 4492 wrote to memory of 4384 4492 c5979213.exe 72 PID 4492 wrote to memory of 4384 4492 c5979213.exe 72 PID 4492 wrote to memory of 4384 4492 c5979213.exe 72 PID 4492 wrote to memory of 4384 4492 c5979213.exe 72 PID 4492 wrote to memory of 4384 4492 c5979213.exe 72 PID 4492 wrote to memory of 4384 4492 c5979213.exe 72 PID 4492 wrote to memory of 4384 4492 c5979213.exe 72 PID 4492 wrote to memory of 4384 4492 c5979213.exe 72 PID 4188 wrote to memory of 4652 4188 b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe 74 PID 4188 wrote to memory of 4652 4188 b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe 74 PID 4188 wrote to memory of 4652 4188 b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe 74 PID 4652 wrote to memory of 4880 4652 d0533351.exe 76 PID 4652 wrote to memory of 4880 4652 d0533351.exe 76 PID 4652 wrote to memory of 4880 4652 d0533351.exe 76 PID 4652 wrote to memory of 4880 4652 d0533351.exe 76 PID 4652 wrote to memory of 4880 4652 d0533351.exe 76 PID 4652 wrote to memory of 4880 4652 d0533351.exe 76 PID 4652 wrote to memory of 4880 4652 d0533351.exe 76 PID 4652 wrote to memory of 4880 4652 d0533351.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe"C:\Users\Admin\AppData\Local\Temp\b09a4b654a9cdd02815df622eb76f4abe476b32a04eb2b2cacf1a4444003b104.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8147650.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8147650.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0391532.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0391532.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6551953.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6551953.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5094593.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5094593.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5979213.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5979213.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5979213.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5979213.exe4⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 245⤵
- Program crash
PID:1308
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0533351.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0533351.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0533351.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0533351.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
904KB
MD568d4073dd3f44d0425933789acb11670
SHA1e4e0792cbc16507508e9b633c77b023675562731
SHA25600b4641c9ebe86ebf36f15ece0014911965cd2c5dd6cd839518b87fae013f5e4
SHA51212408b78d1fb0b6a5ec8ca4cac10fb7e85b613eb16c9f3f7af4b84b2e34082a62b7faba9eaa369d527f7b2a76ad1902652c2bbba11ccc591e1ec628c4cb74046
-
Filesize
904KB
MD568d4073dd3f44d0425933789acb11670
SHA1e4e0792cbc16507508e9b633c77b023675562731
SHA25600b4641c9ebe86ebf36f15ece0014911965cd2c5dd6cd839518b87fae013f5e4
SHA51212408b78d1fb0b6a5ec8ca4cac10fb7e85b613eb16c9f3f7af4b84b2e34082a62b7faba9eaa369d527f7b2a76ad1902652c2bbba11ccc591e1ec628c4cb74046
-
Filesize
904KB
MD568d4073dd3f44d0425933789acb11670
SHA1e4e0792cbc16507508e9b633c77b023675562731
SHA25600b4641c9ebe86ebf36f15ece0014911965cd2c5dd6cd839518b87fae013f5e4
SHA51212408b78d1fb0b6a5ec8ca4cac10fb7e85b613eb16c9f3f7af4b84b2e34082a62b7faba9eaa369d527f7b2a76ad1902652c2bbba11ccc591e1ec628c4cb74046
-
Filesize
750KB
MD5a6d99f7d0c0b0a5e487d309cc6cc64d7
SHA177e2a8707ac39f18c48595c319c288f9ffed2c3e
SHA2562e0ab30748c7214afdb6a9f3a941e86bbb66543b29d1eaaa20b2f478bdd0b5c5
SHA512ee9462b968375a7b58a3d67637bada943846f5fefb88dab80e6939eed04867b26c423963e3314faf73383b3e79f7e6bc1cecec5ea330454a2343582da89e3180
-
Filesize
750KB
MD5a6d99f7d0c0b0a5e487d309cc6cc64d7
SHA177e2a8707ac39f18c48595c319c288f9ffed2c3e
SHA2562e0ab30748c7214afdb6a9f3a941e86bbb66543b29d1eaaa20b2f478bdd0b5c5
SHA512ee9462b968375a7b58a3d67637bada943846f5fefb88dab80e6939eed04867b26c423963e3314faf73383b3e79f7e6bc1cecec5ea330454a2343582da89e3180
-
Filesize
963KB
MD5adae3adaf6c3f263f93b4024044e3d7b
SHA15483184f4907f3e7a46cc228f80cf3568feabdff
SHA256dd8732c9d35f12a8745d25013adad1b5071a83342f8148157b3ea7067dc076d9
SHA512d3718c986d9921422ad57c9201a88a8d3cead54ce523fa515f72719f253e6faeca73b6e74f6c82f066f51153f9b1adfd7333411cf6902daccb065357525402cb
-
Filesize
963KB
MD5adae3adaf6c3f263f93b4024044e3d7b
SHA15483184f4907f3e7a46cc228f80cf3568feabdff
SHA256dd8732c9d35f12a8745d25013adad1b5071a83342f8148157b3ea7067dc076d9
SHA512d3718c986d9921422ad57c9201a88a8d3cead54ce523fa515f72719f253e6faeca73b6e74f6c82f066f51153f9b1adfd7333411cf6902daccb065357525402cb
-
Filesize
963KB
MD5adae3adaf6c3f263f93b4024044e3d7b
SHA15483184f4907f3e7a46cc228f80cf3568feabdff
SHA256dd8732c9d35f12a8745d25013adad1b5071a83342f8148157b3ea7067dc076d9
SHA512d3718c986d9921422ad57c9201a88a8d3cead54ce523fa515f72719f253e6faeca73b6e74f6c82f066f51153f9b1adfd7333411cf6902daccb065357525402cb
-
Filesize
306KB
MD5ae2229a0b687259abd2de1413d58b446
SHA19497ee1a23c52e490e8728b041ac225014fe4c0e
SHA2560d4ceccd81d1c715a61169b78e38c260772b0490bbd03edaea5bad592b8f606f
SHA512009b214ff9f6708897ac4f3b971964f8a8392e8d6c3be20c197498ddf5bf3c4c3056fa90846a3bc7175778782e12ec620741a69b54722b773cdf6d5f95b52104
-
Filesize
306KB
MD5ae2229a0b687259abd2de1413d58b446
SHA19497ee1a23c52e490e8728b041ac225014fe4c0e
SHA2560d4ceccd81d1c715a61169b78e38c260772b0490bbd03edaea5bad592b8f606f
SHA512009b214ff9f6708897ac4f3b971964f8a8392e8d6c3be20c197498ddf5bf3c4c3056fa90846a3bc7175778782e12ec620741a69b54722b773cdf6d5f95b52104
-
Filesize
185KB
MD593df1d24446960f69c430f7a03661044
SHA1f5f8277369142fcb87e04900f70888d6dadaa3e4
SHA2561d435f2226ea81d1397b54f9db862822628045ba4bf66ca1a618b385a0e3f463
SHA5120a268665faaef3364d718ccae27678a9c71c1810edbfe90d05f4b721e20974e735117f0c7b54b34cc3c57293465404d4d22cacebb8f6ca9dfd1c6872e384f4c5
-
Filesize
185KB
MD593df1d24446960f69c430f7a03661044
SHA1f5f8277369142fcb87e04900f70888d6dadaa3e4
SHA2561d435f2226ea81d1397b54f9db862822628045ba4bf66ca1a618b385a0e3f463
SHA5120a268665faaef3364d718ccae27678a9c71c1810edbfe90d05f4b721e20974e735117f0c7b54b34cc3c57293465404d4d22cacebb8f6ca9dfd1c6872e384f4c5
-
Filesize
145KB
MD54a99329ce8847049163936576027700b
SHA130474694cd759bc636e922458688f393b730341c
SHA256dc581ae1136adb11daf8b727f8dca787854baee25986c9bad4e3212018bbb554
SHA512756634e8dbe822c323ff0b6a3e1507ce9d163ff35cc2d5c000359ab2eeb4d977d569004a3534f0a10891fc23be9dbbb00404a76cc7ce8327ad6ad68becf1a784
-
Filesize
145KB
MD54a99329ce8847049163936576027700b
SHA130474694cd759bc636e922458688f393b730341c
SHA256dc581ae1136adb11daf8b727f8dca787854baee25986c9bad4e3212018bbb554
SHA512756634e8dbe822c323ff0b6a3e1507ce9d163ff35cc2d5c000359ab2eeb4d977d569004a3534f0a10891fc23be9dbbb00404a76cc7ce8327ad6ad68becf1a784