Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2023, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
0060cb94540c33d36d58e92cc10a9e0d8bf3fd605df84fd8f94bb51b70c18177.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0060cb94540c33d36d58e92cc10a9e0d8bf3fd605df84fd8f94bb51b70c18177.exe
Resource
win10v2004-20230220-en
General
-
Target
0060cb94540c33d36d58e92cc10a9e0d8bf3fd605df84fd8f94bb51b70c18177.exe
-
Size
1.1MB
-
MD5
e01c15e0b09754a9752126e3651e0e0d
-
SHA1
f71c4365b3b9ecd75b963e8ed3a232675e89d4de
-
SHA256
0060cb94540c33d36d58e92cc10a9e0d8bf3fd605df84fd8f94bb51b70c18177
-
SHA512
3aae2023fcc648ff8c7c6060e7e338b862587a203900dfb574438334270572801db365331901d4d3697c6b79a2c2de5e990b4d4062b33e737c401495a5475946
-
SSDEEP
24576:4y0RxNUig5KMnXFZsjjlofPa3CLJX4bB5joXozjpbNB9ebcC4DvV:/0vNUtKW1kSfPaE47cGBeYCcv
Malware Config
Extracted
redline
muxan
185.161.248.75:4132
-
auth_value
d605be949bb645b0759bf765eb7e6a47
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4184148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4184148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4184148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4184148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4184148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4184148.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4064 v6062549.exe 3416 v1951156.exe 320 a4184148.exe 3260 b8670542.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4184148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4184148.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1951156.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0060cb94540c33d36d58e92cc10a9e0d8bf3fd605df84fd8f94bb51b70c18177.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0060cb94540c33d36d58e92cc10a9e0d8bf3fd605df84fd8f94bb51b70c18177.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6062549.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6062549.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1951156.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 916 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 320 a4184148.exe 320 a4184148.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 320 a4184148.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4064 4900 0060cb94540c33d36d58e92cc10a9e0d8bf3fd605df84fd8f94bb51b70c18177.exe 88 PID 4900 wrote to memory of 4064 4900 0060cb94540c33d36d58e92cc10a9e0d8bf3fd605df84fd8f94bb51b70c18177.exe 88 PID 4900 wrote to memory of 4064 4900 0060cb94540c33d36d58e92cc10a9e0d8bf3fd605df84fd8f94bb51b70c18177.exe 88 PID 4064 wrote to memory of 3416 4064 v6062549.exe 89 PID 4064 wrote to memory of 3416 4064 v6062549.exe 89 PID 4064 wrote to memory of 3416 4064 v6062549.exe 89 PID 3416 wrote to memory of 320 3416 v1951156.exe 90 PID 3416 wrote to memory of 320 3416 v1951156.exe 90 PID 3416 wrote to memory of 320 3416 v1951156.exe 90 PID 3416 wrote to memory of 3260 3416 v1951156.exe 94 PID 3416 wrote to memory of 3260 3416 v1951156.exe 94 PID 3416 wrote to memory of 3260 3416 v1951156.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0060cb94540c33d36d58e92cc10a9e0d8bf3fd605df84fd8f94bb51b70c18177.exe"C:\Users\Admin\AppData\Local\Temp\0060cb94540c33d36d58e92cc10a9e0d8bf3fd605df84fd8f94bb51b70c18177.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6062549.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6062549.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1951156.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1951156.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4184148.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4184148.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8670542.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8670542.exe4⤵
- Executes dropped EXE
PID:3260
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD5b00e176543bc3d767982e522c74239de
SHA16f6c244567e7867cc88a6ee08dbfd9ed202b0a54
SHA2560d854056b97e64d1d92f12aeec3659dd9feb082453dee8053b573fe2e9d16a6c
SHA51226c35bd1114bfc86205424fbb0afc70537ab08dd69ae82c93b3bbd57fe86ce8bfe929a6818cbb358ebdb7e8cd6756c76955c8b8d8342062ee7233fa073f5ee4f
-
Filesize
751KB
MD5b00e176543bc3d767982e522c74239de
SHA16f6c244567e7867cc88a6ee08dbfd9ed202b0a54
SHA2560d854056b97e64d1d92f12aeec3659dd9feb082453dee8053b573fe2e9d16a6c
SHA51226c35bd1114bfc86205424fbb0afc70537ab08dd69ae82c93b3bbd57fe86ce8bfe929a6818cbb358ebdb7e8cd6756c76955c8b8d8342062ee7233fa073f5ee4f
-
Filesize
306KB
MD57f3ddcaafd96e466bc7d48e23d7fdd2a
SHA1767a0c05898262c2b0ff6bb15ee26abb716a6312
SHA256fcb0100d52830d84e9781a1e845074c8368d5e94c4b7403e5c40935bd7c755f4
SHA512e9e0d27f039cba37ca591dd435e03d63e45e274c6a5f37339b51b267fbb2cb5222c4ec5ee35cef77cdd4a7e36d1c8091d5c0892eb1b15463ccf2c8cc8c523c7f
-
Filesize
306KB
MD57f3ddcaafd96e466bc7d48e23d7fdd2a
SHA1767a0c05898262c2b0ff6bb15ee26abb716a6312
SHA256fcb0100d52830d84e9781a1e845074c8368d5e94c4b7403e5c40935bd7c755f4
SHA512e9e0d27f039cba37ca591dd435e03d63e45e274c6a5f37339b51b267fbb2cb5222c4ec5ee35cef77cdd4a7e36d1c8091d5c0892eb1b15463ccf2c8cc8c523c7f
-
Filesize
184KB
MD5ad270c225253397a94e059f8a748e5f6
SHA1a0d894442b84c8c144d3f6b54584526eaa38721f
SHA256a756b2b16e4cd0a5351b00161f35838cf7cdcc8d0c336a6cee5fc2b1901045e3
SHA5123f7b6bc6aff73629f007c65b1d9e31ad1f0da58ab62f668deac0649417dc2e2c6456828eca9b5adcad463a9a47e9eb0f4693ba0c2f42bbd2a1fc8aa8373096e7
-
Filesize
184KB
MD5ad270c225253397a94e059f8a748e5f6
SHA1a0d894442b84c8c144d3f6b54584526eaa38721f
SHA256a756b2b16e4cd0a5351b00161f35838cf7cdcc8d0c336a6cee5fc2b1901045e3
SHA5123f7b6bc6aff73629f007c65b1d9e31ad1f0da58ab62f668deac0649417dc2e2c6456828eca9b5adcad463a9a47e9eb0f4693ba0c2f42bbd2a1fc8aa8373096e7
-
Filesize
145KB
MD54cbf2961598f91de542ea519c9e194fd
SHA13b5b75abb4d6d8b032b41abbc6caec463bdc28c8
SHA256a94d900e73927967ae3cd9c783bd48c1d176f6bfdddaff74b0b43bd5c2c5a568
SHA51212b7ce9bfbf9b76c2a7171ca2d577e7ed96b123eaa0683017f85f1155b00112d636237f989ba5852b1a91b35f1a8c3a1e15ac3e16850e61d4d9031116dcb6520
-
Filesize
145KB
MD54cbf2961598f91de542ea519c9e194fd
SHA13b5b75abb4d6d8b032b41abbc6caec463bdc28c8
SHA256a94d900e73927967ae3cd9c783bd48c1d176f6bfdddaff74b0b43bd5c2c5a568
SHA51212b7ce9bfbf9b76c2a7171ca2d577e7ed96b123eaa0683017f85f1155b00112d636237f989ba5852b1a91b35f1a8c3a1e15ac3e16850e61d4d9031116dcb6520