Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 07:05
Static task
static1
Behavioral task
behavioral1
Sample
d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe
Resource
win10v2004-20230220-en
General
-
Target
d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe
-
Size
305KB
-
MD5
fee4f2a8613a28fada7ebefdb5b211cc
-
SHA1
4bc57126c80ff053d2fbad7bd4d0a23943364b43
-
SHA256
d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828
-
SHA512
df883368a59c19e787f704ed8c593b3fb24547f62257903455f2bee5008b908af3bfca0ed1f51ec6baf243719d268abf62d7b131c13232bee9c30260b337efdf
-
SSDEEP
6144:K6y+bnr+Pp0yN90QEQS/DXfmp3udzQTBmLqtlqcGQf3ot:CMrfy90fbXfBWTRsc3At
Malware Config
Extracted
redline
dolz
77.91.68.253:41783
-
auth_value
91a052e7685b96dcfc2defe95d9affb8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3273790.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3273790.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3273790.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3273790.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3273790.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k3273790.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 2080 k3273790.exe 4416 l2969267.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3273790.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3273790.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2080 k3273790.exe 2080 k3273790.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2080 k3273790.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4260 wrote to memory of 2080 4260 d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe 83 PID 4260 wrote to memory of 2080 4260 d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe 83 PID 4260 wrote to memory of 2080 4260 d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe 83 PID 4260 wrote to memory of 4416 4260 d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe 88 PID 4260 wrote to memory of 4416 4260 d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe 88 PID 4260 wrote to memory of 4416 4260 d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe"C:\Users\Admin\AppData\Local\Temp\d6145f5d46faf2809cec9819624191c3740236e08e093c55ab3f4014ccc68828.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3273790.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\k3273790.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l2969267.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l2969267.exe2⤵
- Executes dropped EXE
PID:4416
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD54c94e0df16c58143287479c74f3e54e7
SHA1f93129b20ac587e95b91f611d4c58b3005b140a9
SHA256c55f04038db70d84fe431937ecf878573a31f0777ea612ad482f76c9a9968a2f
SHA51272d63fafde9940b14b6ffcad664c287adadee194d8bd3cd685916814ab2b6be4fee82cd6af2035433a1ec39609d2a4ca74cffa414a92182c06ccd4d86b085f09
-
Filesize
184KB
MD54c94e0df16c58143287479c74f3e54e7
SHA1f93129b20ac587e95b91f611d4c58b3005b140a9
SHA256c55f04038db70d84fe431937ecf878573a31f0777ea612ad482f76c9a9968a2f
SHA51272d63fafde9940b14b6ffcad664c287adadee194d8bd3cd685916814ab2b6be4fee82cd6af2035433a1ec39609d2a4ca74cffa414a92182c06ccd4d86b085f09
-
Filesize
145KB
MD5c4586a7f23b2576679fdcccac16ac23b
SHA1bab5e37bb9f59f1008becc1552c626ba58ff66aa
SHA256f39c64b94f2f044b7444deb39b82aace41cc3e299171381ebedb22d7f3c879ff
SHA512d12fedcc6467aac6dcc14885ab23ffcfc5d9d4890a0c790fdc399ffca832a79dfebb2078bdb295749474edad8bb221bb9c62024dd00b3f2d5482d5bc50379f58
-
Filesize
145KB
MD5c4586a7f23b2576679fdcccac16ac23b
SHA1bab5e37bb9f59f1008becc1552c626ba58ff66aa
SHA256f39c64b94f2f044b7444deb39b82aace41cc3e299171381ebedb22d7f3c879ff
SHA512d12fedcc6467aac6dcc14885ab23ffcfc5d9d4890a0c790fdc399ffca832a79dfebb2078bdb295749474edad8bb221bb9c62024dd00b3f2d5482d5bc50379f58