Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2023, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
2454.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2454.exe
Resource
win10v2004-20230221-en
General
-
Target
2454.exe
-
Size
1.0MB
-
MD5
a2e3ada01f6c8ce8724a7903064f21ea
-
SHA1
38199193c3d02408b937b32167e38bb9fae1c6f6
-
SHA256
86f3a75d3c1fdb2c101a9fd830930f91254e0dd70a353007b0719abafbf22c25
-
SHA512
72e0173bbf937ed30d6359c42f1489218d46695732f55504356f68ba94c179009829c8af004c4270e19954965faf75559aeb3f70f8e2e81cacd9993d59604bf9
-
SSDEEP
24576:/yX0i0tabVsXRmBOmfeGxi5LsxZWk1GekCjGeKJ:KkikLXRMGGxiZkZNjtK
Malware Config
Extracted
redline
meren
77.91.68.253:19065
-
auth_value
a26557b435e44b55fdd4708fbba97d21
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6461916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6461916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6461916.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a6461916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6461916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6461916.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4932 v7210358.exe 4268 v8773196.exe 4280 a6461916.exe 1588 b9249219.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a6461916.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6461916.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2454.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7210358.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7210358.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8773196.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8773196.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2454.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4280 a6461916.exe 4280 a6461916.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4280 a6461916.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4576 wrote to memory of 4932 4576 2454.exe 84 PID 4576 wrote to memory of 4932 4576 2454.exe 84 PID 4576 wrote to memory of 4932 4576 2454.exe 84 PID 4932 wrote to memory of 4268 4932 v7210358.exe 85 PID 4932 wrote to memory of 4268 4932 v7210358.exe 85 PID 4932 wrote to memory of 4268 4932 v7210358.exe 85 PID 4268 wrote to memory of 4280 4268 v8773196.exe 86 PID 4268 wrote to memory of 4280 4268 v8773196.exe 86 PID 4268 wrote to memory of 4280 4268 v8773196.exe 86 PID 4268 wrote to memory of 1588 4268 v8773196.exe 87 PID 4268 wrote to memory of 1588 4268 v8773196.exe 87 PID 4268 wrote to memory of 1588 4268 v8773196.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2454.exe"C:\Users\Admin\AppData\Local\Temp\2454.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7210358.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7210358.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8773196.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8773196.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6461916.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6461916.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9249219.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9249219.exe4⤵
- Executes dropped EXE
PID:1588
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD5ad34eba2c2f3b4abbd912a4d812da842
SHA16ef94d130315bf1b8d5c053da3a328ee347d0ae9
SHA256839ace289e14414aa707664722de9a97d5313ebf13b441fbb67a9d0adf141088
SHA5122cf5dc22a8c2b19de7964cec4f53d27392af7dd863b345e8910c5afa895b54e036d9107805b7c4ac3e154a9ddaf54ed3056dc8a7a44bf62b0f23aa56f467ac9b
-
Filesize
749KB
MD5ad34eba2c2f3b4abbd912a4d812da842
SHA16ef94d130315bf1b8d5c053da3a328ee347d0ae9
SHA256839ace289e14414aa707664722de9a97d5313ebf13b441fbb67a9d0adf141088
SHA5122cf5dc22a8c2b19de7964cec4f53d27392af7dd863b345e8910c5afa895b54e036d9107805b7c4ac3e154a9ddaf54ed3056dc8a7a44bf62b0f23aa56f467ac9b
-
Filesize
304KB
MD5f479fef38f010fac216e0a555ab77f3b
SHA14dd31e069407a733a302b72f22863bd5791c3bc3
SHA2563930da0be90c21f96c347340bd4539209cb8176d584ae772885627936ede0f4e
SHA51286102732de2e89aac36a3cc387d451ee28e1bc54e5fb7e19ea880f836499a706eafcfd0805016f7095827f84a3cad03e12630f83de0ce779fc5a2b99cf3360af
-
Filesize
304KB
MD5f479fef38f010fac216e0a555ab77f3b
SHA14dd31e069407a733a302b72f22863bd5791c3bc3
SHA2563930da0be90c21f96c347340bd4539209cb8176d584ae772885627936ede0f4e
SHA51286102732de2e89aac36a3cc387d451ee28e1bc54e5fb7e19ea880f836499a706eafcfd0805016f7095827f84a3cad03e12630f83de0ce779fc5a2b99cf3360af
-
Filesize
184KB
MD59d72824609f845f8dd6729fb784b941d
SHA138c240b3e32512ba0c8cc4c6b4e29899c69316a7
SHA2562b8417fdb30ed15db7d8e8d0678b943017761053f379170649640a3c772bfe2e
SHA512b803538fe1f32fe023336ceb77033b470840d7cc774a73997c75037a8876713ab07bc102fc11a9d1719ca64968d05450b21d3a1936ad902f650111ccbb8ee341
-
Filesize
184KB
MD59d72824609f845f8dd6729fb784b941d
SHA138c240b3e32512ba0c8cc4c6b4e29899c69316a7
SHA2562b8417fdb30ed15db7d8e8d0678b943017761053f379170649640a3c772bfe2e
SHA512b803538fe1f32fe023336ceb77033b470840d7cc774a73997c75037a8876713ab07bc102fc11a9d1719ca64968d05450b21d3a1936ad902f650111ccbb8ee341
-
Filesize
145KB
MD5e6093c507d4e9685110f01e9b4e39870
SHA1f774126cd3da7eacbebdc210fac15262be4ddc9d
SHA256032b3a840216350f9ad1395e63cdd8a36065a6c7c1beded71a40a7699dafc0ac
SHA512e49299bb3b7b6094dddbe0122c9160fab680cd15cbf2dcfae434e66f66d07a3256dc61d7a54b371d6f844ba5dbf4af11c42c5c5ad27ad70f5ea85dd38d060566
-
Filesize
145KB
MD5e6093c507d4e9685110f01e9b4e39870
SHA1f774126cd3da7eacbebdc210fac15262be4ddc9d
SHA256032b3a840216350f9ad1395e63cdd8a36065a6c7c1beded71a40a7699dafc0ac
SHA512e49299bb3b7b6094dddbe0122c9160fab680cd15cbf2dcfae434e66f66d07a3256dc61d7a54b371d6f844ba5dbf4af11c42c5c5ad27ad70f5ea85dd38d060566