Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2023, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
debugger.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
debugger.exe
Resource
win10v2004-20230220-en
General
-
Target
debugger.exe
-
Size
1.0MB
-
MD5
3ee11d1537ebfdf893f56c6944f8b1f5
-
SHA1
db01e2cb5dbdf1c3b387d276801142f75301e09c
-
SHA256
c1b96a261643e29186af75d1c13f4b310a9563c6bf626d6d074ad01109e8c43b
-
SHA512
a64ee04198b29641e52e148e132871b217b82f576c160ec1ff222f80724725a9ca879264b6118d082e107c4da7e343563a322ad97c4aa9c4fd0ee8df4badd890
-
SSDEEP
24576:YymYLt3exQBLSSOkqZDhWFBuoNvRH/eR5s:fRhbJOrZohez
Malware Config
Extracted
redline
deren
77.91.68.253:19065
-
auth_value
04a169f1fb198bfbeca74d0e06ea2d54
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g8579621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g8579621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g8579621.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g8579621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g8579621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g8579621.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral2/memory/4908-217-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-218-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-221-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-225-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-227-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-229-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-231-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-233-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-235-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-237-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-239-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-241-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-243-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-245-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-247-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-249-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-251-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline behavioral2/memory/4908-253-0x00000000049C0000-0x00000000049FC000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 4944 x7513955.exe 4492 x6912210.exe 1416 f2196733.exe 2744 g8579621.exe 5088 h5548136.exe 1004 h5548136.exe 4908 i7868496.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g8579621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g8579621.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6912210.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6912210.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce debugger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" debugger.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7513955.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7513955.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5088 set thread context of 1004 5088 h5548136.exe 96 -
Program crash 1 IoCs
pid pid_target Process procid_target 3932 1004 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1416 f2196733.exe 1416 f2196733.exe 2744 g8579621.exe 2744 g8579621.exe 4908 i7868496.exe 4908 i7868496.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1416 f2196733.exe Token: SeDebugPrivilege 2744 g8579621.exe Token: SeDebugPrivilege 5088 h5548136.exe Token: SeDebugPrivilege 4908 i7868496.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1004 h5548136.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4944 2980 debugger.exe 85 PID 2980 wrote to memory of 4944 2980 debugger.exe 85 PID 2980 wrote to memory of 4944 2980 debugger.exe 85 PID 4944 wrote to memory of 4492 4944 x7513955.exe 86 PID 4944 wrote to memory of 4492 4944 x7513955.exe 86 PID 4944 wrote to memory of 4492 4944 x7513955.exe 86 PID 4492 wrote to memory of 1416 4492 x6912210.exe 87 PID 4492 wrote to memory of 1416 4492 x6912210.exe 87 PID 4492 wrote to memory of 1416 4492 x6912210.exe 87 PID 4492 wrote to memory of 2744 4492 x6912210.exe 92 PID 4492 wrote to memory of 2744 4492 x6912210.exe 92 PID 4492 wrote to memory of 2744 4492 x6912210.exe 92 PID 4944 wrote to memory of 5088 4944 x7513955.exe 95 PID 4944 wrote to memory of 5088 4944 x7513955.exe 95 PID 4944 wrote to memory of 5088 4944 x7513955.exe 95 PID 5088 wrote to memory of 1004 5088 h5548136.exe 96 PID 5088 wrote to memory of 1004 5088 h5548136.exe 96 PID 5088 wrote to memory of 1004 5088 h5548136.exe 96 PID 5088 wrote to memory of 1004 5088 h5548136.exe 96 PID 5088 wrote to memory of 1004 5088 h5548136.exe 96 PID 5088 wrote to memory of 1004 5088 h5548136.exe 96 PID 5088 wrote to memory of 1004 5088 h5548136.exe 96 PID 5088 wrote to memory of 1004 5088 h5548136.exe 96 PID 5088 wrote to memory of 1004 5088 h5548136.exe 96 PID 5088 wrote to memory of 1004 5088 h5548136.exe 96 PID 2980 wrote to memory of 4908 2980 debugger.exe 99 PID 2980 wrote to memory of 4908 2980 debugger.exe 99 PID 2980 wrote to memory of 4908 2980 debugger.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\debugger.exe"C:\Users\Admin\AppData\Local\Temp\debugger.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7513955.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7513955.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6912210.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6912210.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2196733.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2196733.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8579621.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8579621.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5548136.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5548136.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5548136.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5548136.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 125⤵
- Program crash
PID:3932
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7868496.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7868496.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1004 -ip 10041⤵PID:3140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD50b0a41cf381c45769e6ce40ec8c97593
SHA19c0e57809d9ddf1132b97aef34cf83173f883c35
SHA256c224ec9295f4afea2811aa515de7016c2e51a66b060b8f25747eb81c8f990424
SHA5124652592fcdfc151660132257a6439878f3db8a054fc808b109688802690d6e7ff3a49d552a678aa9f6daec818d6d5ab3f0e4e55d524baba81896c7e525a293d8
-
Filesize
284KB
MD50b0a41cf381c45769e6ce40ec8c97593
SHA19c0e57809d9ddf1132b97aef34cf83173f883c35
SHA256c224ec9295f4afea2811aa515de7016c2e51a66b060b8f25747eb81c8f990424
SHA5124652592fcdfc151660132257a6439878f3db8a054fc808b109688802690d6e7ff3a49d552a678aa9f6daec818d6d5ab3f0e4e55d524baba81896c7e525a293d8
-
Filesize
750KB
MD52c4cb889f0cabf2b25824be29cf29d1d
SHA1efecc9182324b87b0a6a42ea7fb7d23e5c8a7053
SHA25630f02e714a1c9f82eeeb9fd4993258e58b73299e80fda695a928e51b3b8c49f2
SHA512949c29850a8656569e5d06dd1b3ce942714de459557b31d53d08fc71a26a7582bc3bd4cd3a96f73206761632faa2b94746ac4e600c490752faf0cb3cec6e1bb8
-
Filesize
750KB
MD52c4cb889f0cabf2b25824be29cf29d1d
SHA1efecc9182324b87b0a6a42ea7fb7d23e5c8a7053
SHA25630f02e714a1c9f82eeeb9fd4993258e58b73299e80fda695a928e51b3b8c49f2
SHA512949c29850a8656569e5d06dd1b3ce942714de459557b31d53d08fc71a26a7582bc3bd4cd3a96f73206761632faa2b94746ac4e600c490752faf0cb3cec6e1bb8
-
Filesize
964KB
MD5207c903d98c257c8032ac92fdae371aa
SHA14dab524f91a23fba30ed370c59ef6eb7355f4fa4
SHA256cc6b9bf0bcea3b82db51812f929f3814aa20d151cba0d1e05b6e3cf3a7736095
SHA5129b37f860f9f80dd44e4931d66c91bef2d4861e22ca2d1604b0169b28a3b4700a6e17ff1d50b6fec67e3af22125cde8477e0ae7d5b97e90e3147982477f7ef333
-
Filesize
964KB
MD5207c903d98c257c8032ac92fdae371aa
SHA14dab524f91a23fba30ed370c59ef6eb7355f4fa4
SHA256cc6b9bf0bcea3b82db51812f929f3814aa20d151cba0d1e05b6e3cf3a7736095
SHA5129b37f860f9f80dd44e4931d66c91bef2d4861e22ca2d1604b0169b28a3b4700a6e17ff1d50b6fec67e3af22125cde8477e0ae7d5b97e90e3147982477f7ef333
-
Filesize
964KB
MD5207c903d98c257c8032ac92fdae371aa
SHA14dab524f91a23fba30ed370c59ef6eb7355f4fa4
SHA256cc6b9bf0bcea3b82db51812f929f3814aa20d151cba0d1e05b6e3cf3a7736095
SHA5129b37f860f9f80dd44e4931d66c91bef2d4861e22ca2d1604b0169b28a3b4700a6e17ff1d50b6fec67e3af22125cde8477e0ae7d5b97e90e3147982477f7ef333
-
Filesize
306KB
MD52e93245450ba7366e10e8c5953f0cebd
SHA1191003be2b66f7980e3c22a30dc335150d33c088
SHA256a1162a80f7059f5c1c8924f9495f20350768a10ed60803ab15755763a46fe7c8
SHA512dea3a87860f4fc84a1522d9b682840e956ed5cbab8853f58499f5b39797ac1a4ae1bd7da5db1bc938a05c340fd87a7d6e070548f52e7e1fe9bbd24e557ca7527
-
Filesize
306KB
MD52e93245450ba7366e10e8c5953f0cebd
SHA1191003be2b66f7980e3c22a30dc335150d33c088
SHA256a1162a80f7059f5c1c8924f9495f20350768a10ed60803ab15755763a46fe7c8
SHA512dea3a87860f4fc84a1522d9b682840e956ed5cbab8853f58499f5b39797ac1a4ae1bd7da5db1bc938a05c340fd87a7d6e070548f52e7e1fe9bbd24e557ca7527
-
Filesize
145KB
MD58ff2c6942f5028c1706f73daf292f626
SHA1944bae2af0f2dca03f7a407ff548b201b6275555
SHA256337ff576602717930d17a9e73cf29cef06373f9baeb66cf1be7fae27ca3456ea
SHA512cc8020efaa274d4491f7cbbeab6a1abf886c1daade5d23cec372059238bce97132863b8a4ddca3717e127f6478853e3583f042ea3d8351dba5dee1a258d3d3d2
-
Filesize
145KB
MD58ff2c6942f5028c1706f73daf292f626
SHA1944bae2af0f2dca03f7a407ff548b201b6275555
SHA256337ff576602717930d17a9e73cf29cef06373f9baeb66cf1be7fae27ca3456ea
SHA512cc8020efaa274d4491f7cbbeab6a1abf886c1daade5d23cec372059238bce97132863b8a4ddca3717e127f6478853e3583f042ea3d8351dba5dee1a258d3d3d2
-
Filesize
184KB
MD5830c3594bc1a275dd1003ec604a423fd
SHA152c3b361c4312fc84c43b722d6ed6dc7411993c1
SHA2568eba96c2c821bc5075f917489f4b79217ea744ef51fa493f3ac24c607060cbd7
SHA512f72b349c7987f9f3ad4d0980c6f4272a746612e05fb5399e183f16ccac3f91c75d008dc4f34c4bcdabaed8f5363f62d7b5ec9af1a581d4156a4414fbcf201d81
-
Filesize
184KB
MD5830c3594bc1a275dd1003ec604a423fd
SHA152c3b361c4312fc84c43b722d6ed6dc7411993c1
SHA2568eba96c2c821bc5075f917489f4b79217ea744ef51fa493f3ac24c607060cbd7
SHA512f72b349c7987f9f3ad4d0980c6f4272a746612e05fb5399e183f16ccac3f91c75d008dc4f34c4bcdabaed8f5363f62d7b5ec9af1a581d4156a4414fbcf201d81