Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2023, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe
Resource
win10v2004-20230220-en
General
-
Target
a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe
-
Size
1.0MB
-
MD5
2d612a2fe9ca705de28e3cbd4338da04
-
SHA1
9b9a0343905bf7916b90758109a8ef445ed84bf4
-
SHA256
a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0
-
SHA512
c3671673b75ad86341f14386101896b7e4bbdc4b589219c95e05d29a9919882adcb4c71f3ee3558604dc63c286d1c561268c0a1f6b507e689274871829b6916d
-
SSDEEP
24576:uydh4YWW8ZWDqQRq5Zwr68kelpL4zNTXaCkaa3:9D4Yf8ADHRq5Zf8d7QTqFa
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5611641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5611641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5611641.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5611641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5611641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5611641.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4492-218-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-217-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-220-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-222-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-224-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-226-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-228-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-230-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-232-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-234-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-236-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-238-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-240-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-242-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-244-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-246-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-248-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-250-0x0000000004F50000-0x0000000004F8C000-memory.dmp family_redline behavioral1/memory/4492-339-0x0000000002400000-0x0000000002410000-memory.dmp family_redline behavioral1/memory/4492-1132-0x0000000002400000-0x0000000002410000-memory.dmp family_redline -
Executes dropped EXE 7 IoCs
pid Process 656 v4196632.exe 4596 v5214594.exe 2916 a5611641.exe 4880 b8649855.exe 2780 c9612819.exe 4644 c9612819.exe 4492 d5179042.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5611641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5611641.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4196632.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4196632.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5214594.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5214594.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2780 set thread context of 4644 2780 c9612819.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 4264 4644 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2916 a5611641.exe 2916 a5611641.exe 4880 b8649855.exe 4880 b8649855.exe 4492 d5179042.exe 4492 d5179042.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2916 a5611641.exe Token: SeDebugPrivilege 4880 b8649855.exe Token: SeDebugPrivilege 2780 c9612819.exe Token: SeDebugPrivilege 4492 d5179042.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4644 c9612819.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3944 wrote to memory of 656 3944 a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe 83 PID 3944 wrote to memory of 656 3944 a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe 83 PID 3944 wrote to memory of 656 3944 a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe 83 PID 656 wrote to memory of 4596 656 v4196632.exe 84 PID 656 wrote to memory of 4596 656 v4196632.exe 84 PID 656 wrote to memory of 4596 656 v4196632.exe 84 PID 4596 wrote to memory of 2916 4596 v5214594.exe 85 PID 4596 wrote to memory of 2916 4596 v5214594.exe 85 PID 4596 wrote to memory of 2916 4596 v5214594.exe 85 PID 4596 wrote to memory of 4880 4596 v5214594.exe 86 PID 4596 wrote to memory of 4880 4596 v5214594.exe 86 PID 4596 wrote to memory of 4880 4596 v5214594.exe 86 PID 656 wrote to memory of 2780 656 v4196632.exe 88 PID 656 wrote to memory of 2780 656 v4196632.exe 88 PID 656 wrote to memory of 2780 656 v4196632.exe 88 PID 2780 wrote to memory of 4644 2780 c9612819.exe 89 PID 2780 wrote to memory of 4644 2780 c9612819.exe 89 PID 2780 wrote to memory of 4644 2780 c9612819.exe 89 PID 2780 wrote to memory of 4644 2780 c9612819.exe 89 PID 2780 wrote to memory of 4644 2780 c9612819.exe 89 PID 2780 wrote to memory of 4644 2780 c9612819.exe 89 PID 2780 wrote to memory of 4644 2780 c9612819.exe 89 PID 2780 wrote to memory of 4644 2780 c9612819.exe 89 PID 2780 wrote to memory of 4644 2780 c9612819.exe 89 PID 2780 wrote to memory of 4644 2780 c9612819.exe 89 PID 3944 wrote to memory of 4492 3944 a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe 91 PID 3944 wrote to memory of 4492 3944 a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe 91 PID 3944 wrote to memory of 4492 3944 a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe"C:\Users\Admin\AppData\Local\Temp\a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4196632.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4196632.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5214594.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5214594.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5611641.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5611641.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8649855.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8649855.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9612819.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9612819.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9612819.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9612819.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 125⤵
- Program crash
PID:4264
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5179042.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5179042.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4644 -ip 46441⤵PID:1380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD523bdbbb0da18d57216e15f011f00171f
SHA1aaca4cead903ed8e5f6e4983a73f7460681584b9
SHA256cb557d0682a60e1a25d290965709bf4421d31502997ed7e2155c32fc11619504
SHA512b8e87aca36da066e34689734ae1aaaf6cfd666d6abbe92df777fc52413788f497dbe1b685d59fe375dbfa64a6b5be6b594421a4ef67f6b925cf18fa88270ab7e
-
Filesize
285KB
MD523bdbbb0da18d57216e15f011f00171f
SHA1aaca4cead903ed8e5f6e4983a73f7460681584b9
SHA256cb557d0682a60e1a25d290965709bf4421d31502997ed7e2155c32fc11619504
SHA512b8e87aca36da066e34689734ae1aaaf6cfd666d6abbe92df777fc52413788f497dbe1b685d59fe375dbfa64a6b5be6b594421a4ef67f6b925cf18fa88270ab7e
-
Filesize
750KB
MD557696692a60d8374fd4ddfaecb5d6c48
SHA115ecd869a08ddaee9738799f1370de3582baccbe
SHA256eee64064759f3fb507395725bf943bbf97ce530e20dd460f9101dff46bdfd2c3
SHA51219a7b10b99975914dadaba2fc703e0a697cb1b4a23de54f97751a00f6aafda453b42dab33ad4e5d63c7a6480ec4037051110c9b13abb664e1d423bef9a5a229d
-
Filesize
750KB
MD557696692a60d8374fd4ddfaecb5d6c48
SHA115ecd869a08ddaee9738799f1370de3582baccbe
SHA256eee64064759f3fb507395725bf943bbf97ce530e20dd460f9101dff46bdfd2c3
SHA51219a7b10b99975914dadaba2fc703e0a697cb1b4a23de54f97751a00f6aafda453b42dab33ad4e5d63c7a6480ec4037051110c9b13abb664e1d423bef9a5a229d
-
Filesize
965KB
MD5ce2d692c234f5a6d8bf1a095e65a4650
SHA17fdffbe4dfa7cfbb1c7227fe29d2a329a0aad7b8
SHA2565fb55f14c946e608440a46852010a78fe539969cdf8229384b274a836ad80d35
SHA512a4809c0be3c4aecc84d8be352d0ac0b2b475c2b3ad8a92414248b933442b5e786f61d9cf3746a97820deb54ae79c7c33aeafec81d683c9dee19fc62bc8321c50
-
Filesize
965KB
MD5ce2d692c234f5a6d8bf1a095e65a4650
SHA17fdffbe4dfa7cfbb1c7227fe29d2a329a0aad7b8
SHA2565fb55f14c946e608440a46852010a78fe539969cdf8229384b274a836ad80d35
SHA512a4809c0be3c4aecc84d8be352d0ac0b2b475c2b3ad8a92414248b933442b5e786f61d9cf3746a97820deb54ae79c7c33aeafec81d683c9dee19fc62bc8321c50
-
Filesize
965KB
MD5ce2d692c234f5a6d8bf1a095e65a4650
SHA17fdffbe4dfa7cfbb1c7227fe29d2a329a0aad7b8
SHA2565fb55f14c946e608440a46852010a78fe539969cdf8229384b274a836ad80d35
SHA512a4809c0be3c4aecc84d8be352d0ac0b2b475c2b3ad8a92414248b933442b5e786f61d9cf3746a97820deb54ae79c7c33aeafec81d683c9dee19fc62bc8321c50
-
Filesize
306KB
MD54592905bb9f45a2359d6efbe0beb2bb1
SHA1be136e6ec02125d6d452faf4e71e974dc81018e9
SHA256bc7f7e1d681b5e9e1ddd05180b90a9d25e5d29728e8e9eb6db76e098686a55d5
SHA512cdba6c30f22c595dd8dae3be3399ffe0bbb6d5475dd5a91007ac0c9a9941a61c7c074d5e8ddc302f6720c312d21e4da5cae8a4b9c1d7896c87b026a1e50a3fa8
-
Filesize
306KB
MD54592905bb9f45a2359d6efbe0beb2bb1
SHA1be136e6ec02125d6d452faf4e71e974dc81018e9
SHA256bc7f7e1d681b5e9e1ddd05180b90a9d25e5d29728e8e9eb6db76e098686a55d5
SHA512cdba6c30f22c595dd8dae3be3399ffe0bbb6d5475dd5a91007ac0c9a9941a61c7c074d5e8ddc302f6720c312d21e4da5cae8a4b9c1d7896c87b026a1e50a3fa8
-
Filesize
185KB
MD51ea0c447a471b0a6b55c1576e6259267
SHA1fa0829b71f3b385c69c081341d7a5b1c0cf5e86c
SHA2561a3706802de84e097e589091b24b236930ee06a48f622dacae39dd89ff8e9a00
SHA512d9906357bda2c0e5f14782add283566c9f9fef6b71fe2d20632b48924f32f90e185d5c7e542566fda1bfb8f4ad8fae112c685f15ffd62a79eaf7d6194d345c76
-
Filesize
185KB
MD51ea0c447a471b0a6b55c1576e6259267
SHA1fa0829b71f3b385c69c081341d7a5b1c0cf5e86c
SHA2561a3706802de84e097e589091b24b236930ee06a48f622dacae39dd89ff8e9a00
SHA512d9906357bda2c0e5f14782add283566c9f9fef6b71fe2d20632b48924f32f90e185d5c7e542566fda1bfb8f4ad8fae112c685f15ffd62a79eaf7d6194d345c76
-
Filesize
145KB
MD547d489d2adfe99c78fafbfedeffd4355
SHA16983b2fe32c3895c3ffd3d6266363118a8f2ee68
SHA25680718b616a0454419487d4bdfbe98eca568cc95df11b4262d26d854bf1cba43d
SHA51251e8dbb98bcdae718a2436950136507617623dba64e0f448b7620ce3ce8f54ce93d29df125ec1f3902e859073420c3023368aeea6180b61c1d739875dd219ef0
-
Filesize
145KB
MD547d489d2adfe99c78fafbfedeffd4355
SHA16983b2fe32c3895c3ffd3d6266363118a8f2ee68
SHA25680718b616a0454419487d4bdfbe98eca568cc95df11b4262d26d854bf1cba43d
SHA51251e8dbb98bcdae718a2436950136507617623dba64e0f448b7620ce3ce8f54ce93d29df125ec1f3902e859073420c3023368aeea6180b61c1d739875dd219ef0