Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/05/2023, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
2482860.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2482860.exe
Resource
win10v2004-20230220-en
General
-
Target
2482860.exe
-
Size
1.0MB
-
MD5
639a462f401e756dc2d4932e5817d182
-
SHA1
d7fb8aa1369504607400eba1fd67fd739e0a3bde
-
SHA256
4d7f1d8e58a68eeaa131397babf259322e62f3e336bde692e155f700081e1047
-
SHA512
ece964807697840927487f49f7a39fa410de853a3b6f48d563234e1c0ee2a4cdf6027930b383bee0eccc73cba250d4afab8b6390f2d44dbec269d3d9f8be41c3
-
SSDEEP
24576:7yBqg57br2UzveFs7q1hvdDg+fT6S+7dzjqabs6RL:u8g9br2UKi7q1hdbN+7tqb6
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4418575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4418575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4418575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4418575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4418575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4418575.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1196 v7202973.exe 1692 v4656528.exe 520 a4418575.exe 324 b2433476.exe -
Loads dropped DLL 8 IoCs
pid Process 1336 2482860.exe 1196 v7202973.exe 1196 v7202973.exe 1692 v4656528.exe 1692 v4656528.exe 520 a4418575.exe 1692 v4656528.exe 324 b2433476.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4418575.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a4418575.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2482860.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2482860.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7202973.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7202973.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4656528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4656528.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 520 a4418575.exe 520 a4418575.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 520 a4418575.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1196 1336 2482860.exe 27 PID 1336 wrote to memory of 1196 1336 2482860.exe 27 PID 1336 wrote to memory of 1196 1336 2482860.exe 27 PID 1336 wrote to memory of 1196 1336 2482860.exe 27 PID 1336 wrote to memory of 1196 1336 2482860.exe 27 PID 1336 wrote to memory of 1196 1336 2482860.exe 27 PID 1336 wrote to memory of 1196 1336 2482860.exe 27 PID 1196 wrote to memory of 1692 1196 v7202973.exe 28 PID 1196 wrote to memory of 1692 1196 v7202973.exe 28 PID 1196 wrote to memory of 1692 1196 v7202973.exe 28 PID 1196 wrote to memory of 1692 1196 v7202973.exe 28 PID 1196 wrote to memory of 1692 1196 v7202973.exe 28 PID 1196 wrote to memory of 1692 1196 v7202973.exe 28 PID 1196 wrote to memory of 1692 1196 v7202973.exe 28 PID 1692 wrote to memory of 520 1692 v4656528.exe 29 PID 1692 wrote to memory of 520 1692 v4656528.exe 29 PID 1692 wrote to memory of 520 1692 v4656528.exe 29 PID 1692 wrote to memory of 520 1692 v4656528.exe 29 PID 1692 wrote to memory of 520 1692 v4656528.exe 29 PID 1692 wrote to memory of 520 1692 v4656528.exe 29 PID 1692 wrote to memory of 520 1692 v4656528.exe 29 PID 1692 wrote to memory of 324 1692 v4656528.exe 30 PID 1692 wrote to memory of 324 1692 v4656528.exe 30 PID 1692 wrote to memory of 324 1692 v4656528.exe 30 PID 1692 wrote to memory of 324 1692 v4656528.exe 30 PID 1692 wrote to memory of 324 1692 v4656528.exe 30 PID 1692 wrote to memory of 324 1692 v4656528.exe 30 PID 1692 wrote to memory of 324 1692 v4656528.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2482860.exe"C:\Users\Admin\AppData\Local\Temp\2482860.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7202973.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7202973.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4656528.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4656528.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4418575.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4418575.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2433476.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2433476.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:324
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD583c35fe65df6f19f36d8af3dff94e0b9
SHA1c3dc5c5b7ed590f62b24270212df135d33771a85
SHA256734c15bfa820118af735192bfdf41cb3fb8792d554cb53a51c43b1e8027d7ae8
SHA51226a1c9893ec0588502b4aa4a79b21c6fa96fcf986dba67a7399f881ca21d699d0ca6d2e0ef3761b489a62090298c3d168b178444da03aeb40f9a2534902f456b
-
Filesize
751KB
MD583c35fe65df6f19f36d8af3dff94e0b9
SHA1c3dc5c5b7ed590f62b24270212df135d33771a85
SHA256734c15bfa820118af735192bfdf41cb3fb8792d554cb53a51c43b1e8027d7ae8
SHA51226a1c9893ec0588502b4aa4a79b21c6fa96fcf986dba67a7399f881ca21d699d0ca6d2e0ef3761b489a62090298c3d168b178444da03aeb40f9a2534902f456b
-
Filesize
305KB
MD5e68292726b922f9cceeead9b6fb4c36f
SHA15a76abc6b132070517a4c66a16a89b8426d0c851
SHA256e4f6109a7be4575d50af232a4c66d75519744b2c115919c1bcdb2b48a4c6e687
SHA5122997b63eaa367069837db0459bb6933a0c7b3cbf7c66d6ae448da9f6d67c5453ed1752664a7c21b82e0db08c06768fbfa808895968340b5a3693d6df5720edde
-
Filesize
305KB
MD5e68292726b922f9cceeead9b6fb4c36f
SHA15a76abc6b132070517a4c66a16a89b8426d0c851
SHA256e4f6109a7be4575d50af232a4c66d75519744b2c115919c1bcdb2b48a4c6e687
SHA5122997b63eaa367069837db0459bb6933a0c7b3cbf7c66d6ae448da9f6d67c5453ed1752664a7c21b82e0db08c06768fbfa808895968340b5a3693d6df5720edde
-
Filesize
185KB
MD5367cfb38598b41ad698f878cd217c943
SHA1e3b6025c50330b1a75ec920d22dd6f0d79212f6b
SHA256f477a250b81baa3147602f798291d4b603470f5eff99afdaf9ab264cbc300551
SHA5121ae82e49cf3e845991c950165cee0da91513e7d9932e6935c642be9ab090780a3fcafdfb26cea7b57a1aff603777e22d5d495957756e0aacbd5347741b761a0c
-
Filesize
185KB
MD5367cfb38598b41ad698f878cd217c943
SHA1e3b6025c50330b1a75ec920d22dd6f0d79212f6b
SHA256f477a250b81baa3147602f798291d4b603470f5eff99afdaf9ab264cbc300551
SHA5121ae82e49cf3e845991c950165cee0da91513e7d9932e6935c642be9ab090780a3fcafdfb26cea7b57a1aff603777e22d5d495957756e0aacbd5347741b761a0c
-
Filesize
145KB
MD597c145a0988d07a111d293e4183c4944
SHA1f0711ed2b3a9c84c1eaa61f472e637dabcf0d7cd
SHA25682990dc10a2b1adfadb5d6a9c431df420f4e14e36d00fbdc9ede042125705f31
SHA512f8fcc3a91ce572511e2e2e27c75ac041e53e8feb1873dc0dde79b96a7a6d32ffb3e7272ab948966edf4c0838a2d889aa0cf47487a05cac4ea160575bb2322e0b
-
Filesize
145KB
MD597c145a0988d07a111d293e4183c4944
SHA1f0711ed2b3a9c84c1eaa61f472e637dabcf0d7cd
SHA25682990dc10a2b1adfadb5d6a9c431df420f4e14e36d00fbdc9ede042125705f31
SHA512f8fcc3a91ce572511e2e2e27c75ac041e53e8feb1873dc0dde79b96a7a6d32ffb3e7272ab948966edf4c0838a2d889aa0cf47487a05cac4ea160575bb2322e0b
-
Filesize
751KB
MD583c35fe65df6f19f36d8af3dff94e0b9
SHA1c3dc5c5b7ed590f62b24270212df135d33771a85
SHA256734c15bfa820118af735192bfdf41cb3fb8792d554cb53a51c43b1e8027d7ae8
SHA51226a1c9893ec0588502b4aa4a79b21c6fa96fcf986dba67a7399f881ca21d699d0ca6d2e0ef3761b489a62090298c3d168b178444da03aeb40f9a2534902f456b
-
Filesize
751KB
MD583c35fe65df6f19f36d8af3dff94e0b9
SHA1c3dc5c5b7ed590f62b24270212df135d33771a85
SHA256734c15bfa820118af735192bfdf41cb3fb8792d554cb53a51c43b1e8027d7ae8
SHA51226a1c9893ec0588502b4aa4a79b21c6fa96fcf986dba67a7399f881ca21d699d0ca6d2e0ef3761b489a62090298c3d168b178444da03aeb40f9a2534902f456b
-
Filesize
305KB
MD5e68292726b922f9cceeead9b6fb4c36f
SHA15a76abc6b132070517a4c66a16a89b8426d0c851
SHA256e4f6109a7be4575d50af232a4c66d75519744b2c115919c1bcdb2b48a4c6e687
SHA5122997b63eaa367069837db0459bb6933a0c7b3cbf7c66d6ae448da9f6d67c5453ed1752664a7c21b82e0db08c06768fbfa808895968340b5a3693d6df5720edde
-
Filesize
305KB
MD5e68292726b922f9cceeead9b6fb4c36f
SHA15a76abc6b132070517a4c66a16a89b8426d0c851
SHA256e4f6109a7be4575d50af232a4c66d75519744b2c115919c1bcdb2b48a4c6e687
SHA5122997b63eaa367069837db0459bb6933a0c7b3cbf7c66d6ae448da9f6d67c5453ed1752664a7c21b82e0db08c06768fbfa808895968340b5a3693d6df5720edde
-
Filesize
185KB
MD5367cfb38598b41ad698f878cd217c943
SHA1e3b6025c50330b1a75ec920d22dd6f0d79212f6b
SHA256f477a250b81baa3147602f798291d4b603470f5eff99afdaf9ab264cbc300551
SHA5121ae82e49cf3e845991c950165cee0da91513e7d9932e6935c642be9ab090780a3fcafdfb26cea7b57a1aff603777e22d5d495957756e0aacbd5347741b761a0c
-
Filesize
185KB
MD5367cfb38598b41ad698f878cd217c943
SHA1e3b6025c50330b1a75ec920d22dd6f0d79212f6b
SHA256f477a250b81baa3147602f798291d4b603470f5eff99afdaf9ab264cbc300551
SHA5121ae82e49cf3e845991c950165cee0da91513e7d9932e6935c642be9ab090780a3fcafdfb26cea7b57a1aff603777e22d5d495957756e0aacbd5347741b761a0c
-
Filesize
145KB
MD597c145a0988d07a111d293e4183c4944
SHA1f0711ed2b3a9c84c1eaa61f472e637dabcf0d7cd
SHA25682990dc10a2b1adfadb5d6a9c431df420f4e14e36d00fbdc9ede042125705f31
SHA512f8fcc3a91ce572511e2e2e27c75ac041e53e8feb1873dc0dde79b96a7a6d32ffb3e7272ab948966edf4c0838a2d889aa0cf47487a05cac4ea160575bb2322e0b
-
Filesize
145KB
MD597c145a0988d07a111d293e4183c4944
SHA1f0711ed2b3a9c84c1eaa61f472e637dabcf0d7cd
SHA25682990dc10a2b1adfadb5d6a9c431df420f4e14e36d00fbdc9ede042125705f31
SHA512f8fcc3a91ce572511e2e2e27c75ac041e53e8feb1873dc0dde79b96a7a6d32ffb3e7272ab948966edf4c0838a2d889aa0cf47487a05cac4ea160575bb2322e0b