Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
5d9d698e7d2629d45dda24f9fc1d3f80fa992d9124d27f1a94f0d482f27e4f56.exe
Resource
win10v2004-20230220-en
General
-
Target
5d9d698e7d2629d45dda24f9fc1d3f80fa992d9124d27f1a94f0d482f27e4f56.exe
-
Size
1.0MB
-
MD5
eefa3c3611778fd7e3c9e50fb4a02599
-
SHA1
c0257047f8cbeb5e731f7bf43c350270b1bc6104
-
SHA256
5d9d698e7d2629d45dda24f9fc1d3f80fa992d9124d27f1a94f0d482f27e4f56
-
SHA512
301e0a93bcb975ce96760e0b658201e3324fea8312208187dd3b55a7abc60f3723a5e8b9c94523e97211db1c9f678f92ec388a243aeb9b8b7cf19741b0e515ce
-
SSDEEP
24576:7yFrUBqRHEq5hIfxfojG7prIWTLQ4Poe:uFowdEqLIfgGVcW/3o
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k6590829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k6590829.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k6590829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k6590829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k6590829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k6590829.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2092 y5806449.exe 2044 y2684303.exe 1756 k6590829.exe 1956 l4055178.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k6590829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k6590829.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5d9d698e7d2629d45dda24f9fc1d3f80fa992d9124d27f1a94f0d482f27e4f56.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5d9d698e7d2629d45dda24f9fc1d3f80fa992d9124d27f1a94f0d482f27e4f56.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5806449.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5806449.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2684303.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y2684303.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1756 k6590829.exe 1756 k6590829.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1756 k6590829.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1816 wrote to memory of 2092 1816 5d9d698e7d2629d45dda24f9fc1d3f80fa992d9124d27f1a94f0d482f27e4f56.exe 82 PID 1816 wrote to memory of 2092 1816 5d9d698e7d2629d45dda24f9fc1d3f80fa992d9124d27f1a94f0d482f27e4f56.exe 82 PID 1816 wrote to memory of 2092 1816 5d9d698e7d2629d45dda24f9fc1d3f80fa992d9124d27f1a94f0d482f27e4f56.exe 82 PID 2092 wrote to memory of 2044 2092 y5806449.exe 83 PID 2092 wrote to memory of 2044 2092 y5806449.exe 83 PID 2092 wrote to memory of 2044 2092 y5806449.exe 83 PID 2044 wrote to memory of 1756 2044 y2684303.exe 84 PID 2044 wrote to memory of 1756 2044 y2684303.exe 84 PID 2044 wrote to memory of 1756 2044 y2684303.exe 84 PID 2044 wrote to memory of 1956 2044 y2684303.exe 85 PID 2044 wrote to memory of 1956 2044 y2684303.exe 85 PID 2044 wrote to memory of 1956 2044 y2684303.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d9d698e7d2629d45dda24f9fc1d3f80fa992d9124d27f1a94f0d482f27e4f56.exe"C:\Users\Admin\AppData\Local\Temp\5d9d698e7d2629d45dda24f9fc1d3f80fa992d9124d27f1a94f0d482f27e4f56.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5806449.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5806449.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2684303.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2684303.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6590829.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6590829.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4055178.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l4055178.exe4⤵
- Executes dropped EXE
PID:1956
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD523b4f27bf01ed2908cefda129424282b
SHA150123057254ff629b9de65f6b6e1a9c0cbf0b709
SHA256ccd0896f4f8ce7cb62418c23f5c8ed4deff580bff58e70dfaf34228045d719e1
SHA5127bbefb7d6d04c47a5d06c3da485a07ba264d6f9ef25c433770f8099bf6a995b67f712d592681ce7a4bbc4cc29e2fc4018ce4d06cb791defdb8f4e1b61e0e0663
-
Filesize
750KB
MD523b4f27bf01ed2908cefda129424282b
SHA150123057254ff629b9de65f6b6e1a9c0cbf0b709
SHA256ccd0896f4f8ce7cb62418c23f5c8ed4deff580bff58e70dfaf34228045d719e1
SHA5127bbefb7d6d04c47a5d06c3da485a07ba264d6f9ef25c433770f8099bf6a995b67f712d592681ce7a4bbc4cc29e2fc4018ce4d06cb791defdb8f4e1b61e0e0663
-
Filesize
305KB
MD5740644f413e63cd1974b34ff17e3720e
SHA16f18c10720eb0356548b0109130d3142b883c08b
SHA256303dce344f0a65fcbabd821ab43a82cf678b0b029f02aa1cdeca2dfad60b679c
SHA512a998d2004e919435e200db4e9a3dfaca76cb7d8adae10ce03f9a21dfee4b31f7b99cc23f2bb447c78e540eed3a84d144f02e6aeb748bc612ca4142f04481a19a
-
Filesize
305KB
MD5740644f413e63cd1974b34ff17e3720e
SHA16f18c10720eb0356548b0109130d3142b883c08b
SHA256303dce344f0a65fcbabd821ab43a82cf678b0b029f02aa1cdeca2dfad60b679c
SHA512a998d2004e919435e200db4e9a3dfaca76cb7d8adae10ce03f9a21dfee4b31f7b99cc23f2bb447c78e540eed3a84d144f02e6aeb748bc612ca4142f04481a19a
-
Filesize
186KB
MD5dc5a53fe428996376fd242532d4c2aab
SHA1e700ecb5a0baf274fb38fc1b33b6c77859c4eabf
SHA2561ec4c1e0bd855c5a6fb683951b4168310210ad8ac9aff43464693b6e49fc2af5
SHA5124b5515b7009977cfc472ff03fc6e258750b36cfb4b8e6af65315e21ca4cced7672ebd62ecbb7bd79e9c613d4656cb2c98329913757d2c5839155a285560b5605
-
Filesize
186KB
MD5dc5a53fe428996376fd242532d4c2aab
SHA1e700ecb5a0baf274fb38fc1b33b6c77859c4eabf
SHA2561ec4c1e0bd855c5a6fb683951b4168310210ad8ac9aff43464693b6e49fc2af5
SHA5124b5515b7009977cfc472ff03fc6e258750b36cfb4b8e6af65315e21ca4cced7672ebd62ecbb7bd79e9c613d4656cb2c98329913757d2c5839155a285560b5605
-
Filesize
145KB
MD54923ff0f2dc02addf84632601fe01d7b
SHA1aba53140a2d7c2ac0852430f107ffb667519a6a7
SHA25697904e482c31aa9d2701eac79adf9647b13a296fff1ca5edb5c07c423ee63b3c
SHA512b1e2dffeb33e4b24ea52ebc347ea24e84daa8a2c0d767f69ceb3496938aee0ca07cd48799b1a3bbd4b2a66663a50a8c0659ea344f95181985b8f2f3fbc3581a2
-
Filesize
145KB
MD54923ff0f2dc02addf84632601fe01d7b
SHA1aba53140a2d7c2ac0852430f107ffb667519a6a7
SHA25697904e482c31aa9d2701eac79adf9647b13a296fff1ca5edb5c07c423ee63b3c
SHA512b1e2dffeb33e4b24ea52ebc347ea24e84daa8a2c0d767f69ceb3496938aee0ca07cd48799b1a3bbd4b2a66663a50a8c0659ea344f95181985b8f2f3fbc3581a2