Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
6e1568bbb3eedfc19307327e912cf9ef7c43c65926831c42ddeaa877fffe723b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6e1568bbb3eedfc19307327e912cf9ef7c43c65926831c42ddeaa877fffe723b.exe
Resource
win10v2004-20230221-en
General
-
Target
6e1568bbb3eedfc19307327e912cf9ef7c43c65926831c42ddeaa877fffe723b.exe
-
Size
1.0MB
-
MD5
ad77aad43c3e1315f76f837270a022ab
-
SHA1
b61dda4980b44e829551ebd25e034bd77b5152bb
-
SHA256
6e1568bbb3eedfc19307327e912cf9ef7c43c65926831c42ddeaa877fffe723b
-
SHA512
5f1e2f99cd0b621e1e172b7b27a60ff109e09d8d7e87c9304652af90ec49fb06cfab8edfb38e4513e7c6cd8f223bc5cf3a6d20f969a4296dfde14e5535d931af
-
SSDEEP
24576:OyejuH5yjqA5/BTcv7Rh7n/OJ6TmxRNT++PfOvAf:dyuZyjqmmRt46TaNT+8fOv
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8478633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8478633.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8478633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8478633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8478633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8478633.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2304 y8839149.exe 2108 y2338937.exe 2184 k8478633.exe 1940 l0035252.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8478633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8478633.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2338937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y2338937.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6e1568bbb3eedfc19307327e912cf9ef7c43c65926831c42ddeaa877fffe723b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6e1568bbb3eedfc19307327e912cf9ef7c43c65926831c42ddeaa877fffe723b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8839149.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8839149.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2184 k8478633.exe 2184 k8478633.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2184 k8478633.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 956 wrote to memory of 2304 956 6e1568bbb3eedfc19307327e912cf9ef7c43c65926831c42ddeaa877fffe723b.exe 84 PID 956 wrote to memory of 2304 956 6e1568bbb3eedfc19307327e912cf9ef7c43c65926831c42ddeaa877fffe723b.exe 84 PID 956 wrote to memory of 2304 956 6e1568bbb3eedfc19307327e912cf9ef7c43c65926831c42ddeaa877fffe723b.exe 84 PID 2304 wrote to memory of 2108 2304 y8839149.exe 85 PID 2304 wrote to memory of 2108 2304 y8839149.exe 85 PID 2304 wrote to memory of 2108 2304 y8839149.exe 85 PID 2108 wrote to memory of 2184 2108 y2338937.exe 86 PID 2108 wrote to memory of 2184 2108 y2338937.exe 86 PID 2108 wrote to memory of 2184 2108 y2338937.exe 86 PID 2108 wrote to memory of 1940 2108 y2338937.exe 87 PID 2108 wrote to memory of 1940 2108 y2338937.exe 87 PID 2108 wrote to memory of 1940 2108 y2338937.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e1568bbb3eedfc19307327e912cf9ef7c43c65926831c42ddeaa877fffe723b.exe"C:\Users\Admin\AppData\Local\Temp\6e1568bbb3eedfc19307327e912cf9ef7c43c65926831c42ddeaa877fffe723b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8839149.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8839149.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2338937.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y2338937.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8478633.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k8478633.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0035252.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0035252.exe4⤵
- Executes dropped EXE
PID:1940
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD583f63a066dbf7a32825e92d854c2db3a
SHA1cd5f53166ab2fe07d43e9a78a29afd804123b8a1
SHA256dcb8ea3105d54448b6041dfa01ab6cbffb24bf950053c16df42a919ddbc7fbe6
SHA512314cd69d029fd8ed79eaaa35dfd51865c55f91f4c2c8c5524d1a03e42a656d491ea120c1d12b14206bdde8ff5f0302a184d35e45ad901e8916331d7fd14f3324
-
Filesize
750KB
MD583f63a066dbf7a32825e92d854c2db3a
SHA1cd5f53166ab2fe07d43e9a78a29afd804123b8a1
SHA256dcb8ea3105d54448b6041dfa01ab6cbffb24bf950053c16df42a919ddbc7fbe6
SHA512314cd69d029fd8ed79eaaa35dfd51865c55f91f4c2c8c5524d1a03e42a656d491ea120c1d12b14206bdde8ff5f0302a184d35e45ad901e8916331d7fd14f3324
-
Filesize
305KB
MD50df95788a061208b089eb0cee14e2b94
SHA13d02c55cdcdcc2c473ffe6439b940628eaaab399
SHA256f21eac01c9d54c1afc2b6fd10de6938bb311683a5a4b99f6cd38e598621a7448
SHA512a6cf3c1d28c66b8d2cc6f418255dedae8ea2b65b6c41593c1f4da4329b868fa16c7ea2549681438100fc1e68aace27e6f648158efceea6da7f76fd856df9879d
-
Filesize
305KB
MD50df95788a061208b089eb0cee14e2b94
SHA13d02c55cdcdcc2c473ffe6439b940628eaaab399
SHA256f21eac01c9d54c1afc2b6fd10de6938bb311683a5a4b99f6cd38e598621a7448
SHA512a6cf3c1d28c66b8d2cc6f418255dedae8ea2b65b6c41593c1f4da4329b868fa16c7ea2549681438100fc1e68aace27e6f648158efceea6da7f76fd856df9879d
-
Filesize
184KB
MD5e3b5e6da53abdd2976f68e334c31aac2
SHA1908524d5204a629c2e8fab6637a4dcd78b28dc75
SHA256bb24f1f41388067c6760c5bce6a192f43b495ef296f2354cf86cf8dbbbf82b3b
SHA512bea70b682fe041df8021fa4c8e44207aea6e7655eed6f1eb04c7033cd8f5eb81a8a8c1e2220448a30f0aaf89befac6e5c367b51016f833aab593f105dbd0a605
-
Filesize
184KB
MD5e3b5e6da53abdd2976f68e334c31aac2
SHA1908524d5204a629c2e8fab6637a4dcd78b28dc75
SHA256bb24f1f41388067c6760c5bce6a192f43b495ef296f2354cf86cf8dbbbf82b3b
SHA512bea70b682fe041df8021fa4c8e44207aea6e7655eed6f1eb04c7033cd8f5eb81a8a8c1e2220448a30f0aaf89befac6e5c367b51016f833aab593f105dbd0a605
-
Filesize
145KB
MD5c72fec84924bf7476024e9be9fb048d0
SHA1e3d1d9d42ce84463952e723998a75f625755383c
SHA2565067803e45ca38a804a359d762d364a6ce6a3ae66b13a3f2a2429c189078157a
SHA5125c55690f272dbc6a643f38e859f326c2c02a358fee5a933cbe8d48921414f7b545ba8c51bd82a5bc1090a0d62c93d0d77f68fd44363f540fc8ea4b17574a7ead
-
Filesize
145KB
MD5c72fec84924bf7476024e9be9fb048d0
SHA1e3d1d9d42ce84463952e723998a75f625755383c
SHA2565067803e45ca38a804a359d762d364a6ce6a3ae66b13a3f2a2429c189078157a
SHA5125c55690f272dbc6a643f38e859f326c2c02a358fee5a933cbe8d48921414f7b545ba8c51bd82a5bc1090a0d62c93d0d77f68fd44363f540fc8ea4b17574a7ead