Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
engine734.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
engine734.exe
Resource
win10v2004-20230220-en
General
-
Target
engine734.exe
-
Size
1.0MB
-
MD5
ce69662000eca813ff07d53dc065706c
-
SHA1
60e6a815aa184f91d808af536108deaf6571f6cb
-
SHA256
43f0bae96ca7e25e4810ef59e650d57267bb91b486b817cb64012f636f13b49b
-
SHA512
ad509c8559a02da1d948c8286c0e5cd219fa4b1f4e6e4169a47d8a327d817ef934396dee65e47174b1b63f5ab5461b50467424c8bf31662bc9329104df0d74b7
-
SSDEEP
24576:yyMMMxGn7q2ZLqf4Az+B9C2j8LZalxQmmeFEfILJ:Z3Mx47RpqP24MlxQm/FEfY
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5929019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5929019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5929019.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5929019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5929019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5929019.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2040 v4831388.exe 224 v6907871.exe 4376 a5929019.exe 4392 b4932092.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5929019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5929019.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce engine734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" engine734.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4831388.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4831388.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6907871.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6907871.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4376 a5929019.exe 4376 a5929019.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4376 a5929019.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1028 wrote to memory of 2040 1028 engine734.exe 86 PID 1028 wrote to memory of 2040 1028 engine734.exe 86 PID 1028 wrote to memory of 2040 1028 engine734.exe 86 PID 2040 wrote to memory of 224 2040 v4831388.exe 87 PID 2040 wrote to memory of 224 2040 v4831388.exe 87 PID 2040 wrote to memory of 224 2040 v4831388.exe 87 PID 224 wrote to memory of 4376 224 v6907871.exe 88 PID 224 wrote to memory of 4376 224 v6907871.exe 88 PID 224 wrote to memory of 4376 224 v6907871.exe 88 PID 224 wrote to memory of 4392 224 v6907871.exe 89 PID 224 wrote to memory of 4392 224 v6907871.exe 89 PID 224 wrote to memory of 4392 224 v6907871.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\engine734.exe"C:\Users\Admin\AppData\Local\Temp\engine734.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4831388.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4831388.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6907871.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6907871.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5929019.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5929019.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4932092.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4932092.exe4⤵
- Executes dropped EXE
PID:4392
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5765f9c01b90262fe994657fa9d584be3
SHA1aa33ea0c3f72962957fb89ca918a2f8e8c24d679
SHA25603844dfd79ac76c297c7adb81a51fb5bcce9dee859f46187c3c9c56fd38e1198
SHA51247057e1e786c7838f69b9faab0f53ced82eb4796588754e426a09accb042ff8981af97f2e33174180e3dac73b908ac36915f8940542adc8ccef6d3feda493af0
-
Filesize
750KB
MD5765f9c01b90262fe994657fa9d584be3
SHA1aa33ea0c3f72962957fb89ca918a2f8e8c24d679
SHA25603844dfd79ac76c297c7adb81a51fb5bcce9dee859f46187c3c9c56fd38e1198
SHA51247057e1e786c7838f69b9faab0f53ced82eb4796588754e426a09accb042ff8981af97f2e33174180e3dac73b908ac36915f8940542adc8ccef6d3feda493af0
-
Filesize
306KB
MD5e655cf68e11fb3420bd42ce66a06043f
SHA1521763434af4e29c6e602bc732aaa444dc3b147a
SHA256c2878542b60977205a19b7907da40877ebb604a643da35cd30c589f6081520de
SHA51289bb0736c61cc51782a29e5b785fd83e11f904576195d0e8a275af21c4338f6b8cd58353cfcdaf465c4736ae6fa876b5918ed4b6893e007b00b36e23451f8b0e
-
Filesize
306KB
MD5e655cf68e11fb3420bd42ce66a06043f
SHA1521763434af4e29c6e602bc732aaa444dc3b147a
SHA256c2878542b60977205a19b7907da40877ebb604a643da35cd30c589f6081520de
SHA51289bb0736c61cc51782a29e5b785fd83e11f904576195d0e8a275af21c4338f6b8cd58353cfcdaf465c4736ae6fa876b5918ed4b6893e007b00b36e23451f8b0e
-
Filesize
186KB
MD58a58bb7867c918961fde0fc6ed363813
SHA18f431c3659f83aeb4a097a09447fa9976e06f30c
SHA256893b0a2523d279f96da6168a1a5a579fd0e2d1aa4239f277118031668e81fa11
SHA5127dfcd1e10e7fe679df1c23862c2d8fe983d4c047318dfa2bff11b7cb45b519d7c8cfe5fe99411268125c544d37f5860b1a43c67ddadfd40ef6c03ebe0186ff55
-
Filesize
186KB
MD58a58bb7867c918961fde0fc6ed363813
SHA18f431c3659f83aeb4a097a09447fa9976e06f30c
SHA256893b0a2523d279f96da6168a1a5a579fd0e2d1aa4239f277118031668e81fa11
SHA5127dfcd1e10e7fe679df1c23862c2d8fe983d4c047318dfa2bff11b7cb45b519d7c8cfe5fe99411268125c544d37f5860b1a43c67ddadfd40ef6c03ebe0186ff55
-
Filesize
145KB
MD53de0cc4186baca52961a2f58bcfb45de
SHA195b3bb39b1869fd6c53078821724f41ac745ae9e
SHA256cc31a1183d9887bce8a7280f599f123dd773feb4702410716915c5f21c7057d8
SHA5124623a7497734203c4a866264a58da8d9f754fff332d9bc535aecfb60626252a73cef688167328d6bef303ff0899749b9a87a98e28caa0e8a0aea316a3eb14c69
-
Filesize
145KB
MD53de0cc4186baca52961a2f58bcfb45de
SHA195b3bb39b1869fd6c53078821724f41ac745ae9e
SHA256cc31a1183d9887bce8a7280f599f123dd773feb4702410716915c5f21c7057d8
SHA5124623a7497734203c4a866264a58da8d9f754fff332d9bc535aecfb60626252a73cef688167328d6bef303ff0899749b9a87a98e28caa0e8a0aea316a3eb14c69