Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe
Resource
win10v2004-20230220-en
General
-
Target
596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe
-
Size
875KB
-
MD5
63ddb67ad363faf3396f502ac48fd53b
-
SHA1
76c3d878cf033c6ab6b99c67961521924bc9ffc2
-
SHA256
596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458
-
SHA512
9eb22e6cf4c0f18e6167b98d5ef317ba41b00abeab3347f7235fc0b4f319a45a0c35292cf758f8ef15824fba964721b65e02428755e6b951ba7ae786c0a95f4a
-
SSDEEP
24576:RyouBg05worjeV5GUkDnJisD5eMh2s7Q:EZBg05jifcJikBhn
Malware Config
Extracted
redline
diza
83.97.73.122:19062
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
mesu
83.97.73.122:19062
-
auth_value
8ede6a157d1d9509a21427d10e999ba2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2328 x5788787.exe 1036 x1194199.exe 628 f7720053.exe 540 g9441836.exe 2552 h4962752.exe 2904 i3756195.exe 4344 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1194199.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5788787.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5788787.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1194199.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 540 set thread context of 4120 540 g9441836.exe 92 PID 2552 set thread context of 3528 2552 h4962752.exe 95 PID 2904 set thread context of 3788 2904 i3756195.exe 100 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 628 f7720053.exe 628 f7720053.exe 4120 AppLaunch.exe 4120 AppLaunch.exe 3788 AppLaunch.exe 3788 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 628 f7720053.exe Token: SeDebugPrivilege 4120 AppLaunch.exe Token: SeDebugPrivilege 3788 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3528 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2328 2864 596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe 83 PID 2864 wrote to memory of 2328 2864 596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe 83 PID 2864 wrote to memory of 2328 2864 596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe 83 PID 2328 wrote to memory of 1036 2328 x5788787.exe 84 PID 2328 wrote to memory of 1036 2328 x5788787.exe 84 PID 2328 wrote to memory of 1036 2328 x5788787.exe 84 PID 1036 wrote to memory of 628 1036 x1194199.exe 85 PID 1036 wrote to memory of 628 1036 x1194199.exe 85 PID 1036 wrote to memory of 628 1036 x1194199.exe 85 PID 1036 wrote to memory of 540 1036 x1194199.exe 90 PID 1036 wrote to memory of 540 1036 x1194199.exe 90 PID 1036 wrote to memory of 540 1036 x1194199.exe 90 PID 540 wrote to memory of 4120 540 g9441836.exe 92 PID 540 wrote to memory of 4120 540 g9441836.exe 92 PID 540 wrote to memory of 4120 540 g9441836.exe 92 PID 540 wrote to memory of 4120 540 g9441836.exe 92 PID 540 wrote to memory of 4120 540 g9441836.exe 92 PID 2328 wrote to memory of 2552 2328 x5788787.exe 94 PID 2328 wrote to memory of 2552 2328 x5788787.exe 94 PID 2328 wrote to memory of 2552 2328 x5788787.exe 94 PID 2552 wrote to memory of 3528 2552 h4962752.exe 95 PID 2552 wrote to memory of 3528 2552 h4962752.exe 95 PID 2552 wrote to memory of 3528 2552 h4962752.exe 95 PID 2552 wrote to memory of 3528 2552 h4962752.exe 95 PID 2552 wrote to memory of 3528 2552 h4962752.exe 95 PID 2864 wrote to memory of 2904 2864 596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe 97 PID 2864 wrote to memory of 2904 2864 596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe 97 PID 2864 wrote to memory of 2904 2864 596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe 97 PID 2904 wrote to memory of 3788 2904 i3756195.exe 100 PID 2904 wrote to memory of 3788 2904 i3756195.exe 100 PID 2904 wrote to memory of 3788 2904 i3756195.exe 100 PID 2904 wrote to memory of 3788 2904 i3756195.exe 100 PID 2904 wrote to memory of 3788 2904 i3756195.exe 100 PID 3528 wrote to memory of 4344 3528 AppLaunch.exe 101 PID 3528 wrote to memory of 4344 3528 AppLaunch.exe 101 PID 3528 wrote to memory of 4344 3528 AppLaunch.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe"C:\Users\Admin\AppData\Local\Temp\596fcd896cd32838c94315ac0116f7bee104e98a3adf65cb4b741ddfac74d458.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5788787.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5788787.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1194199.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1194199.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7720053.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7720053.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9441836.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9441836.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4962752.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4962752.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:4344
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3756195.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3756195.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
328KB
MD524a529715a3ecdecc7cbc33ac486998f
SHA1a34f941c6c840eaaae4a8bf2c6efaf1e246cccdb
SHA2568b817e4aabbc8e2331485613d27d2dae43a8664cfa12ef9999ea2b4ad15503d1
SHA5128ded7a0bdf3c036abfbbc4c97ec352fddd795b8bd357318669accf77072414735795e80b7e745649306d061c818986c8a3bb3da6a4221da53af856cf29455919
-
Filesize
328KB
MD524a529715a3ecdecc7cbc33ac486998f
SHA1a34f941c6c840eaaae4a8bf2c6efaf1e246cccdb
SHA2568b817e4aabbc8e2331485613d27d2dae43a8664cfa12ef9999ea2b4ad15503d1
SHA5128ded7a0bdf3c036abfbbc4c97ec352fddd795b8bd357318669accf77072414735795e80b7e745649306d061c818986c8a3bb3da6a4221da53af856cf29455919
-
Filesize
603KB
MD57bf61be423d444bc0e1cd8d4ca6fcb3f
SHA19bbd3ff948786575a12d4f0a0402b9fc963225ee
SHA2560ddc0153a2550d63a673eb549df1b3da1303e7d754c2ce0f197e3d9f8ad8d056
SHA512861d9c090740f3299f21548f5b0638f2472aa5c80f3763d56edb429bdc0c39998c05dc65c1fde064184e0ae53e6e00ea7423ff0c906373c52086b0c50512fc74
-
Filesize
603KB
MD57bf61be423d444bc0e1cd8d4ca6fcb3f
SHA19bbd3ff948786575a12d4f0a0402b9fc963225ee
SHA2560ddc0153a2550d63a673eb549df1b3da1303e7d754c2ce0f197e3d9f8ad8d056
SHA512861d9c090740f3299f21548f5b0638f2472aa5c80f3763d56edb429bdc0c39998c05dc65c1fde064184e0ae53e6e00ea7423ff0c906373c52086b0c50512fc74
-
Filesize
387KB
MD522d84fa9ae67ff3025abc850fb29a4f9
SHA1d06ea2964d86e3ad86071ddd882539094fe5ab53
SHA2569d778bb2d4d77ce6d27b3d5b5ba9c60a392d8bb4add2967da5ed8a33a215f864
SHA5126e875dd630e8a3f7fcde9f02093b6ea043453cdd709ce6bc7eba0c7304a092048ec0e1122b69874d36e5695956ec56657942d396f186752f6cd4ff3f05524318
-
Filesize
387KB
MD522d84fa9ae67ff3025abc850fb29a4f9
SHA1d06ea2964d86e3ad86071ddd882539094fe5ab53
SHA2569d778bb2d4d77ce6d27b3d5b5ba9c60a392d8bb4add2967da5ed8a33a215f864
SHA5126e875dd630e8a3f7fcde9f02093b6ea043453cdd709ce6bc7eba0c7304a092048ec0e1122b69874d36e5695956ec56657942d396f186752f6cd4ff3f05524318
-
Filesize
277KB
MD55c7b949d398793e12be96aefbfb739dd
SHA1c8d6e34ccf95d93abf570d826cc8b74a34a8e699
SHA256a21644ce52e8a51ccc87e726e5588c1ec7b074117bb424fe6475919cfe8137ec
SHA5128cf98a7211de5c44ca7ae79ae41cb210f341377596fdc7df19c71d4aea4ec1ad79ac85040089554a73abe7c89d122415eefd563081817e847df4784dde7ed7e9
-
Filesize
277KB
MD55c7b949d398793e12be96aefbfb739dd
SHA1c8d6e34ccf95d93abf570d826cc8b74a34a8e699
SHA256a21644ce52e8a51ccc87e726e5588c1ec7b074117bb424fe6475919cfe8137ec
SHA5128cf98a7211de5c44ca7ae79ae41cb210f341377596fdc7df19c71d4aea4ec1ad79ac85040089554a73abe7c89d122415eefd563081817e847df4784dde7ed7e9
-
Filesize
145KB
MD521c95bf753a929c4cc8d66e27f5a54bf
SHA1decc1e32c0345c7b5be6ea466b30e8866948337a
SHA256727a1c2953af6fe7a2ad85ba33993d2924d518f0431f4887e50fb8e864789550
SHA512bbf973797e4f67e9ca78cebed288bae3334371c2b8448160176b6585a6420b9283db658be54d325d552f74fe70bf5d0501f855072001ebcce867c4747e534f01
-
Filesize
145KB
MD521c95bf753a929c4cc8d66e27f5a54bf
SHA1decc1e32c0345c7b5be6ea466b30e8866948337a
SHA256727a1c2953af6fe7a2ad85ba33993d2924d518f0431f4887e50fb8e864789550
SHA512bbf973797e4f67e9ca78cebed288bae3334371c2b8448160176b6585a6420b9283db658be54d325d552f74fe70bf5d0501f855072001ebcce867c4747e534f01
-
Filesize
194KB
MD56db089daa3a0c136dae9c453fdc92914
SHA186ed6582cd83d559fb2d1d15aff60098f82e1a55
SHA256019b14ec5c3bc3bfa7027f96164fb1b110798b71ebcb1dea136f68930ef3ea77
SHA5123472f37ba315814b4045eea9d7f30a6c544c166f56223edf6994783914983865eea707afd7e3cc359c55c7c8c277cb1351f4110bc7012f36c87edc0cfa89713e
-
Filesize
194KB
MD56db089daa3a0c136dae9c453fdc92914
SHA186ed6582cd83d559fb2d1d15aff60098f82e1a55
SHA256019b14ec5c3bc3bfa7027f96164fb1b110798b71ebcb1dea136f68930ef3ea77
SHA5123472f37ba315814b4045eea9d7f30a6c544c166f56223edf6994783914983865eea707afd7e3cc359c55c7c8c277cb1351f4110bc7012f36c87edc0cfa89713e
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc