Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
89s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe
Resource
win10v2004-20230220-en
General
-
Target
7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe
-
Size
873KB
-
MD5
cc6615423fc738dc1fc8513f5a5140c5
-
SHA1
4efa6396b3fc9730e757bfd561424681655847de
-
SHA256
7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2
-
SHA512
d9b7b6ecb704b33e40e2544ef763dbc685c4f78b5fff5094ae9782468436dae1313506f3230e00e788d539b05de19baa9194b0e4134c73ece0265f289868f8d6
-
SSDEEP
12288:5Mrwy90q3IuHZVP6p3vVrYx7xUw/HUG4CTtGHzAYmBZAmhIXVHtIPd2BhUgMM:tyDTHZo0x3/USTtcyd2BWy
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
mesu
83.97.73.122:19062
-
auth_value
8ede6a157d1d9509a21427d10e999ba2
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1656 v0554919.exe 1520 v9991916.exe 3980 a0559112.exe 3600 b3195028.exe 2480 c4648649.exe 5036 d1553065.exe 4216 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9991916.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9991916.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0554919.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0554919.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3980 set thread context of 3844 3980 a0559112.exe 86 PID 2480 set thread context of 4208 2480 c4648649.exe 90 PID 5036 set thread context of 1760 5036 d1553065.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3844 AppLaunch.exe 3844 AppLaunch.exe 3600 b3195028.exe 3600 b3195028.exe 1760 AppLaunch.exe 1760 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3844 AppLaunch.exe Token: SeDebugPrivilege 3600 b3195028.exe Token: SeDebugPrivilege 1760 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4208 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4040 wrote to memory of 1656 4040 7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe 82 PID 4040 wrote to memory of 1656 4040 7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe 82 PID 4040 wrote to memory of 1656 4040 7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe 82 PID 1656 wrote to memory of 1520 1656 v0554919.exe 83 PID 1656 wrote to memory of 1520 1656 v0554919.exe 83 PID 1656 wrote to memory of 1520 1656 v0554919.exe 83 PID 1520 wrote to memory of 3980 1520 v9991916.exe 84 PID 1520 wrote to memory of 3980 1520 v9991916.exe 84 PID 1520 wrote to memory of 3980 1520 v9991916.exe 84 PID 3980 wrote to memory of 3844 3980 a0559112.exe 86 PID 3980 wrote to memory of 3844 3980 a0559112.exe 86 PID 3980 wrote to memory of 3844 3980 a0559112.exe 86 PID 3980 wrote to memory of 3844 3980 a0559112.exe 86 PID 3980 wrote to memory of 3844 3980 a0559112.exe 86 PID 1520 wrote to memory of 3600 1520 v9991916.exe 87 PID 1520 wrote to memory of 3600 1520 v9991916.exe 87 PID 1520 wrote to memory of 3600 1520 v9991916.exe 87 PID 1656 wrote to memory of 2480 1656 v0554919.exe 88 PID 1656 wrote to memory of 2480 1656 v0554919.exe 88 PID 1656 wrote to memory of 2480 1656 v0554919.exe 88 PID 2480 wrote to memory of 4208 2480 c4648649.exe 90 PID 2480 wrote to memory of 4208 2480 c4648649.exe 90 PID 2480 wrote to memory of 4208 2480 c4648649.exe 90 PID 2480 wrote to memory of 4208 2480 c4648649.exe 90 PID 2480 wrote to memory of 4208 2480 c4648649.exe 90 PID 4040 wrote to memory of 5036 4040 7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe 91 PID 4040 wrote to memory of 5036 4040 7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe 91 PID 4040 wrote to memory of 5036 4040 7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe 91 PID 5036 wrote to memory of 1760 5036 d1553065.exe 93 PID 5036 wrote to memory of 1760 5036 d1553065.exe 93 PID 5036 wrote to memory of 1760 5036 d1553065.exe 93 PID 5036 wrote to memory of 1760 5036 d1553065.exe 93 PID 5036 wrote to memory of 1760 5036 d1553065.exe 93 PID 4208 wrote to memory of 4216 4208 AppLaunch.exe 94 PID 4208 wrote to memory of 4216 4208 AppLaunch.exe 94 PID 4208 wrote to memory of 4216 4208 AppLaunch.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe"C:\Users\Admin\AppData\Local\Temp\7a13248bab0f2b4bd036f389fec121e023a3a3a95422a4dc7cce0cb6d3e5dfa2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0554919.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0554919.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9991916.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9991916.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0559112.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0559112.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3195028.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3195028.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4648649.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4648649.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:4216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1553065.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1553065.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
329KB
MD5dcad1176451d13e7f44ff6373259c266
SHA1b750f05fc18240bfa49a2ae6a74a85443b38aa55
SHA2566bb735474a83f4d0b2790a784e2732ba68a73057fce7b60b9d59139dd4a7e58f
SHA512fe4b9f92ebddb459bdadeead388507d3ed6b2e75b6c5164975c98204b804980d6bb57b458121cd3174a30721dc01dd98de67f40b8209f3dca778b6d9babd0e41
-
Filesize
329KB
MD5dcad1176451d13e7f44ff6373259c266
SHA1b750f05fc18240bfa49a2ae6a74a85443b38aa55
SHA2566bb735474a83f4d0b2790a784e2732ba68a73057fce7b60b9d59139dd4a7e58f
SHA512fe4b9f92ebddb459bdadeead388507d3ed6b2e75b6c5164975c98204b804980d6bb57b458121cd3174a30721dc01dd98de67f40b8209f3dca778b6d9babd0e41
-
Filesize
602KB
MD5db40592537df88dfb454cf82f6adbbba
SHA1e4be675fd596b083093eab499eec2a9ed5acc04b
SHA256a0703feb3569996108e364369477cff1f1bedda09fa408217a1742962eae70b7
SHA5129bb531eb2308c7bcb1e6f9a528406d96d52f6dbcac4b1287b47048444265b1fb9d20397a9625ee27b47be0293d915bd168ed5da91912da98475785dba4069f76
-
Filesize
602KB
MD5db40592537df88dfb454cf82f6adbbba
SHA1e4be675fd596b083093eab499eec2a9ed5acc04b
SHA256a0703feb3569996108e364369477cff1f1bedda09fa408217a1742962eae70b7
SHA5129bb531eb2308c7bcb1e6f9a528406d96d52f6dbcac4b1287b47048444265b1fb9d20397a9625ee27b47be0293d915bd168ed5da91912da98475785dba4069f76
-
Filesize
387KB
MD512ce9b99465c4c9975a94b3b5eb7b4a6
SHA11164dcddb9bb3101e54a5546e1eaf1e4fda834a9
SHA256c130cb240508b5ff806c0e00ac0368c7f580e3e3a9723fea708a84fb76ccfbef
SHA5122d830f71712fac9b4216c2f033f7a0720b03c1855e9f50b01b4508bb499a61fce30b8727bdd421db9d6479a1c8259e08437383db08c0706e2f4859e6a632b9d1
-
Filesize
387KB
MD512ce9b99465c4c9975a94b3b5eb7b4a6
SHA11164dcddb9bb3101e54a5546e1eaf1e4fda834a9
SHA256c130cb240508b5ff806c0e00ac0368c7f580e3e3a9723fea708a84fb76ccfbef
SHA5122d830f71712fac9b4216c2f033f7a0720b03c1855e9f50b01b4508bb499a61fce30b8727bdd421db9d6479a1c8259e08437383db08c0706e2f4859e6a632b9d1
-
Filesize
276KB
MD5d55d643bfa3e7943afa8910e4469d4e6
SHA1280d847d91600b4cd2ac33910d26919019a36870
SHA25619c3a7a50f2161cb3db4aaf935f9f302a57a90523a80e949f19fbd486fd724eb
SHA5129639c12b4a757f68ccc85db5f285f4579f173f0c4566c07d660c67a33214e32a5922e516a29b8248bda462b40eab77b57c2ca824f685283ab0c293fe4acf0d95
-
Filesize
276KB
MD5d55d643bfa3e7943afa8910e4469d4e6
SHA1280d847d91600b4cd2ac33910d26919019a36870
SHA25619c3a7a50f2161cb3db4aaf935f9f302a57a90523a80e949f19fbd486fd724eb
SHA5129639c12b4a757f68ccc85db5f285f4579f173f0c4566c07d660c67a33214e32a5922e516a29b8248bda462b40eab77b57c2ca824f685283ab0c293fe4acf0d95
-
Filesize
194KB
MD5dcd7786330740ce656bcebd9dffffdeb
SHA1686c609f99f441959cb03aae512a8a0e26f4cfb1
SHA256624d72dd38975e72006c19130b60919762f74e05998e15643cf23ca5fdb6f6e0
SHA5122440df0459e4d7ce69a999e370ef928320d7679c70a6f02951352e8fc5d7633b8f858ac59489c62007872a773747ca6e2ac125ba56efc2ad20df764af903c114
-
Filesize
194KB
MD5dcd7786330740ce656bcebd9dffffdeb
SHA1686c609f99f441959cb03aae512a8a0e26f4cfb1
SHA256624d72dd38975e72006c19130b60919762f74e05998e15643cf23ca5fdb6f6e0
SHA5122440df0459e4d7ce69a999e370ef928320d7679c70a6f02951352e8fc5d7633b8f858ac59489c62007872a773747ca6e2ac125ba56efc2ad20df764af903c114
-
Filesize
145KB
MD5c6b27e50776a06174ccf06bbc7fc4660
SHA11e8fda6644055b2e760372968c3990c17483258c
SHA256066a62cc4e594fa71056680c0d5f4ea3f29142061c4397f47c067f2e7d248204
SHA5124263c35f92e3ab4d9b842c73ed6015ee8ab317fa289be0ae7ad81fd68b308d97569d64c31051d3ba279221d25e899c9fafe336faf757004c24fb77a21cfff803
-
Filesize
145KB
MD5c6b27e50776a06174ccf06bbc7fc4660
SHA11e8fda6644055b2e760372968c3990c17483258c
SHA256066a62cc4e594fa71056680c0d5f4ea3f29142061c4397f47c067f2e7d248204
SHA5124263c35f92e3ab4d9b842c73ed6015ee8ab317fa289be0ae7ad81fd68b308d97569d64c31051d3ba279221d25e899c9fafe336faf757004c24fb77a21cfff803
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc