Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe
Resource
win10v2004-20230220-en
General
-
Target
61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe
-
Size
983KB
-
MD5
9cc731cd92badaff73f62dcde7cfe76d
-
SHA1
aebbfb76f20e49c2562c993d9adb7ae7eb82a82e
-
SHA256
61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5
-
SHA512
5ec2c4d7bba9928b23b4f8a6c674c977939d7a2880d6133c8bb05cd17dcdd8640bf257f0be82a2bba74e46ff80b25b7683c6b6d96634516be0a7069d9176e456
-
SSDEEP
24576:Ny0AolmsblI/NnDfpWt3rSA0reF1TGToh6USLFLkfFHl:oqlNlI5fpWtCaG0h6US9
Malware Config
Extracted
redline
diza
83.97.73.122:19062
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
haval
83.97.73.122:19062
-
auth_value
d23dec6813deb04eb8abd82657a9b0af
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4280 y3438147.exe 3012 y8065700.exe 4312 k9785305.exe 3096 l6402671.exe 32 m7602340.exe 980 n4490962.exe 4080 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3438147.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3438147.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8065700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8065700.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4312 set thread context of 2452 4312 k9785305.exe 87 PID 32 set thread context of 640 32 m7602340.exe 91 PID 980 set thread context of 1128 980 n4490962.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2452 AppLaunch.exe 2452 AppLaunch.exe 3096 l6402671.exe 3096 l6402671.exe 1128 AppLaunch.exe 1128 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2452 AppLaunch.exe Token: SeDebugPrivilege 3096 l6402671.exe Token: SeDebugPrivilege 1128 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 640 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4280 4944 61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe 83 PID 4944 wrote to memory of 4280 4944 61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe 83 PID 4944 wrote to memory of 4280 4944 61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe 83 PID 4280 wrote to memory of 3012 4280 y3438147.exe 84 PID 4280 wrote to memory of 3012 4280 y3438147.exe 84 PID 4280 wrote to memory of 3012 4280 y3438147.exe 84 PID 3012 wrote to memory of 4312 3012 y8065700.exe 85 PID 3012 wrote to memory of 4312 3012 y8065700.exe 85 PID 3012 wrote to memory of 4312 3012 y8065700.exe 85 PID 4312 wrote to memory of 2452 4312 k9785305.exe 87 PID 4312 wrote to memory of 2452 4312 k9785305.exe 87 PID 4312 wrote to memory of 2452 4312 k9785305.exe 87 PID 4312 wrote to memory of 2452 4312 k9785305.exe 87 PID 4312 wrote to memory of 2452 4312 k9785305.exe 87 PID 3012 wrote to memory of 3096 3012 y8065700.exe 88 PID 3012 wrote to memory of 3096 3012 y8065700.exe 88 PID 3012 wrote to memory of 3096 3012 y8065700.exe 88 PID 4280 wrote to memory of 32 4280 y3438147.exe 89 PID 4280 wrote to memory of 32 4280 y3438147.exe 89 PID 4280 wrote to memory of 32 4280 y3438147.exe 89 PID 32 wrote to memory of 640 32 m7602340.exe 91 PID 32 wrote to memory of 640 32 m7602340.exe 91 PID 32 wrote to memory of 640 32 m7602340.exe 91 PID 32 wrote to memory of 640 32 m7602340.exe 91 PID 32 wrote to memory of 640 32 m7602340.exe 91 PID 4944 wrote to memory of 980 4944 61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe 92 PID 4944 wrote to memory of 980 4944 61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe 92 PID 4944 wrote to memory of 980 4944 61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe 92 PID 980 wrote to memory of 1128 980 n4490962.exe 94 PID 980 wrote to memory of 1128 980 n4490962.exe 94 PID 980 wrote to memory of 1128 980 n4490962.exe 94 PID 980 wrote to memory of 1128 980 n4490962.exe 94 PID 980 wrote to memory of 1128 980 n4490962.exe 94 PID 640 wrote to memory of 4080 640 AppLaunch.exe 95 PID 640 wrote to memory of 4080 640 AppLaunch.exe 95 PID 640 wrote to memory of 4080 640 AppLaunch.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe"C:\Users\Admin\AppData\Local\Temp\61071812b3307184c0f04b053d367d477b98fec1d857c8f23f1502f0f43bd1a5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3438147.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3438147.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8065700.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8065700.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9785305.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9785305.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6402671.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6402671.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7602340.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7602340.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:4080
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4490962.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4490962.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
328KB
MD5a1e7e01897ae3c4c1e98579ffe771024
SHA1ca256a28ca8b8ad3f839fa2fa8e424503a4da8c1
SHA25666afd6607b585cd90f3d6bd0a5cedf09c7d371b7efa5fa3a17b15fe4b7b8b1d8
SHA512288368d1361f0f7a089d0f9dd9be4799c5d324837f99166c811954829b05255f3f9b2c0657e19d5bf488482d781b281fea8397ab2a97719be3c83482a3156128
-
Filesize
328KB
MD5a1e7e01897ae3c4c1e98579ffe771024
SHA1ca256a28ca8b8ad3f839fa2fa8e424503a4da8c1
SHA25666afd6607b585cd90f3d6bd0a5cedf09c7d371b7efa5fa3a17b15fe4b7b8b1d8
SHA512288368d1361f0f7a089d0f9dd9be4799c5d324837f99166c811954829b05255f3f9b2c0657e19d5bf488482d781b281fea8397ab2a97719be3c83482a3156128
-
Filesize
661KB
MD5a691a6cbe0c0838e418caa0c1192536d
SHA172135541f4de08ae2b566d85216afaf9162df0c7
SHA256fb9dba55903b96c5b1096830329db3e96dd93809de72e7ca232ac2c44e922e79
SHA5128515663ce9cfd2145e0edf77fe81c9faa69ec63703dc1f7b25b225efdd7328aa66d886e6570ba335ce5e0a7776f5f25845c8ccc09901085c8d10a9fca5dae71f
-
Filesize
661KB
MD5a691a6cbe0c0838e418caa0c1192536d
SHA172135541f4de08ae2b566d85216afaf9162df0c7
SHA256fb9dba55903b96c5b1096830329db3e96dd93809de72e7ca232ac2c44e922e79
SHA5128515663ce9cfd2145e0edf77fe81c9faa69ec63703dc1f7b25b225efdd7328aa66d886e6570ba335ce5e0a7776f5f25845c8ccc09901085c8d10a9fca5dae71f
-
Filesize
388KB
MD53208193595afc60984d6291d42a52d8a
SHA187080a82d38baa664c71b7d6fbb8eb197285ab8b
SHA2561f27779c93074a5df541e900e8369991cc8f107c7c4ab357bc14f51d4724c83f
SHA5121fc131805afad9e09a64ce6e3bb74771e005d13abf0c06de1817e3d540d0c13745eafe17d4422b535fd2d7c3bff83cfc199693052833c17e4b183d1f9737416c
-
Filesize
388KB
MD53208193595afc60984d6291d42a52d8a
SHA187080a82d38baa664c71b7d6fbb8eb197285ab8b
SHA2561f27779c93074a5df541e900e8369991cc8f107c7c4ab357bc14f51d4724c83f
SHA5121fc131805afad9e09a64ce6e3bb74771e005d13abf0c06de1817e3d540d0c13745eafe17d4422b535fd2d7c3bff83cfc199693052833c17e4b183d1f9737416c
-
Filesize
280KB
MD5baa7b41c28e0f8851d7b39dda199ecbb
SHA190a7c4d0bf7676aa105d8f9407ef6e5cd047aca2
SHA2569a2e7b122bf648d4f134d50f93b914dab9145e7c8fbfc5e22aea11cc3f90858a
SHA512a1ce6b72a1641b188359f05ca69e3409dd6ce4b68ac73e852edb9e783151dfd2a474182796f791a922ba3193b2b735c455fe98f7dc3c1f6d04b2593bf812ac2f
-
Filesize
280KB
MD5baa7b41c28e0f8851d7b39dda199ecbb
SHA190a7c4d0bf7676aa105d8f9407ef6e5cd047aca2
SHA2569a2e7b122bf648d4f134d50f93b914dab9145e7c8fbfc5e22aea11cc3f90858a
SHA512a1ce6b72a1641b188359f05ca69e3409dd6ce4b68ac73e852edb9e783151dfd2a474182796f791a922ba3193b2b735c455fe98f7dc3c1f6d04b2593bf812ac2f
-
Filesize
194KB
MD587544c36e91098b90af9dc32dd9e5f42
SHA1cf39d6a23faf7c6fb13e539312ddce9b26c97a6b
SHA256273e530388871c1ea7dd4fb8916534dc155778b41ffa13a9d363a82faad358c5
SHA5123501757d4bc3ac49a113dbe13d4903e953fdeb7e58480aed266abebf96261335bf3e8728b75d09676a4d204b569873a23d198d959eec9bbbfb5d586a5d834ebe
-
Filesize
194KB
MD587544c36e91098b90af9dc32dd9e5f42
SHA1cf39d6a23faf7c6fb13e539312ddce9b26c97a6b
SHA256273e530388871c1ea7dd4fb8916534dc155778b41ffa13a9d363a82faad358c5
SHA5123501757d4bc3ac49a113dbe13d4903e953fdeb7e58480aed266abebf96261335bf3e8728b75d09676a4d204b569873a23d198d959eec9bbbfb5d586a5d834ebe
-
Filesize
146KB
MD5e41b704bc07499a119021dee9d53ab7c
SHA1f55aaacb0522c2c87b74f3914d1fe9364609eb80
SHA256bb1bcbb437261160db773aff7221bfc5870bdd8da02ab904aa1a3b080e31ead8
SHA51201f004653a7dcfc41c01d3a520ccc6998fe7dc48877bedffc5df8dca4b44890687aa68f9f9e1250addb3c55143081ac54d9890595b6d159ac0c4b2cf7d673973
-
Filesize
146KB
MD5e41b704bc07499a119021dee9d53ab7c
SHA1f55aaacb0522c2c87b74f3914d1fe9364609eb80
SHA256bb1bcbb437261160db773aff7221bfc5870bdd8da02ab904aa1a3b080e31ead8
SHA51201f004653a7dcfc41c01d3a520ccc6998fe7dc48877bedffc5df8dca4b44890687aa68f9f9e1250addb3c55143081ac54d9890595b6d159ac0c4b2cf7d673973
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc