Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe
Resource
win10v2004-20230221-en
General
-
Target
274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe
-
Size
982KB
-
MD5
f65c66ba8ea681ba82e8968caba9b4c1
-
SHA1
66fb90c141aac694505700a160497707bfc4ebd7
-
SHA256
274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db
-
SHA512
9011910d8fdbee5421e64b4c636a7ba92c1045a723678f7db3e1bb318ac987ffb811109ef0c3e1f411c80bd91d5ea6d005131265eedc556d6871ca3ddd70a61d
-
SSDEEP
24576:9ysfWgKl+iukk2QcPAet8TGIohkFC5U25FBkf7KUKPRdY:Ytgfid3IeWG/hZ5U2ZYkPR
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
haval
83.97.73.122:19062
-
auth_value
d23dec6813deb04eb8abd82657a9b0af
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2244 v5274672.exe 3484 v6732685.exe 3400 a4557051.exe 1524 b9413574.exe 2692 c6957785.exe 5072 d5630120.exe 2348 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6732685.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5274672.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5274672.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6732685.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3400 set thread context of 1412 3400 a4557051.exe 80 PID 2692 set thread context of 560 2692 c6957785.exe 87 PID 5072 set thread context of 916 5072 d5630120.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1412 AppLaunch.exe 1412 AppLaunch.exe 1524 b9413574.exe 1524 b9413574.exe 916 AppLaunch.exe 916 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1412 AppLaunch.exe Token: SeDebugPrivilege 1524 b9413574.exe Token: SeDebugPrivilege 916 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 560 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2244 4824 274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe 76 PID 4824 wrote to memory of 2244 4824 274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe 76 PID 4824 wrote to memory of 2244 4824 274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe 76 PID 2244 wrote to memory of 3484 2244 v5274672.exe 77 PID 2244 wrote to memory of 3484 2244 v5274672.exe 77 PID 2244 wrote to memory of 3484 2244 v5274672.exe 77 PID 3484 wrote to memory of 3400 3484 v6732685.exe 78 PID 3484 wrote to memory of 3400 3484 v6732685.exe 78 PID 3484 wrote to memory of 3400 3484 v6732685.exe 78 PID 3400 wrote to memory of 1412 3400 a4557051.exe 80 PID 3400 wrote to memory of 1412 3400 a4557051.exe 80 PID 3400 wrote to memory of 1412 3400 a4557051.exe 80 PID 3400 wrote to memory of 1412 3400 a4557051.exe 80 PID 3400 wrote to memory of 1412 3400 a4557051.exe 80 PID 3484 wrote to memory of 1524 3484 v6732685.exe 81 PID 3484 wrote to memory of 1524 3484 v6732685.exe 81 PID 3484 wrote to memory of 1524 3484 v6732685.exe 81 PID 2244 wrote to memory of 2692 2244 v5274672.exe 85 PID 2244 wrote to memory of 2692 2244 v5274672.exe 85 PID 2244 wrote to memory of 2692 2244 v5274672.exe 85 PID 2692 wrote to memory of 560 2692 c6957785.exe 87 PID 2692 wrote to memory of 560 2692 c6957785.exe 87 PID 2692 wrote to memory of 560 2692 c6957785.exe 87 PID 2692 wrote to memory of 560 2692 c6957785.exe 87 PID 2692 wrote to memory of 560 2692 c6957785.exe 87 PID 4824 wrote to memory of 5072 4824 274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe 88 PID 4824 wrote to memory of 5072 4824 274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe 88 PID 4824 wrote to memory of 5072 4824 274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe 88 PID 5072 wrote to memory of 916 5072 d5630120.exe 90 PID 5072 wrote to memory of 916 5072 d5630120.exe 90 PID 5072 wrote to memory of 916 5072 d5630120.exe 90 PID 5072 wrote to memory of 916 5072 d5630120.exe 90 PID 5072 wrote to memory of 916 5072 d5630120.exe 90 PID 560 wrote to memory of 2348 560 AppLaunch.exe 91 PID 560 wrote to memory of 2348 560 AppLaunch.exe 91 PID 560 wrote to memory of 2348 560 AppLaunch.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe"C:\Users\Admin\AppData\Local\Temp\274c846779271abf1adf39a414346ac5dd99e42d930198919593fb9d162041db.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5274672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5274672.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6732685.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6732685.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4557051.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4557051.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9413574.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9413574.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957785.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957785.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:2348
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5630120.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5630120.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
328KB
MD5d2a8ff9e217d7248dd8371a776946b9b
SHA10169eb654e353326c1a2dde821ad94d5c80667b0
SHA25676b3dadec94b9da855e84bfef6a61b1fbcda45a58a5baf6ecf8d986a0b27eec4
SHA512c82e6f477e09c80d05358ad0d805b098ff00f7119a5e1cfa50b73d3de952893514000cfab139190c783251716c97e17c14d69c58c1133d003630544ea48afcc2
-
Filesize
328KB
MD5d2a8ff9e217d7248dd8371a776946b9b
SHA10169eb654e353326c1a2dde821ad94d5c80667b0
SHA25676b3dadec94b9da855e84bfef6a61b1fbcda45a58a5baf6ecf8d986a0b27eec4
SHA512c82e6f477e09c80d05358ad0d805b098ff00f7119a5e1cfa50b73d3de952893514000cfab139190c783251716c97e17c14d69c58c1133d003630544ea48afcc2
-
Filesize
661KB
MD5ebc705f0a2b446a970d1f13a197c1863
SHA110fcafb78b6d2ce729cd96d433bc6c4f1cf350fc
SHA2561d89b5afcf7c19ba8adbeacb57d0366f0216775336ad52a27522b5e45c08f2ef
SHA512eb3288f7b598e793d5ac6b8f29101293d4c2015366ad60f1414ba0f2e03921000cbcd5ce704455220cf7580d721593539ad208480e2d2b3ce46744297b508d08
-
Filesize
661KB
MD5ebc705f0a2b446a970d1f13a197c1863
SHA110fcafb78b6d2ce729cd96d433bc6c4f1cf350fc
SHA2561d89b5afcf7c19ba8adbeacb57d0366f0216775336ad52a27522b5e45c08f2ef
SHA512eb3288f7b598e793d5ac6b8f29101293d4c2015366ad60f1414ba0f2e03921000cbcd5ce704455220cf7580d721593539ad208480e2d2b3ce46744297b508d08
-
Filesize
388KB
MD5459046375bb8ab2a17dcdfbcfc1231e4
SHA1aec5e309429d90ed7cb4fcf6253ca412da4a5f56
SHA2561e19c33b5864cd041c69d499cc1ce24d886ac3f97ec292034fdbda7123c56a80
SHA512ba565c9bd8e580408e6ecb1f7dc0751e6b04fb9ba0a736e133b23908ec4ffbaccf60892355043531cda7a78cea5ccf7cc1405b8964a3dfa09eb6bbc8fc8b6ad3
-
Filesize
388KB
MD5459046375bb8ab2a17dcdfbcfc1231e4
SHA1aec5e309429d90ed7cb4fcf6253ca412da4a5f56
SHA2561e19c33b5864cd041c69d499cc1ce24d886ac3f97ec292034fdbda7123c56a80
SHA512ba565c9bd8e580408e6ecb1f7dc0751e6b04fb9ba0a736e133b23908ec4ffbaccf60892355043531cda7a78cea5ccf7cc1405b8964a3dfa09eb6bbc8fc8b6ad3
-
Filesize
280KB
MD52819d7c3a2568b90a7c51c3d432344ef
SHA15c8b5df3ca1019af75010fe4e08b8292d4b0de34
SHA256aeadfc310fabe4b5c2e3d8e3038c5da215e98401b85878ec1f2770b99a74c822
SHA512ce4811850f9a4f0959a643972a2992b4dbcb0f97d0a4a817b352539c13be53039de733fa066626d6230140e8c4f702551636e8abc58b667a396997fc959ca02d
-
Filesize
280KB
MD52819d7c3a2568b90a7c51c3d432344ef
SHA15c8b5df3ca1019af75010fe4e08b8292d4b0de34
SHA256aeadfc310fabe4b5c2e3d8e3038c5da215e98401b85878ec1f2770b99a74c822
SHA512ce4811850f9a4f0959a643972a2992b4dbcb0f97d0a4a817b352539c13be53039de733fa066626d6230140e8c4f702551636e8abc58b667a396997fc959ca02d
-
Filesize
194KB
MD5a7dbf6ffa21f11b684d94679ad22e60f
SHA181da35a65b96d8239724a5ebdf601ff949817dd5
SHA256e8a901db57eaf694984d4dd0260362416a53fca25e4743df52689fc10e1af2ad
SHA5123614de08d424238eefc21da76c229fee6f3bf280e94cebe6fda5a5ae8282ae1f72a245fb65b8e2061e395ca1724dbc111155f2172e9c012c98b7c6b40a60254c
-
Filesize
194KB
MD5a7dbf6ffa21f11b684d94679ad22e60f
SHA181da35a65b96d8239724a5ebdf601ff949817dd5
SHA256e8a901db57eaf694984d4dd0260362416a53fca25e4743df52689fc10e1af2ad
SHA5123614de08d424238eefc21da76c229fee6f3bf280e94cebe6fda5a5ae8282ae1f72a245fb65b8e2061e395ca1724dbc111155f2172e9c012c98b7c6b40a60254c
-
Filesize
145KB
MD5467b44a8797446f4822caa6c2c14c43f
SHA1ebab4517f69360fff885ac28c27803109638041d
SHA2562a9779a14382b296dad065a8532021537768ac4a6c624f0c0f5ae4f2bb792243
SHA5120846af78c81ec30f81bf56cf95cfdca2cbb424a2a8e0a07361e87407ff5c4d6c32cb5b43aa3d3915ac650f819798ef6065c7a1f35f173e1114225997bae4b87a
-
Filesize
145KB
MD5467b44a8797446f4822caa6c2c14c43f
SHA1ebab4517f69360fff885ac28c27803109638041d
SHA2562a9779a14382b296dad065a8532021537768ac4a6c624f0c0f5ae4f2bb792243
SHA5120846af78c81ec30f81bf56cf95cfdca2cbb424a2a8e0a07361e87407ff5c4d6c32cb5b43aa3d3915ac650f819798ef6065c7a1f35f173e1114225997bae4b87a
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc