Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/05/2023, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe
Resource
win10-20230220-en
General
-
Target
5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe
-
Size
983KB
-
MD5
bdefa1b937fc3af328eb0f4ebbe9e90d
-
SHA1
c328d56c7cf0ca1086a7c804ad7715fb31baa866
-
SHA256
5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693
-
SHA512
bd62f337206ec902b1ac016d891c2cd73c4c753f7287ed06b0357e4d979221c089b5901e5655c5734a91d3f340c066c11651921646c9ec8798842235a349b692
-
SSDEEP
24576:hy5GupUBytPtnoITkADh+duWb5FjkfLnyu:UTvJoAkyhgb7
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
haval
83.97.73.122:19062
-
auth_value
d23dec6813deb04eb8abd82657a9b0af
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 5048 v9477797.exe 3560 v7780836.exe 4556 a8413398.exe 3096 b9104391.exe 5000 c3450585.exe 4424 d5336092.exe 4620 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9477797.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9477797.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7780836.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7780836.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4556 set thread context of 4748 4556 a8413398.exe 70 PID 5000 set thread context of 4104 5000 c3450585.exe 75 PID 4424 set thread context of 1332 4424 d5336092.exe 78 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4748 AppLaunch.exe 4748 AppLaunch.exe 3096 b9104391.exe 3096 b9104391.exe 1332 AppLaunch.exe 1332 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4748 AppLaunch.exe Token: SeDebugPrivilege 3096 b9104391.exe Token: SeDebugPrivilege 1332 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4104 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4452 wrote to memory of 5048 4452 5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe 66 PID 4452 wrote to memory of 5048 4452 5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe 66 PID 4452 wrote to memory of 5048 4452 5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe 66 PID 5048 wrote to memory of 3560 5048 v9477797.exe 67 PID 5048 wrote to memory of 3560 5048 v9477797.exe 67 PID 5048 wrote to memory of 3560 5048 v9477797.exe 67 PID 3560 wrote to memory of 4556 3560 v7780836.exe 68 PID 3560 wrote to memory of 4556 3560 v7780836.exe 68 PID 3560 wrote to memory of 4556 3560 v7780836.exe 68 PID 4556 wrote to memory of 4748 4556 a8413398.exe 70 PID 4556 wrote to memory of 4748 4556 a8413398.exe 70 PID 4556 wrote to memory of 4748 4556 a8413398.exe 70 PID 4556 wrote to memory of 4748 4556 a8413398.exe 70 PID 4556 wrote to memory of 4748 4556 a8413398.exe 70 PID 3560 wrote to memory of 3096 3560 v7780836.exe 71 PID 3560 wrote to memory of 3096 3560 v7780836.exe 71 PID 3560 wrote to memory of 3096 3560 v7780836.exe 71 PID 5048 wrote to memory of 5000 5048 v9477797.exe 73 PID 5048 wrote to memory of 5000 5048 v9477797.exe 73 PID 5048 wrote to memory of 5000 5048 v9477797.exe 73 PID 5000 wrote to memory of 4104 5000 c3450585.exe 75 PID 5000 wrote to memory of 4104 5000 c3450585.exe 75 PID 5000 wrote to memory of 4104 5000 c3450585.exe 75 PID 5000 wrote to memory of 4104 5000 c3450585.exe 75 PID 5000 wrote to memory of 4104 5000 c3450585.exe 75 PID 4452 wrote to memory of 4424 4452 5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe 76 PID 4452 wrote to memory of 4424 4452 5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe 76 PID 4452 wrote to memory of 4424 4452 5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe 76 PID 4424 wrote to memory of 1332 4424 d5336092.exe 78 PID 4424 wrote to memory of 1332 4424 d5336092.exe 78 PID 4424 wrote to memory of 1332 4424 d5336092.exe 78 PID 4424 wrote to memory of 1332 4424 d5336092.exe 78 PID 4424 wrote to memory of 1332 4424 d5336092.exe 78 PID 4104 wrote to memory of 4620 4104 AppLaunch.exe 79 PID 4104 wrote to memory of 4620 4104 AppLaunch.exe 79 PID 4104 wrote to memory of 4620 4104 AppLaunch.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe"C:\Users\Admin\AppData\Local\Temp\5be4ecd466ac4bc944da3169a55f0131d09ad6e2aff2df00a813595411df3693.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9477797.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9477797.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7780836.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7780836.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8413398.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8413398.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9104391.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9104391.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3450585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3450585.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:4620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5336092.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5336092.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
328KB
MD5b4a2d38338cdfbef1a4d6c0231157d3c
SHA16e0aa375ab2d9602bb9dbc385cb3fbc64257a351
SHA25628554c78ee12a01c6e18fc1b19d7035e92409e517662a5f46b33bebd4adf66aa
SHA512698de6a32c628c2fd323ba6546b60017e4f259881162deae8cfe8942152e45943159e3e8c44bb87b2d253a20af89d47f8b00d40eaee66073b341e37d11c5abe5
-
Filesize
328KB
MD5b4a2d38338cdfbef1a4d6c0231157d3c
SHA16e0aa375ab2d9602bb9dbc385cb3fbc64257a351
SHA25628554c78ee12a01c6e18fc1b19d7035e92409e517662a5f46b33bebd4adf66aa
SHA512698de6a32c628c2fd323ba6546b60017e4f259881162deae8cfe8942152e45943159e3e8c44bb87b2d253a20af89d47f8b00d40eaee66073b341e37d11c5abe5
-
Filesize
661KB
MD5ecfb9e61f622e9fc1be556b92c9184b9
SHA1808e6257fe63ca3f791cfbed67489902b95861c5
SHA256139db3a6503b0dd1d935eb8cb3f96e9e805d1ef861f5f7acfea363ecbd3717e9
SHA512aaf2bec7424d7b0f546bad90a41fcfa5aebf8a624847a178e5a7beadda5b017a9d2eba9d069e3b66f85bc5100c1477064b1e50c92e33be2bba3031822266904d
-
Filesize
661KB
MD5ecfb9e61f622e9fc1be556b92c9184b9
SHA1808e6257fe63ca3f791cfbed67489902b95861c5
SHA256139db3a6503b0dd1d935eb8cb3f96e9e805d1ef861f5f7acfea363ecbd3717e9
SHA512aaf2bec7424d7b0f546bad90a41fcfa5aebf8a624847a178e5a7beadda5b017a9d2eba9d069e3b66f85bc5100c1477064b1e50c92e33be2bba3031822266904d
-
Filesize
388KB
MD5808461358a8761a7b0fb0cdc37438b95
SHA1e01c4bb4a36e49de7de06a73c8f04f6ecd752529
SHA256602b5091bb0a1bfc3be1b5efa397493af576f93e8b08433989491d11e2d898d9
SHA512a94b8ab15222bb50ecd32abdc45c1519c6f2941e42186c50a2e7b184d3e05d117850fe26833dac707c46f30d4182a7c58942c929ff3f4ca2c4c2f54c352239de
-
Filesize
388KB
MD5808461358a8761a7b0fb0cdc37438b95
SHA1e01c4bb4a36e49de7de06a73c8f04f6ecd752529
SHA256602b5091bb0a1bfc3be1b5efa397493af576f93e8b08433989491d11e2d898d9
SHA512a94b8ab15222bb50ecd32abdc45c1519c6f2941e42186c50a2e7b184d3e05d117850fe26833dac707c46f30d4182a7c58942c929ff3f4ca2c4c2f54c352239de
-
Filesize
280KB
MD5dd296c5511e9c3421dbc7b414575cb7d
SHA1b16b83a9fca57b4650896abce0767b331d76df31
SHA25619c7794d880b986fd65ff70245f7c5ade2893f9257317c24fd9be3d0b2ed8db8
SHA512444725a50c3cf120e56cc32d4eeb85a8a1eae78fb37754a70fbef6ef47d77b8864299976699181f7cc09fffb8d447276d94d6e108e08a84547cd0eb6da6f4dcb
-
Filesize
280KB
MD5dd296c5511e9c3421dbc7b414575cb7d
SHA1b16b83a9fca57b4650896abce0767b331d76df31
SHA25619c7794d880b986fd65ff70245f7c5ade2893f9257317c24fd9be3d0b2ed8db8
SHA512444725a50c3cf120e56cc32d4eeb85a8a1eae78fb37754a70fbef6ef47d77b8864299976699181f7cc09fffb8d447276d94d6e108e08a84547cd0eb6da6f4dcb
-
Filesize
194KB
MD51402bfcec119800f6de841e6451952c4
SHA1be3626ba794ad5707888ae447eb96d62c52d22d2
SHA256891ac320ca141290a986bb7edf82e8425a3a6ec1eea3dcf2ed8be5db5eea3abc
SHA5121eeb6b3e0377620f175db028d4358765eb981a2dfe24c9572e9d853e82a5fd29af299a1871763e75ab62d623e95710b63c381140c492e5aacc05e328e281d56d
-
Filesize
194KB
MD51402bfcec119800f6de841e6451952c4
SHA1be3626ba794ad5707888ae447eb96d62c52d22d2
SHA256891ac320ca141290a986bb7edf82e8425a3a6ec1eea3dcf2ed8be5db5eea3abc
SHA5121eeb6b3e0377620f175db028d4358765eb981a2dfe24c9572e9d853e82a5fd29af299a1871763e75ab62d623e95710b63c381140c492e5aacc05e328e281d56d
-
Filesize
145KB
MD5afa80958b93909da7cda3b3603e4f563
SHA1ac1f1177699785388b8c1411c3c15e8c6c1fa1e9
SHA256e2c5f170c0f4ada4e0b14300b6d116c1c086da54b43017616abc0d5e560e3906
SHA5124e1540383ad9fa964970ce2f8b00d2bf4dd0847f82a0ee295a51b31ec16aca4a3d5ecb6848e3614ce42c40dc6a359f8f374c9df7392b6651b9bb88c47b25b5be
-
Filesize
145KB
MD5afa80958b93909da7cda3b3603e4f563
SHA1ac1f1177699785388b8c1411c3c15e8c6c1fa1e9
SHA256e2c5f170c0f4ada4e0b14300b6d116c1c086da54b43017616abc0d5e560e3906
SHA5124e1540383ad9fa964970ce2f8b00d2bf4dd0847f82a0ee295a51b31ec16aca4a3d5ecb6848e3614ce42c40dc6a359f8f374c9df7392b6651b9bb88c47b25b5be
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4