Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe
Resource
win10v2004-20230220-en
General
-
Target
4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe
-
Size
982KB
-
MD5
b4daf6b2e00c4173da326f57d0f75881
-
SHA1
6ea69bcce0043fcd97d5d0f5d651aa0b4c9d144a
-
SHA256
4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2
-
SHA512
4f2c6dd9bd4dde9003e48ba26f3afd5893d61b9e95f05be8066f96a7718b404b8315be3f8475fcc48fbdc3f789312fc785de739b9123c700d2fb59b2677b4f93
-
SSDEEP
24576:3ydVjrlxQ/pbWuJzQBLyRK+THj2ht3Z3FakfWFT:Cd1fopCuJzQBQHChtJg
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
haval
83.97.73.122:19062
-
auth_value
d23dec6813deb04eb8abd82657a9b0af
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2056 v0435820.exe 3680 v0634330.exe 2256 a3968633.exe 4056 b1402974.exe 1796 c7657968.exe 3120 d8515649.exe 3876 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0435820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0435820.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0634330.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0634330.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2256 set thread context of 1300 2256 a3968633.exe 87 PID 1796 set thread context of 208 1796 c7657968.exe 91 PID 3120 set thread context of 4932 3120 d8515649.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1300 AppLaunch.exe 1300 AppLaunch.exe 4056 b1402974.exe 4056 b1402974.exe 4932 AppLaunch.exe 4932 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1300 AppLaunch.exe Token: SeDebugPrivilege 4056 b1402974.exe Token: SeDebugPrivilege 4932 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2056 2320 4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe 83 PID 2320 wrote to memory of 2056 2320 4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe 83 PID 2320 wrote to memory of 2056 2320 4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe 83 PID 2056 wrote to memory of 3680 2056 v0435820.exe 84 PID 2056 wrote to memory of 3680 2056 v0435820.exe 84 PID 2056 wrote to memory of 3680 2056 v0435820.exe 84 PID 3680 wrote to memory of 2256 3680 v0634330.exe 85 PID 3680 wrote to memory of 2256 3680 v0634330.exe 85 PID 3680 wrote to memory of 2256 3680 v0634330.exe 85 PID 2256 wrote to memory of 1300 2256 a3968633.exe 87 PID 2256 wrote to memory of 1300 2256 a3968633.exe 87 PID 2256 wrote to memory of 1300 2256 a3968633.exe 87 PID 2256 wrote to memory of 1300 2256 a3968633.exe 87 PID 2256 wrote to memory of 1300 2256 a3968633.exe 87 PID 3680 wrote to memory of 4056 3680 v0634330.exe 88 PID 3680 wrote to memory of 4056 3680 v0634330.exe 88 PID 3680 wrote to memory of 4056 3680 v0634330.exe 88 PID 2056 wrote to memory of 1796 2056 v0435820.exe 89 PID 2056 wrote to memory of 1796 2056 v0435820.exe 89 PID 2056 wrote to memory of 1796 2056 v0435820.exe 89 PID 1796 wrote to memory of 208 1796 c7657968.exe 91 PID 1796 wrote to memory of 208 1796 c7657968.exe 91 PID 1796 wrote to memory of 208 1796 c7657968.exe 91 PID 1796 wrote to memory of 208 1796 c7657968.exe 91 PID 1796 wrote to memory of 208 1796 c7657968.exe 91 PID 2320 wrote to memory of 3120 2320 4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe 92 PID 2320 wrote to memory of 3120 2320 4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe 92 PID 2320 wrote to memory of 3120 2320 4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe 92 PID 3120 wrote to memory of 4932 3120 d8515649.exe 94 PID 3120 wrote to memory of 4932 3120 d8515649.exe 94 PID 3120 wrote to memory of 4932 3120 d8515649.exe 94 PID 3120 wrote to memory of 4932 3120 d8515649.exe 94 PID 3120 wrote to memory of 4932 3120 d8515649.exe 94 PID 208 wrote to memory of 3876 208 AppLaunch.exe 95 PID 208 wrote to memory of 3876 208 AppLaunch.exe 95 PID 208 wrote to memory of 3876 208 AppLaunch.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe"C:\Users\Admin\AppData\Local\Temp\4b41890ea834d7a62de6e632b2b90add0d5269b9f76dfe7e742c8905487334b2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0435820.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0435820.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0634330.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0634330.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3968633.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3968633.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1402974.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1402974.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7657968.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7657968.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:3876
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8515649.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8515649.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
328KB
MD5fe4d79c12d3949f152cecb1589c75ff1
SHA1dc2eb85b65164a4a607ad8ca68b6611060ee6e53
SHA256c2054d52dc4ae141ee61ef607443e4441b863783ad01df96f20ca8ea29dd3e60
SHA512a9d4ceff6d975377601396447e819e572c65dc4cbc78ac99f6b85ac685f65bf1013988c602c0be25602f4acb96a08df96613e51654c3bd6cbe13a79c622552e7
-
Filesize
328KB
MD5fe4d79c12d3949f152cecb1589c75ff1
SHA1dc2eb85b65164a4a607ad8ca68b6611060ee6e53
SHA256c2054d52dc4ae141ee61ef607443e4441b863783ad01df96f20ca8ea29dd3e60
SHA512a9d4ceff6d975377601396447e819e572c65dc4cbc78ac99f6b85ac685f65bf1013988c602c0be25602f4acb96a08df96613e51654c3bd6cbe13a79c622552e7
-
Filesize
662KB
MD51aa97bcf50967e9fabb1210b5ec7d139
SHA1b3f10be40c457936f43647ca27225216fa93254e
SHA2566faacdbec5f76d6c031101f123ef89bb4108d46b17149e3f2f85c3f8dc0fa09a
SHA51255eb722d61ed1d917a97e041eb4410fac6f23717b34f1788e6bc25830ea164b220857e3ad04193d028f16200a0e9f76b0fc07779ff7b8ec441dedd2910c785f5
-
Filesize
662KB
MD51aa97bcf50967e9fabb1210b5ec7d139
SHA1b3f10be40c457936f43647ca27225216fa93254e
SHA2566faacdbec5f76d6c031101f123ef89bb4108d46b17149e3f2f85c3f8dc0fa09a
SHA51255eb722d61ed1d917a97e041eb4410fac6f23717b34f1788e6bc25830ea164b220857e3ad04193d028f16200a0e9f76b0fc07779ff7b8ec441dedd2910c785f5
-
Filesize
387KB
MD57363b0d74d71d73b7fe962f3c981fd3b
SHA1bdd825eae1068f2c9cbeb1cbc1263c3bd27fd93c
SHA2561876ea0054e738e0ead5be49f39e415b8c66b89941a19ef0d191f1e48053f4f7
SHA512cc280a07a12b9f8807b2e85be78768996c1adfdf4c1190355e0f53954e48a7d0abce32fe02ed23e45747e9623fe617688bfd29e8bba37ff394d86e172bd285f7
-
Filesize
387KB
MD57363b0d74d71d73b7fe962f3c981fd3b
SHA1bdd825eae1068f2c9cbeb1cbc1263c3bd27fd93c
SHA2561876ea0054e738e0ead5be49f39e415b8c66b89941a19ef0d191f1e48053f4f7
SHA512cc280a07a12b9f8807b2e85be78768996c1adfdf4c1190355e0f53954e48a7d0abce32fe02ed23e45747e9623fe617688bfd29e8bba37ff394d86e172bd285f7
-
Filesize
280KB
MD5d7c0a3724cc81442b756f7cf8a147251
SHA1ec3775d4056ddfbc6d13767d1b07761ba1f1ad03
SHA256dea19857930d4cbb4231fe5dd01b7e1840938f45cf3ea04e2a6af75e258e6a00
SHA512cb728a55b58d8d68b309ebd57e710ccf23b5e06d75b2e3fb4020300153e5e1e338e1dd590e12416c6056ae1ce607f91fbedab2a40aa27660c0a8469e71f254a1
-
Filesize
280KB
MD5d7c0a3724cc81442b756f7cf8a147251
SHA1ec3775d4056ddfbc6d13767d1b07761ba1f1ad03
SHA256dea19857930d4cbb4231fe5dd01b7e1840938f45cf3ea04e2a6af75e258e6a00
SHA512cb728a55b58d8d68b309ebd57e710ccf23b5e06d75b2e3fb4020300153e5e1e338e1dd590e12416c6056ae1ce607f91fbedab2a40aa27660c0a8469e71f254a1
-
Filesize
194KB
MD525f5f663699a9c80fecf57d4eb3bf71a
SHA1afe2ccd036827cb0c2d861e2b713a0c792183e02
SHA2565348875b277002836bbd99a13506f99289e6fb2bca10860cc3776580e1e529f8
SHA5129dc81019510a9b87d83054c0bd26536223cee7cc56af1d28e61943690df94df252ec48a70ac70ac610275a1250ffa09ba46acd6869cbd7457a3632c926eb3cd8
-
Filesize
194KB
MD525f5f663699a9c80fecf57d4eb3bf71a
SHA1afe2ccd036827cb0c2d861e2b713a0c792183e02
SHA2565348875b277002836bbd99a13506f99289e6fb2bca10860cc3776580e1e529f8
SHA5129dc81019510a9b87d83054c0bd26536223cee7cc56af1d28e61943690df94df252ec48a70ac70ac610275a1250ffa09ba46acd6869cbd7457a3632c926eb3cd8
-
Filesize
145KB
MD557c8d6b48fd4898058bdea7d25548cc2
SHA13707c4f8b2991796b003052612ebd49a56bb3ade
SHA256c30769b9f81227661146e47d63ba15e66e953053d015f39c8b8037fe69b54610
SHA512ea27039e69df6a2514162045e2e9bf69bb7f688806c34c50449b201f40265bcd4267a059263c11140c621378e64c3a5ee2921d7f35ab51c6beb26f4d9797f2b7
-
Filesize
145KB
MD557c8d6b48fd4898058bdea7d25548cc2
SHA13707c4f8b2991796b003052612ebd49a56bb3ade
SHA256c30769b9f81227661146e47d63ba15e66e953053d015f39c8b8037fe69b54610
SHA512ea27039e69df6a2514162045e2e9bf69bb7f688806c34c50449b201f40265bcd4267a059263c11140c621378e64c3a5ee2921d7f35ab51c6beb26f4d9797f2b7
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc