Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
69s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/05/2023, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe
Resource
win10-20230220-en
General
-
Target
e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe
-
Size
1.0MB
-
MD5
1c2d5d984a07cf27da1313052de90d4d
-
SHA1
a48d6c3445b0aa614dbe4693be7998f6ed2023d4
-
SHA256
e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5
-
SHA512
524b835092b63f95174233762fa749fdd08cfc4681687f6050effdc103f98e730139f0d092beaadc80fe620107b56c0ce75f547c93e90843b96222aa188d9809
-
SSDEEP
24576:vycNulu/rvuY3Upj0puMKJwk+tz9msP4VdQ0DffO:6A/rvuLpj02EJUsP4T
Malware Config
Extracted
redline
mina
83.97.73.122:19062
-
auth_value
3d04bf4b8ba2a11c4dcf9df0e388fa05
Extracted
redline
fash
83.97.73.122:19062
-
auth_value
dd7165bcd22b0ed3df426d944e12f136
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2520 v1442483.exe 2616 v5692195.exe 4132 a1534779.exe 1436 b5421905.exe 5060 c0848500.exe 3228 c0848500.exe 5056 d5895893.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5692195.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1442483.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1442483.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5692195.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4132 set thread context of 2088 4132 a1534779.exe 70 PID 5060 set thread context of 3228 5060 c0848500.exe 74 PID 5056 set thread context of 776 5056 d5895893.exe 79 -
Program crash 1 IoCs
pid pid_target Process procid_target 760 3228 WerFault.exe 74 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2088 AppLaunch.exe 2088 AppLaunch.exe 1436 b5421905.exe 1436 b5421905.exe 776 AppLaunch.exe 776 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2088 AppLaunch.exe Token: SeDebugPrivilege 1436 b5421905.exe Token: SeDebugPrivilege 5060 c0848500.exe Token: SeDebugPrivilege 776 AppLaunch.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2520 2268 e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe 66 PID 2268 wrote to memory of 2520 2268 e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe 66 PID 2268 wrote to memory of 2520 2268 e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe 66 PID 2520 wrote to memory of 2616 2520 v1442483.exe 67 PID 2520 wrote to memory of 2616 2520 v1442483.exe 67 PID 2520 wrote to memory of 2616 2520 v1442483.exe 67 PID 2616 wrote to memory of 4132 2616 v5692195.exe 68 PID 2616 wrote to memory of 4132 2616 v5692195.exe 68 PID 2616 wrote to memory of 4132 2616 v5692195.exe 68 PID 4132 wrote to memory of 2088 4132 a1534779.exe 70 PID 4132 wrote to memory of 2088 4132 a1534779.exe 70 PID 4132 wrote to memory of 2088 4132 a1534779.exe 70 PID 4132 wrote to memory of 2088 4132 a1534779.exe 70 PID 4132 wrote to memory of 2088 4132 a1534779.exe 70 PID 2616 wrote to memory of 1436 2616 v5692195.exe 71 PID 2616 wrote to memory of 1436 2616 v5692195.exe 71 PID 2616 wrote to memory of 1436 2616 v5692195.exe 71 PID 2520 wrote to memory of 5060 2520 v1442483.exe 73 PID 2520 wrote to memory of 5060 2520 v1442483.exe 73 PID 2520 wrote to memory of 5060 2520 v1442483.exe 73 PID 5060 wrote to memory of 3228 5060 c0848500.exe 74 PID 5060 wrote to memory of 3228 5060 c0848500.exe 74 PID 5060 wrote to memory of 3228 5060 c0848500.exe 74 PID 5060 wrote to memory of 3228 5060 c0848500.exe 74 PID 5060 wrote to memory of 3228 5060 c0848500.exe 74 PID 5060 wrote to memory of 3228 5060 c0848500.exe 74 PID 5060 wrote to memory of 3228 5060 c0848500.exe 74 PID 5060 wrote to memory of 3228 5060 c0848500.exe 74 PID 5060 wrote to memory of 3228 5060 c0848500.exe 74 PID 5060 wrote to memory of 3228 5060 c0848500.exe 74 PID 2268 wrote to memory of 5056 2268 e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe 76 PID 2268 wrote to memory of 5056 2268 e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe 76 PID 2268 wrote to memory of 5056 2268 e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe 76 PID 5056 wrote to memory of 776 5056 d5895893.exe 79 PID 5056 wrote to memory of 776 5056 d5895893.exe 79 PID 5056 wrote to memory of 776 5056 d5895893.exe 79 PID 5056 wrote to memory of 776 5056 d5895893.exe 79 PID 5056 wrote to memory of 776 5056 d5895893.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe"C:\Users\Admin\AppData\Local\Temp\e48ef93bda259ca469f78ac8959deb6faddadd5322db82468240a914794dfcb5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1442483.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1442483.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5692195.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5692195.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1534779.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1534779.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5421905.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5421905.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0848500.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0848500.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0848500.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0848500.exe4⤵
- Executes dropped EXE
PID:3228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 245⤵
- Program crash
PID:760
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5895893.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5895893.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
328KB
MD5909528dd4aa5c7001a8224061afa5a1d
SHA1f23306d422974af5fd374eef26f192903fd53612
SHA2561a9c3d51351f20aa754afb9a9ad79578f47d9e71314602286048300682c662c9
SHA512b7460ad9fcaa110dde27a4b587ec65fa4c6791b312f1da0cfa054e76e6c42ae20782c24cbae7833330c0d8ca0caae2067fd3271baf58e1eaa8a04b19e4125d8f
-
Filesize
328KB
MD5909528dd4aa5c7001a8224061afa5a1d
SHA1f23306d422974af5fd374eef26f192903fd53612
SHA2561a9c3d51351f20aa754afb9a9ad79578f47d9e71314602286048300682c662c9
SHA512b7460ad9fcaa110dde27a4b587ec65fa4c6791b312f1da0cfa054e76e6c42ae20782c24cbae7833330c0d8ca0caae2067fd3271baf58e1eaa8a04b19e4125d8f
-
Filesize
723KB
MD56817b7bdb35a040d13927a92950a256e
SHA13c853c1dd1e13aad2a1a16bd8ed72f41a64e2380
SHA256dc49017db66f1b39c99ebab626f86a997c357d33eed00704ab982ce4ad851537
SHA512a1c40120312397b217d3162d40f512eecdd7ac1c2e0812563c1938661876286cec55d69130311480e8333304635b7919fb22b6ef35d42de6f6744d561b85c9d9
-
Filesize
723KB
MD56817b7bdb35a040d13927a92950a256e
SHA13c853c1dd1e13aad2a1a16bd8ed72f41a64e2380
SHA256dc49017db66f1b39c99ebab626f86a997c357d33eed00704ab982ce4ad851537
SHA512a1c40120312397b217d3162d40f512eecdd7ac1c2e0812563c1938661876286cec55d69130311480e8333304635b7919fb22b6ef35d42de6f6744d561b85c9d9
-
Filesize
963KB
MD53f644846135caaec5315a2d45b11e76b
SHA1d6c6fa27e14a7800c4d2671118d0bcf6da5082fe
SHA256d3f31803e2908ab8793170ad2efe89591fae9120cf3c39ccb66092cd7fabe597
SHA512bcb68bbdc1e044c05ce88d0a70429f10df455cc261ec538e23ff5aae0673d622eb1e695324e2068cd6bcc6c0a1cc709691e3d498067cb00b2cb1e556626db1d2
-
Filesize
963KB
MD53f644846135caaec5315a2d45b11e76b
SHA1d6c6fa27e14a7800c4d2671118d0bcf6da5082fe
SHA256d3f31803e2908ab8793170ad2efe89591fae9120cf3c39ccb66092cd7fabe597
SHA512bcb68bbdc1e044c05ce88d0a70429f10df455cc261ec538e23ff5aae0673d622eb1e695324e2068cd6bcc6c0a1cc709691e3d498067cb00b2cb1e556626db1d2
-
Filesize
963KB
MD53f644846135caaec5315a2d45b11e76b
SHA1d6c6fa27e14a7800c4d2671118d0bcf6da5082fe
SHA256d3f31803e2908ab8793170ad2efe89591fae9120cf3c39ccb66092cd7fabe597
SHA512bcb68bbdc1e044c05ce88d0a70429f10df455cc261ec538e23ff5aae0673d622eb1e695324e2068cd6bcc6c0a1cc709691e3d498067cb00b2cb1e556626db1d2
-
Filesize
280KB
MD54bfa4c1ad2128b38d45c26d71fd4313d
SHA1cd2da710cd2daa70dc52e2169a8fdcd1e4b8591c
SHA256f5a7c4b4f85b70822a716d6800dd8271cd613d9cd874023036925fc69e4dbe2c
SHA512c0ded18461dabcf37b6a52e1600b2b43a5f96f9625e20d9df8bc53c8f2b7984f4c043c6bb9085cb19862191a852fba33b580aa35419c8ce039cddf34f2c0c733
-
Filesize
280KB
MD54bfa4c1ad2128b38d45c26d71fd4313d
SHA1cd2da710cd2daa70dc52e2169a8fdcd1e4b8591c
SHA256f5a7c4b4f85b70822a716d6800dd8271cd613d9cd874023036925fc69e4dbe2c
SHA512c0ded18461dabcf37b6a52e1600b2b43a5f96f9625e20d9df8bc53c8f2b7984f4c043c6bb9085cb19862191a852fba33b580aa35419c8ce039cddf34f2c0c733
-
Filesize
194KB
MD55a4e2319dc4287b36810a2458f968ccb
SHA1eb9c5106fd617d372ee7be67b978c488bbab18e6
SHA256ae18031029c688d4fcd69ee2ad3de4999325926b3c570f80e0b0b107093cc840
SHA51242379394a79d9920f8ff2d53873e99480a1e1740e307d1c41828b14fc13627da0c33a6fc56f84033fecec6032fd21e7103e2bb579a66a7423752ab2af7eb63e2
-
Filesize
194KB
MD55a4e2319dc4287b36810a2458f968ccb
SHA1eb9c5106fd617d372ee7be67b978c488bbab18e6
SHA256ae18031029c688d4fcd69ee2ad3de4999325926b3c570f80e0b0b107093cc840
SHA51242379394a79d9920f8ff2d53873e99480a1e1740e307d1c41828b14fc13627da0c33a6fc56f84033fecec6032fd21e7103e2bb579a66a7423752ab2af7eb63e2
-
Filesize
145KB
MD52d9bfb376c35f000c6d42ce7aa172c8a
SHA1ea7579bb06f7861130c71a13820531a95e560674
SHA25607867d9baed5fbb869ef6cca856720c6a81d92d51f92035c6d22a715a4b721ab
SHA512c2c16f8070073a675b7080f63937a738e59020e01ec1b2f6552996f3850e5cf4259cd700a9467a3813eb70c144f24b757de261cc7d5d6cfa6fbe65ccc93e7e3d
-
Filesize
145KB
MD52d9bfb376c35f000c6d42ce7aa172c8a
SHA1ea7579bb06f7861130c71a13820531a95e560674
SHA25607867d9baed5fbb869ef6cca856720c6a81d92d51f92035c6d22a715a4b721ab
SHA512c2c16f8070073a675b7080f63937a738e59020e01ec1b2f6552996f3850e5cf4259cd700a9467a3813eb70c144f24b757de261cc7d5d6cfa6fbe65ccc93e7e3d