Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/05/2023, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
6bf4e6d596ed0c41732633c83e2241afb32e9cff426df3b8fc0801ae49e2d6c5.exe
Resource
win10-20230220-en
General
-
Target
6bf4e6d596ed0c41732633c83e2241afb32e9cff426df3b8fc0801ae49e2d6c5.exe
-
Size
767KB
-
MD5
d08d676a65ed68fc37a910f69eafc970
-
SHA1
80777e40806a2fe8fc9c7b442179acff8b051d5b
-
SHA256
6bf4e6d596ed0c41732633c83e2241afb32e9cff426df3b8fc0801ae49e2d6c5
-
SHA512
2abb353a67fda44179785b2f6c4a2c165c0661ab06c28391f2efaeaf34e66c2e83fb566f665d8dc7c045b098cd4add44c7dda7d941266244b2cc5cfc7f0b7b86
-
SSDEEP
12288:kMrKy90tZELCu/9wmqlYbeelEkEhESAtCh4t2pCOp/Sfnv+P3m+f3avaw4WhE88H:uyyZ6999qmbZFSWCqtw/Sfnvc2+PTw4p
Malware Config
Extracted
redline
mina
83.97.73.122:19062
-
auth_value
3d04bf4b8ba2a11c4dcf9df0e388fa05
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2504 v5435962.exe 2960 v7972180.exe 3896 a1948464.exe 4120 b0954682.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5435962.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7972180.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7972180.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6bf4e6d596ed0c41732633c83e2241afb32e9cff426df3b8fc0801ae49e2d6c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6bf4e6d596ed0c41732633c83e2241afb32e9cff426df3b8fc0801ae49e2d6c5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5435962.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3896 set thread context of 4388 3896 a1948464.exe 70 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4388 AppLaunch.exe 4388 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4388 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2504 2468 6bf4e6d596ed0c41732633c83e2241afb32e9cff426df3b8fc0801ae49e2d6c5.exe 66 PID 2468 wrote to memory of 2504 2468 6bf4e6d596ed0c41732633c83e2241afb32e9cff426df3b8fc0801ae49e2d6c5.exe 66 PID 2468 wrote to memory of 2504 2468 6bf4e6d596ed0c41732633c83e2241afb32e9cff426df3b8fc0801ae49e2d6c5.exe 66 PID 2504 wrote to memory of 2960 2504 v5435962.exe 67 PID 2504 wrote to memory of 2960 2504 v5435962.exe 67 PID 2504 wrote to memory of 2960 2504 v5435962.exe 67 PID 2960 wrote to memory of 3896 2960 v7972180.exe 68 PID 2960 wrote to memory of 3896 2960 v7972180.exe 68 PID 2960 wrote to memory of 3896 2960 v7972180.exe 68 PID 3896 wrote to memory of 4388 3896 a1948464.exe 70 PID 3896 wrote to memory of 4388 3896 a1948464.exe 70 PID 3896 wrote to memory of 4388 3896 a1948464.exe 70 PID 3896 wrote to memory of 4388 3896 a1948464.exe 70 PID 3896 wrote to memory of 4388 3896 a1948464.exe 70 PID 2960 wrote to memory of 4120 2960 v7972180.exe 71 PID 2960 wrote to memory of 4120 2960 v7972180.exe 71 PID 2960 wrote to memory of 4120 2960 v7972180.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bf4e6d596ed0c41732633c83e2241afb32e9cff426df3b8fc0801ae49e2d6c5.exe"C:\Users\Admin\AppData\Local\Temp\6bf4e6d596ed0c41732633c83e2241afb32e9cff426df3b8fc0801ae49e2d6c5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5435962.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5435962.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7972180.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7972180.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1948464.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1948464.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0954682.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0954682.exe4⤵
- Executes dropped EXE
PID:4120
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449KB
MD581a4a76f870dbfc44b13b33ea8380a6b
SHA132ccf8293c46519e7d964182c5d27b05ebf381c2
SHA2569504fbb2bcd43d0633c4b41324b96805363e48a392873155c65d9faef3d92a73
SHA512971a0cb2685e9383b1b5126592d65475cd0272281e18a7b983b73612253b3be5b89052968354b027bbd30db0c9142f8fbabcd2acb48e25cc95c4dd04fc641312
-
Filesize
449KB
MD581a4a76f870dbfc44b13b33ea8380a6b
SHA132ccf8293c46519e7d964182c5d27b05ebf381c2
SHA2569504fbb2bcd43d0633c4b41324b96805363e48a392873155c65d9faef3d92a73
SHA512971a0cb2685e9383b1b5126592d65475cd0272281e18a7b983b73612253b3be5b89052968354b027bbd30db0c9142f8fbabcd2acb48e25cc95c4dd04fc641312
-
Filesize
277KB
MD52e2dd0971611c1185b6ca6402995b11a
SHA1e87be53e319c6a2cc9901f90751625ad5144a1cf
SHA256066a6e062245679605b0fcaf47ce091eae62acf932c68a085d521c43a34f7a45
SHA512d30ab0afbeb246f97c0e78f141df0973778bcf5af3a83bc35017b93eaa68f68ac72181682831e66c0be582f1d7a5677b318a04c3d8d71279c435a195bab7a445
-
Filesize
277KB
MD52e2dd0971611c1185b6ca6402995b11a
SHA1e87be53e319c6a2cc9901f90751625ad5144a1cf
SHA256066a6e062245679605b0fcaf47ce091eae62acf932c68a085d521c43a34f7a45
SHA512d30ab0afbeb246f97c0e78f141df0973778bcf5af3a83bc35017b93eaa68f68ac72181682831e66c0be582f1d7a5677b318a04c3d8d71279c435a195bab7a445
-
Filesize
188KB
MD575e984ced00166665f5d2caf79637eeb
SHA1823ed38855506813b5167e8069fc542c14518341
SHA256b01675fedca60ffb5b2f341621827964f55323e93450c86f333e153203fde6fc
SHA5120ba0ac2cc6b590af3776f4deffb4751806d529a6487677a201babd5bce17c2ca247283a357a2e367181cc700dccff78f635f2d4cfa57c64444594526ee57b9c5
-
Filesize
188KB
MD575e984ced00166665f5d2caf79637eeb
SHA1823ed38855506813b5167e8069fc542c14518341
SHA256b01675fedca60ffb5b2f341621827964f55323e93450c86f333e153203fde6fc
SHA5120ba0ac2cc6b590af3776f4deffb4751806d529a6487677a201babd5bce17c2ca247283a357a2e367181cc700dccff78f635f2d4cfa57c64444594526ee57b9c5
-
Filesize
145KB
MD5f6a634bdd2a53e622fcc2a2aa803a02d
SHA14a9b1e64e51fd140687ce83b0610b3cff4d03109
SHA25655603ae50b4aa48bbb19bb56c46d5798dfef08022dfc3458e1a5873b7609f558
SHA5127c372646e377117b342bf38fd358730fbaceb50aaa40b6fdf2ef738842389bfeb81f635a4c65655cae1ff8f40150ec76505b57669ecbe6097aa987db685ce59f
-
Filesize
145KB
MD5f6a634bdd2a53e622fcc2a2aa803a02d
SHA14a9b1e64e51fd140687ce83b0610b3cff4d03109
SHA25655603ae50b4aa48bbb19bb56c46d5798dfef08022dfc3458e1a5873b7609f558
SHA5127c372646e377117b342bf38fd358730fbaceb50aaa40b6fdf2ef738842389bfeb81f635a4c65655cae1ff8f40150ec76505b57669ecbe6097aa987db685ce59f