Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
30/05/2023, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe
Resource
win10-20230220-en
General
-
Target
c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe
-
Size
1.0MB
-
MD5
3e24666b6deecd9e55015c48ce2d4e5f
-
SHA1
389896b298791bb9730ea3404ef842d8cad60df5
-
SHA256
c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2
-
SHA512
9fee491c80ea954e3ff2b387c05985c41890a8f277841c0d186f948997e6ccd5e31cd2d62ae1c2848a84da853d3942825fdbcbd8cf0607b9aee1e5c3aa6bce63
-
SSDEEP
24576:KyQgnjFgQYV1+pMMqvTxisbPs6dSAf1fPIl:RQcQbcvqbxisbr/tX
Malware Config
Extracted
redline
liza
83.97.73.127:19045
-
auth_value
198e3e9b188d6cfab0a2b0fb100bb7c5
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4220 z4217868.exe 4224 z7892924.exe 1692 o9231348.exe 3672 p0444183.exe 4148 r7897170.exe 4948 s2191400.exe 2064 s2191400.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4217868.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4217868.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7892924.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7892924.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1692 set thread context of 3032 1692 o9231348.exe 70 PID 4148 set thread context of 4072 4148 r7897170.exe 75 PID 4948 set thread context of 2064 4948 s2191400.exe 77 -
Program crash 1 IoCs
pid pid_target Process procid_target 2988 2064 WerFault.exe 77 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3032 AppLaunch.exe 3032 AppLaunch.exe 3672 p0444183.exe 3672 p0444183.exe 4072 AppLaunch.exe 4072 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3032 AppLaunch.exe Token: SeDebugPrivilege 3672 p0444183.exe Token: SeDebugPrivilege 4948 s2191400.exe Token: SeDebugPrivilege 4072 AppLaunch.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4064 wrote to memory of 4220 4064 c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe 66 PID 4064 wrote to memory of 4220 4064 c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe 66 PID 4064 wrote to memory of 4220 4064 c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe 66 PID 4220 wrote to memory of 4224 4220 z4217868.exe 67 PID 4220 wrote to memory of 4224 4220 z4217868.exe 67 PID 4220 wrote to memory of 4224 4220 z4217868.exe 67 PID 4224 wrote to memory of 1692 4224 z7892924.exe 68 PID 4224 wrote to memory of 1692 4224 z7892924.exe 68 PID 4224 wrote to memory of 1692 4224 z7892924.exe 68 PID 1692 wrote to memory of 3032 1692 o9231348.exe 70 PID 1692 wrote to memory of 3032 1692 o9231348.exe 70 PID 1692 wrote to memory of 3032 1692 o9231348.exe 70 PID 1692 wrote to memory of 3032 1692 o9231348.exe 70 PID 1692 wrote to memory of 3032 1692 o9231348.exe 70 PID 4224 wrote to memory of 3672 4224 z7892924.exe 71 PID 4224 wrote to memory of 3672 4224 z7892924.exe 71 PID 4224 wrote to memory of 3672 4224 z7892924.exe 71 PID 4220 wrote to memory of 4148 4220 z4217868.exe 73 PID 4220 wrote to memory of 4148 4220 z4217868.exe 73 PID 4220 wrote to memory of 4148 4220 z4217868.exe 73 PID 4148 wrote to memory of 4072 4148 r7897170.exe 75 PID 4148 wrote to memory of 4072 4148 r7897170.exe 75 PID 4148 wrote to memory of 4072 4148 r7897170.exe 75 PID 4148 wrote to memory of 4072 4148 r7897170.exe 75 PID 4148 wrote to memory of 4072 4148 r7897170.exe 75 PID 4064 wrote to memory of 4948 4064 c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe 76 PID 4064 wrote to memory of 4948 4064 c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe 76 PID 4064 wrote to memory of 4948 4064 c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe 76 PID 4948 wrote to memory of 2064 4948 s2191400.exe 77 PID 4948 wrote to memory of 2064 4948 s2191400.exe 77 PID 4948 wrote to memory of 2064 4948 s2191400.exe 77 PID 4948 wrote to memory of 2064 4948 s2191400.exe 77 PID 4948 wrote to memory of 2064 4948 s2191400.exe 77 PID 4948 wrote to memory of 2064 4948 s2191400.exe 77 PID 4948 wrote to memory of 2064 4948 s2191400.exe 77 PID 4948 wrote to memory of 2064 4948 s2191400.exe 77 PID 4948 wrote to memory of 2064 4948 s2191400.exe 77 PID 4948 wrote to memory of 2064 4948 s2191400.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe"C:\Users\Admin\AppData\Local\Temp\c4f46f5320c7df73f5e2775de8e37657ec7c7e33dfa116b9f332e9fb9e01d6c2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4217868.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4217868.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7892924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7892924.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9231348.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9231348.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0444183.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0444183.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7897170.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7897170.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2191400.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2191400.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2191400.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2191400.exe3⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 244⤵
- Program crash
PID:2988
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
964KB
MD5cc13ff4e24d4c8441c3077086ece7e83
SHA1091d92be97b9a0b7498f053f18fe82f21e690f57
SHA2566824d06b528bb67421e6c4c82609392c687a0ce39df1c8cf76383dad368986c5
SHA512cf2bcdb447576afd585b3b4fa66fc00a5ba2f7d06af3e49e6c57c3cf70b9e574db029894a073e47024c9e4f8fde221f54251bcf0796aa2f979c45dee6be94137
-
Filesize
964KB
MD5cc13ff4e24d4c8441c3077086ece7e83
SHA1091d92be97b9a0b7498f053f18fe82f21e690f57
SHA2566824d06b528bb67421e6c4c82609392c687a0ce39df1c8cf76383dad368986c5
SHA512cf2bcdb447576afd585b3b4fa66fc00a5ba2f7d06af3e49e6c57c3cf70b9e574db029894a073e47024c9e4f8fde221f54251bcf0796aa2f979c45dee6be94137
-
Filesize
964KB
MD5cc13ff4e24d4c8441c3077086ece7e83
SHA1091d92be97b9a0b7498f053f18fe82f21e690f57
SHA2566824d06b528bb67421e6c4c82609392c687a0ce39df1c8cf76383dad368986c5
SHA512cf2bcdb447576afd585b3b4fa66fc00a5ba2f7d06af3e49e6c57c3cf70b9e574db029894a073e47024c9e4f8fde221f54251bcf0796aa2f979c45dee6be94137
-
Filesize
581KB
MD52d8ac8ab360b2470df0c79792a36cebf
SHA1be472a47a692805552964a7a5d22cfac1a769f6e
SHA256a1351a4cbf3c8b1d8ed3c523d6ee9b50c6f144d03e8c97a7f0564ed98827b6de
SHA512f827916dde95b5202eaab318d3094bbbdae27c5e59c720a2d84e5d16d6353cbf36d1dfcf5334063d1a6e6b6c3e5cc28bca2e4ca193a9125e30daeccb8374c1ac
-
Filesize
581KB
MD52d8ac8ab360b2470df0c79792a36cebf
SHA1be472a47a692805552964a7a5d22cfac1a769f6e
SHA256a1351a4cbf3c8b1d8ed3c523d6ee9b50c6f144d03e8c97a7f0564ed98827b6de
SHA512f827916dde95b5202eaab318d3094bbbdae27c5e59c720a2d84e5d16d6353cbf36d1dfcf5334063d1a6e6b6c3e5cc28bca2e4ca193a9125e30daeccb8374c1ac
-
Filesize
327KB
MD5ee85eb8fdd4911f5a57c53550734f3bd
SHA1d5113fcc1e88a8455ce1ce6ef3c5bf3b8a973dcd
SHA2561e7e4065e5ad94ec3d6489ad2e854fc2b62a2487d60fc2d5c4e0180353aa10fc
SHA512ad8c0be5b4de101ae9866abbf11eb9ea0f3858291266b5e4f788c221e3bfc48662a4edb5be1cc99ff28739552638b65eb53725abfe3ea510b40db835a8deffb4
-
Filesize
327KB
MD5ee85eb8fdd4911f5a57c53550734f3bd
SHA1d5113fcc1e88a8455ce1ce6ef3c5bf3b8a973dcd
SHA2561e7e4065e5ad94ec3d6489ad2e854fc2b62a2487d60fc2d5c4e0180353aa10fc
SHA512ad8c0be5b4de101ae9866abbf11eb9ea0f3858291266b5e4f788c221e3bfc48662a4edb5be1cc99ff28739552638b65eb53725abfe3ea510b40db835a8deffb4
-
Filesize
281KB
MD5da7235d17f660b05959f3dd52a58269c
SHA18961957c47f2252a510e9a2b1271f3aa0d464940
SHA256a3f2061479e4beed46d35bb122a31e7142a0dc9177c78b27951ea1142b77034d
SHA51268a77d8bcf1760a8fd46d0992be239498019f9d1e9760823f4fee436d4d7c33ce63ceb88e6e9592a35e32c4587d1d4f336b8caf95cbf023f9b942fdfda04f994
-
Filesize
281KB
MD5da7235d17f660b05959f3dd52a58269c
SHA18961957c47f2252a510e9a2b1271f3aa0d464940
SHA256a3f2061479e4beed46d35bb122a31e7142a0dc9177c78b27951ea1142b77034d
SHA51268a77d8bcf1760a8fd46d0992be239498019f9d1e9760823f4fee436d4d7c33ce63ceb88e6e9592a35e32c4587d1d4f336b8caf95cbf023f9b942fdfda04f994
-
Filesize
169KB
MD5dd7cecf689e6063482615de1af73df9b
SHA1f69ecaaad1aea385176fe63441c97907b4651aaf
SHA256c59c3b2a96ce004b543b4da5f901b5c374d77aa969ef0894d90cbf503410f6b9
SHA5124853dcb444c6b1c3d30ad6bf68f83edb36001f62c3a14aa67d4b2bec47759a580f942397e70dcaf44e9d0bf0e93637dac26e370b1e3d2962e23aa847f8a68b35
-
Filesize
169KB
MD5dd7cecf689e6063482615de1af73df9b
SHA1f69ecaaad1aea385176fe63441c97907b4651aaf
SHA256c59c3b2a96ce004b543b4da5f901b5c374d77aa969ef0894d90cbf503410f6b9
SHA5124853dcb444c6b1c3d30ad6bf68f83edb36001f62c3a14aa67d4b2bec47759a580f942397e70dcaf44e9d0bf0e93637dac26e370b1e3d2962e23aa847f8a68b35
-
Filesize
168KB
MD59e14afbfcd0d2ba454ea1d9f9b950c3b
SHA1cb4f243ba0961b0333e54f56ff52570ebd2d2c2f
SHA2561c826c3d47742e60f09b9817f3762efb55461a77d8fb9f9756b6aa3ea3051941
SHA512abf33cb56a0d56a856d7f3082e5eb801a710d9a4f41fb8e006484d411ae29f764b49351cd75c4e76d6696bd63d165689dc77dda3f9f2524667764c2b0da0726e
-
Filesize
168KB
MD59e14afbfcd0d2ba454ea1d9f9b950c3b
SHA1cb4f243ba0961b0333e54f56ff52570ebd2d2c2f
SHA2561c826c3d47742e60f09b9817f3762efb55461a77d8fb9f9756b6aa3ea3051941
SHA512abf33cb56a0d56a856d7f3082e5eb801a710d9a4f41fb8e006484d411ae29f764b49351cd75c4e76d6696bd63d165689dc77dda3f9f2524667764c2b0da0726e