Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2023, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe
Resource
win10v2004-20230220-en
General
-
Target
26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe
-
Size
1.0MB
-
MD5
01668bc1e0c7fdb0b3c628f4e4e07599
-
SHA1
ff708006fa9b4f251dea09baf9561baf0dabaa39
-
SHA256
26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654
-
SHA512
40ae1af87df2377812d7ef4f8bdfe082b84176e2c49fe4090a122911e942ca1d50a831da7159d5ccae792af7a99a1bc49db2f3218024a7cc9d74d4c4e727a8bb
-
SSDEEP
24576:Pyk35iYqJy8D+jKxx51wRgSN8izSv0aPLDuD:ak3IFJyZKx/1wRgSyicz
Malware Config
Extracted
redline
lusa
83.97.73.126:19046
-
auth_value
c9df946711e01c378b42221de692acbd
Extracted
redline
brain
83.97.73.126:19046
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1484 z4275127.exe 4168 z4332265.exe 636 o0728817.exe 5012 p3448741.exe 3176 r4167516.exe 5028 s0640150.exe 4084 s0640150.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4275127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4275127.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4332265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4332265.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 636 set thread context of 1012 636 o0728817.exe 84 PID 3176 set thread context of 216 3176 r4167516.exe 96 PID 5028 set thread context of 4084 5028 s0640150.exe 98 -
Program crash 1 IoCs
pid pid_target Process procid_target 3100 4084 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1012 AppLaunch.exe 1012 AppLaunch.exe 5012 p3448741.exe 5012 p3448741.exe 216 AppLaunch.exe 216 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1012 AppLaunch.exe Token: SeDebugPrivilege 5012 p3448741.exe Token: SeDebugPrivilege 5028 s0640150.exe Token: SeDebugPrivilege 216 AppLaunch.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4084 s0640150.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4656 wrote to memory of 1484 4656 26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe 80 PID 4656 wrote to memory of 1484 4656 26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe 80 PID 4656 wrote to memory of 1484 4656 26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe 80 PID 1484 wrote to memory of 4168 1484 z4275127.exe 81 PID 1484 wrote to memory of 4168 1484 z4275127.exe 81 PID 1484 wrote to memory of 4168 1484 z4275127.exe 81 PID 4168 wrote to memory of 636 4168 z4332265.exe 82 PID 4168 wrote to memory of 636 4168 z4332265.exe 82 PID 4168 wrote to memory of 636 4168 z4332265.exe 82 PID 636 wrote to memory of 1012 636 o0728817.exe 84 PID 636 wrote to memory of 1012 636 o0728817.exe 84 PID 636 wrote to memory of 1012 636 o0728817.exe 84 PID 636 wrote to memory of 1012 636 o0728817.exe 84 PID 636 wrote to memory of 1012 636 o0728817.exe 84 PID 4168 wrote to memory of 5012 4168 z4332265.exe 85 PID 4168 wrote to memory of 5012 4168 z4332265.exe 85 PID 4168 wrote to memory of 5012 4168 z4332265.exe 85 PID 1484 wrote to memory of 3176 1484 z4275127.exe 94 PID 1484 wrote to memory of 3176 1484 z4275127.exe 94 PID 1484 wrote to memory of 3176 1484 z4275127.exe 94 PID 3176 wrote to memory of 216 3176 r4167516.exe 96 PID 3176 wrote to memory of 216 3176 r4167516.exe 96 PID 3176 wrote to memory of 216 3176 r4167516.exe 96 PID 3176 wrote to memory of 216 3176 r4167516.exe 96 PID 3176 wrote to memory of 216 3176 r4167516.exe 96 PID 4656 wrote to memory of 5028 4656 26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe 97 PID 4656 wrote to memory of 5028 4656 26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe 97 PID 4656 wrote to memory of 5028 4656 26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe 97 PID 5028 wrote to memory of 4084 5028 s0640150.exe 98 PID 5028 wrote to memory of 4084 5028 s0640150.exe 98 PID 5028 wrote to memory of 4084 5028 s0640150.exe 98 PID 5028 wrote to memory of 4084 5028 s0640150.exe 98 PID 5028 wrote to memory of 4084 5028 s0640150.exe 98 PID 5028 wrote to memory of 4084 5028 s0640150.exe 98 PID 5028 wrote to memory of 4084 5028 s0640150.exe 98 PID 5028 wrote to memory of 4084 5028 s0640150.exe 98 PID 5028 wrote to memory of 4084 5028 s0640150.exe 98 PID 5028 wrote to memory of 4084 5028 s0640150.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe"C:\Users\Admin\AppData\Local\Temp\26475991ec625d10c00b8e2f1253efd22fe5fd9be1cfd71b4729005160c1d654.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4275127.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4275127.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4332265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4332265.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0728817.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0728817.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3448741.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3448741.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4167516.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4167516.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0640150.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0640150.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0640150.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0640150.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 124⤵
- Program crash
PID:3100
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4084 -ip 40841⤵PID:1228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
966KB
MD59881849e1f23a7f03b260e1c2531c261
SHA140df971cde93b92d637a3ca725e0ac0ff3256bd8
SHA256c2ccae8ea50277481e6d28a2fa10f7500e963adf442e90af5041887fae086c86
SHA512a17eec654a820f4d803d621439311395d85950de18d031d236ce9c11923a7cf9949d2c8a0275b3f4696683c2aa4ee47bcacd177daa94cf61fd28c65075a0645b
-
Filesize
966KB
MD59881849e1f23a7f03b260e1c2531c261
SHA140df971cde93b92d637a3ca725e0ac0ff3256bd8
SHA256c2ccae8ea50277481e6d28a2fa10f7500e963adf442e90af5041887fae086c86
SHA512a17eec654a820f4d803d621439311395d85950de18d031d236ce9c11923a7cf9949d2c8a0275b3f4696683c2aa4ee47bcacd177daa94cf61fd28c65075a0645b
-
Filesize
966KB
MD59881849e1f23a7f03b260e1c2531c261
SHA140df971cde93b92d637a3ca725e0ac0ff3256bd8
SHA256c2ccae8ea50277481e6d28a2fa10f7500e963adf442e90af5041887fae086c86
SHA512a17eec654a820f4d803d621439311395d85950de18d031d236ce9c11923a7cf9949d2c8a0275b3f4696683c2aa4ee47bcacd177daa94cf61fd28c65075a0645b
-
Filesize
606KB
MD5bf5f7291f6a98f0b45ae7bd34c13e674
SHA1ab9c11a84dd2777948d2dabc71d5709532e8e2e6
SHA25668e2e0596cc77450abe1ae6f96b0f1080515a7d2bccfc51443e56a9afba3904c
SHA512acc73e788843c24804425d4f8eb8f07bda75da989403f7b36a056985a3cdf25db4ca13e875188f4b65ea015fa98c2785807ce50c404369bdc9da5627edbb97c5
-
Filesize
606KB
MD5bf5f7291f6a98f0b45ae7bd34c13e674
SHA1ab9c11a84dd2777948d2dabc71d5709532e8e2e6
SHA25668e2e0596cc77450abe1ae6f96b0f1080515a7d2bccfc51443e56a9afba3904c
SHA512acc73e788843c24804425d4f8eb8f07bda75da989403f7b36a056985a3cdf25db4ca13e875188f4b65ea015fa98c2785807ce50c404369bdc9da5627edbb97c5
-
Filesize
304KB
MD5a72d98ef6e83996282ce0b422ef5f3a8
SHA10e931b3ae7af46fb2d5604cf8ce2932cba949dc7
SHA25613b7c3850cb51b0df2c459760f86094b741c2626b692c7ba45356fbbe96dbef3
SHA51227e264421ebbbdee4f96261deb13e447eff0ace19c30ed990da08c84f25636f9a0624c62262511b80b014a1bc1307592fe4fce55f91285a336014e2cfd002970
-
Filesize
304KB
MD5a72d98ef6e83996282ce0b422ef5f3a8
SHA10e931b3ae7af46fb2d5604cf8ce2932cba949dc7
SHA25613b7c3850cb51b0df2c459760f86094b741c2626b692c7ba45356fbbe96dbef3
SHA51227e264421ebbbdee4f96261deb13e447eff0ace19c30ed990da08c84f25636f9a0624c62262511b80b014a1bc1307592fe4fce55f91285a336014e2cfd002970
-
Filesize
276KB
MD565018be8a239c51d86ca0e1315589b63
SHA18fc4e08268f020259199525fbb58c12c82056398
SHA256f507447be4a0630385bf788241b434e41332ea45f23013e3014a4654cb80ad5b
SHA5127d8d47a3d52d3148fc9938fb73f508b60bdcb7fc7b06fd40719a5b41f5e72aa9488db8eaba9571fd15040c14fb0ca83baca048ece6eb2c89da35bccc4c6e2741
-
Filesize
276KB
MD565018be8a239c51d86ca0e1315589b63
SHA18fc4e08268f020259199525fbb58c12c82056398
SHA256f507447be4a0630385bf788241b434e41332ea45f23013e3014a4654cb80ad5b
SHA5127d8d47a3d52d3148fc9938fb73f508b60bdcb7fc7b06fd40719a5b41f5e72aa9488db8eaba9571fd15040c14fb0ca83baca048ece6eb2c89da35bccc4c6e2741
-
Filesize
147KB
MD5dcb853968c39a1d0357655c4a97a9e25
SHA1095427392b44d25ba0ae5a0012e9d6ab8cc8138b
SHA2561035683a1ba26c3edb54b2d1d54b0b5f38fd072aa344b1079279913f3519f2e6
SHA512c3e95a24078cf9f9c26b1afabdbcba411ecd49d0331802da4b3f0b4f95eed71eba8e6aa76dbe9c0be9b1468664fcb0e42d74adfa4f8e0df02cd6f7a210ba29a2
-
Filesize
147KB
MD5dcb853968c39a1d0357655c4a97a9e25
SHA1095427392b44d25ba0ae5a0012e9d6ab8cc8138b
SHA2561035683a1ba26c3edb54b2d1d54b0b5f38fd072aa344b1079279913f3519f2e6
SHA512c3e95a24078cf9f9c26b1afabdbcba411ecd49d0331802da4b3f0b4f95eed71eba8e6aa76dbe9c0be9b1468664fcb0e42d74adfa4f8e0df02cd6f7a210ba29a2
-
Filesize
168KB
MD589adf517d111c95ea39f8dc24f8b711c
SHA1e7f964e564632813ddd214d126393f3e679d86d2
SHA256573d0d4151cb5910d8e81681bc232370504326c0189183c6cdd44dfac86a292e
SHA512c29281d8e2144cbe8ce80dec0ceaeaaa8d20efc7a56399fe7d57975ca7c4b940c94456aecb46b396930f8e506438f257c6f503ebff1cc0943d0be0a6eb1f3a67
-
Filesize
168KB
MD589adf517d111c95ea39f8dc24f8b711c
SHA1e7f964e564632813ddd214d126393f3e679d86d2
SHA256573d0d4151cb5910d8e81681bc232370504326c0189183c6cdd44dfac86a292e
SHA512c29281d8e2144cbe8ce80dec0ceaeaaa8d20efc7a56399fe7d57975ca7c4b940c94456aecb46b396930f8e506438f257c6f503ebff1cc0943d0be0a6eb1f3a67