Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/06/2023, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
05120399.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
05120399.exe
Resource
win10v2004-20230220-en
General
-
Target
05120399.exe
-
Size
852KB
-
MD5
c7299a035099602fdb268749eee95fef
-
SHA1
759b44dcc80b766689f05b87dca8ecc24b64431e
-
SHA256
5f2193a7bce10d8aed8c3747a0ce384f6e6d93ae3e026c8bd59015f9cd0d4487
-
SHA512
865adef01d8ad4fdba02d86fe6e9e9f2e7aa4b7de6b109dd14b253171224ff23c3f3e12a72879b059717e54f9549276ae16580b931a999aacdb74382d3f88d2b
-
SSDEEP
24576:Vy0AiWrvCyiuZdqaI7wpyZW4IiE70Ce2d+R:wdiMSaEwpx7nd+
Malware Config
Extracted
redline
lupa
83.97.73.126:19046
-
auth_value
6a764aa41830c77712442516d143bc9c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection o5771088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o5771088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o5771088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o5771088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o5771088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o5771088.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1936 z1843444.exe 1268 z0575222.exe 2024 o5771088.exe 1848 p6990358.exe -
Loads dropped DLL 7 IoCs
pid Process 1968 05120399.exe 1936 z1843444.exe 1936 z1843444.exe 1268 z0575222.exe 1268 z0575222.exe 1268 z0575222.exe 1848 p6990358.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features o5771088.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" o5771088.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1843444.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1843444.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0575222.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0575222.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 05120399.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05120399.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2024 o5771088.exe 2024 o5771088.exe 1848 p6990358.exe 1848 p6990358.exe 1848 p6990358.exe 1848 p6990358.exe 1848 p6990358.exe 1848 p6990358.exe 1848 p6990358.exe 1848 p6990358.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2024 o5771088.exe Token: SeDebugPrivilege 1848 p6990358.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1936 1968 05120399.exe 28 PID 1968 wrote to memory of 1936 1968 05120399.exe 28 PID 1968 wrote to memory of 1936 1968 05120399.exe 28 PID 1968 wrote to memory of 1936 1968 05120399.exe 28 PID 1968 wrote to memory of 1936 1968 05120399.exe 28 PID 1968 wrote to memory of 1936 1968 05120399.exe 28 PID 1968 wrote to memory of 1936 1968 05120399.exe 28 PID 1936 wrote to memory of 1268 1936 z1843444.exe 29 PID 1936 wrote to memory of 1268 1936 z1843444.exe 29 PID 1936 wrote to memory of 1268 1936 z1843444.exe 29 PID 1936 wrote to memory of 1268 1936 z1843444.exe 29 PID 1936 wrote to memory of 1268 1936 z1843444.exe 29 PID 1936 wrote to memory of 1268 1936 z1843444.exe 29 PID 1936 wrote to memory of 1268 1936 z1843444.exe 29 PID 1268 wrote to memory of 2024 1268 z0575222.exe 30 PID 1268 wrote to memory of 2024 1268 z0575222.exe 30 PID 1268 wrote to memory of 2024 1268 z0575222.exe 30 PID 1268 wrote to memory of 2024 1268 z0575222.exe 30 PID 1268 wrote to memory of 2024 1268 z0575222.exe 30 PID 1268 wrote to memory of 2024 1268 z0575222.exe 30 PID 1268 wrote to memory of 2024 1268 z0575222.exe 30 PID 1268 wrote to memory of 1848 1268 z0575222.exe 31 PID 1268 wrote to memory of 1848 1268 z0575222.exe 31 PID 1268 wrote to memory of 1848 1268 z0575222.exe 31 PID 1268 wrote to memory of 1848 1268 z0575222.exe 31 PID 1268 wrote to memory of 1848 1268 z0575222.exe 31 PID 1268 wrote to memory of 1848 1268 z0575222.exe 31 PID 1268 wrote to memory of 1848 1268 z0575222.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\05120399.exe"C:\Users\Admin\AppData\Local\Temp\05120399.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1843444.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1843444.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0575222.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0575222.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5771088.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5771088.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6990358.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6990358.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD50580ab71bf5a4a082a3013b65c81e3ab
SHA1c1fbd7382b11f3d829021826f33baee1c130f627
SHA2569e6ce23489f7821a08b95a258fbb01a93629f762b51ae1fbaea423697f1a62a4
SHA512e003a26b8571e0409f70b96040d09646dc77ed87820303e823a43e88cc88fac0ed171d0532364bb1da4cb0deb0a4a064a77599d31cdda314991890cec623cd7f
-
Filesize
408KB
MD50580ab71bf5a4a082a3013b65c81e3ab
SHA1c1fbd7382b11f3d829021826f33baee1c130f627
SHA2569e6ce23489f7821a08b95a258fbb01a93629f762b51ae1fbaea423697f1a62a4
SHA512e003a26b8571e0409f70b96040d09646dc77ed87820303e823a43e88cc88fac0ed171d0532364bb1da4cb0deb0a4a064a77599d31cdda314991890cec623cd7f
-
Filesize
206KB
MD5fe2540ff821d076b48079323766fead4
SHA1c06969cd61707e6153e0e3dbaaa1327a63675f0d
SHA256ca57fe093ff3136bd8bcb00365362b2b33b517ecd7d825b79b50d6b6a4b69cd1
SHA5125d4aa0bebf8f1e2f1c3cefe116015f973dc677794d2718c2a18f4014af2803eb8889058c881da10ee04e1a6d28aa1173937b83edfc8a9385be47653a538b7cc7
-
Filesize
206KB
MD5fe2540ff821d076b48079323766fead4
SHA1c06969cd61707e6153e0e3dbaaa1327a63675f0d
SHA256ca57fe093ff3136bd8bcb00365362b2b33b517ecd7d825b79b50d6b6a4b69cd1
SHA5125d4aa0bebf8f1e2f1c3cefe116015f973dc677794d2718c2a18f4014af2803eb8889058c881da10ee04e1a6d28aa1173937b83edfc8a9385be47653a538b7cc7
-
Filesize
11KB
MD5d0c6e9f85c4b7bf0319c0601999b41f7
SHA1cb002d18a27e52cad8a227c5d9b330df8fbfb359
SHA2569b54b66523adbb1590dd20f1ff406c83ca68c03af8300da2777f032f9e97f998
SHA512b8719f06f9b468a4952c92cfe979e76abf394fbbd813f47ae50c945ae93d4b0d297116ac7daf3d26af1cd544f0eb689c09c043370f5c6615cfae68ae7270a418
-
Filesize
11KB
MD5d0c6e9f85c4b7bf0319c0601999b41f7
SHA1cb002d18a27e52cad8a227c5d9b330df8fbfb359
SHA2569b54b66523adbb1590dd20f1ff406c83ca68c03af8300da2777f032f9e97f998
SHA512b8719f06f9b468a4952c92cfe979e76abf394fbbd813f47ae50c945ae93d4b0d297116ac7daf3d26af1cd544f0eb689c09c043370f5c6615cfae68ae7270a418
-
Filesize
172KB
MD533d1fb8b82cd09836ef392621e4de40d
SHA1d5df58a1c0402d9e07d9a76ef69dc0521e3d8921
SHA25698e673096e9d291d24816b44dfd2f229af083c03c0e900dee8d9fdf484f59c42
SHA5123179b624a693f594a5812785bc24957ef2a26e31bc50096dabd49f361b2dfb7f672f36457f37a2d2c853a56c5e685a3f56f0787a75b20c278baa61eaa18a503e
-
Filesize
172KB
MD533d1fb8b82cd09836ef392621e4de40d
SHA1d5df58a1c0402d9e07d9a76ef69dc0521e3d8921
SHA25698e673096e9d291d24816b44dfd2f229af083c03c0e900dee8d9fdf484f59c42
SHA5123179b624a693f594a5812785bc24957ef2a26e31bc50096dabd49f361b2dfb7f672f36457f37a2d2c853a56c5e685a3f56f0787a75b20c278baa61eaa18a503e
-
Filesize
408KB
MD50580ab71bf5a4a082a3013b65c81e3ab
SHA1c1fbd7382b11f3d829021826f33baee1c130f627
SHA2569e6ce23489f7821a08b95a258fbb01a93629f762b51ae1fbaea423697f1a62a4
SHA512e003a26b8571e0409f70b96040d09646dc77ed87820303e823a43e88cc88fac0ed171d0532364bb1da4cb0deb0a4a064a77599d31cdda314991890cec623cd7f
-
Filesize
408KB
MD50580ab71bf5a4a082a3013b65c81e3ab
SHA1c1fbd7382b11f3d829021826f33baee1c130f627
SHA2569e6ce23489f7821a08b95a258fbb01a93629f762b51ae1fbaea423697f1a62a4
SHA512e003a26b8571e0409f70b96040d09646dc77ed87820303e823a43e88cc88fac0ed171d0532364bb1da4cb0deb0a4a064a77599d31cdda314991890cec623cd7f
-
Filesize
206KB
MD5fe2540ff821d076b48079323766fead4
SHA1c06969cd61707e6153e0e3dbaaa1327a63675f0d
SHA256ca57fe093ff3136bd8bcb00365362b2b33b517ecd7d825b79b50d6b6a4b69cd1
SHA5125d4aa0bebf8f1e2f1c3cefe116015f973dc677794d2718c2a18f4014af2803eb8889058c881da10ee04e1a6d28aa1173937b83edfc8a9385be47653a538b7cc7
-
Filesize
206KB
MD5fe2540ff821d076b48079323766fead4
SHA1c06969cd61707e6153e0e3dbaaa1327a63675f0d
SHA256ca57fe093ff3136bd8bcb00365362b2b33b517ecd7d825b79b50d6b6a4b69cd1
SHA5125d4aa0bebf8f1e2f1c3cefe116015f973dc677794d2718c2a18f4014af2803eb8889058c881da10ee04e1a6d28aa1173937b83edfc8a9385be47653a538b7cc7
-
Filesize
11KB
MD5d0c6e9f85c4b7bf0319c0601999b41f7
SHA1cb002d18a27e52cad8a227c5d9b330df8fbfb359
SHA2569b54b66523adbb1590dd20f1ff406c83ca68c03af8300da2777f032f9e97f998
SHA512b8719f06f9b468a4952c92cfe979e76abf394fbbd813f47ae50c945ae93d4b0d297116ac7daf3d26af1cd544f0eb689c09c043370f5c6615cfae68ae7270a418
-
Filesize
172KB
MD533d1fb8b82cd09836ef392621e4de40d
SHA1d5df58a1c0402d9e07d9a76ef69dc0521e3d8921
SHA25698e673096e9d291d24816b44dfd2f229af083c03c0e900dee8d9fdf484f59c42
SHA5123179b624a693f594a5812785bc24957ef2a26e31bc50096dabd49f361b2dfb7f672f36457f37a2d2c853a56c5e685a3f56f0787a75b20c278baa61eaa18a503e
-
Filesize
172KB
MD533d1fb8b82cd09836ef392621e4de40d
SHA1d5df58a1c0402d9e07d9a76ef69dc0521e3d8921
SHA25698e673096e9d291d24816b44dfd2f229af083c03c0e900dee8d9fdf484f59c42
SHA5123179b624a693f594a5812785bc24957ef2a26e31bc50096dabd49f361b2dfb7f672f36457f37a2d2c853a56c5e685a3f56f0787a75b20c278baa61eaa18a503e