Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2023, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
aa96fcd06ef78f9ccb75fac2386b86b1a6c181c203151fb92fcdd45b8ddbe359.exe
Resource
win10v2004-20230220-en
General
-
Target
aa96fcd06ef78f9ccb75fac2386b86b1a6c181c203151fb92fcdd45b8ddbe359.exe
-
Size
580KB
-
MD5
e59ba44ba2941b99c5da7513f08d4991
-
SHA1
21947e8b542b130670fcd4ec8df9aaa3e500dd22
-
SHA256
aa96fcd06ef78f9ccb75fac2386b86b1a6c181c203151fb92fcdd45b8ddbe359
-
SHA512
1a20c2e491f07e6b474b98de496fb8550104e2dc1b9c8aa01bdf78a7832299daae33010a046f6837703f018d69b6e4dc9a352a53bc3fb526df43cd4d07313417
-
SSDEEP
12288:MMr0y90MdBxzybhOIdI3k0wr7dZb8QOdq1/Pbjf1eYt06v:wyNdPzwhOIS3Hwnvb8hdq1H1tZv
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1740037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1740037.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k1740037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1740037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1740037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1740037.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 5072 y8320182.exe 1916 y4407298.exe 4396 k1740037.exe 3124 l3311827.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k1740037.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8320182.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8320182.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4407298.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4407298.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aa96fcd06ef78f9ccb75fac2386b86b1a6c181c203151fb92fcdd45b8ddbe359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aa96fcd06ef78f9ccb75fac2386b86b1a6c181c203151fb92fcdd45b8ddbe359.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4396 k1740037.exe 4396 k1740037.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4396 k1740037.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4548 wrote to memory of 5072 4548 aa96fcd06ef78f9ccb75fac2386b86b1a6c181c203151fb92fcdd45b8ddbe359.exe 84 PID 4548 wrote to memory of 5072 4548 aa96fcd06ef78f9ccb75fac2386b86b1a6c181c203151fb92fcdd45b8ddbe359.exe 84 PID 4548 wrote to memory of 5072 4548 aa96fcd06ef78f9ccb75fac2386b86b1a6c181c203151fb92fcdd45b8ddbe359.exe 84 PID 5072 wrote to memory of 1916 5072 y8320182.exe 85 PID 5072 wrote to memory of 1916 5072 y8320182.exe 85 PID 5072 wrote to memory of 1916 5072 y8320182.exe 85 PID 1916 wrote to memory of 4396 1916 y4407298.exe 86 PID 1916 wrote to memory of 4396 1916 y4407298.exe 86 PID 1916 wrote to memory of 3124 1916 y4407298.exe 87 PID 1916 wrote to memory of 3124 1916 y4407298.exe 87 PID 1916 wrote to memory of 3124 1916 y4407298.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa96fcd06ef78f9ccb75fac2386b86b1a6c181c203151fb92fcdd45b8ddbe359.exe"C:\Users\Admin\AppData\Local\Temp\aa96fcd06ef78f9ccb75fac2386b86b1a6c181c203151fb92fcdd45b8ddbe359.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8320182.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8320182.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4407298.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4407298.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1740037.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1740037.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3311827.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3311827.exe4⤵
- Executes dropped EXE
PID:3124
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5cab8faf819edc28278a9ef45d6cb7e13
SHA14228635a35bc2730aa10e40f6c962212c1aa1e64
SHA256a83c0f43bac72615000102ffa06a321a56631a656b541bff097ca12d5c7bc64a
SHA5122a7c1ae79d860054a431d44c60eb1c049ff22755ce55bdc8b79f19bdedd66dc2ba4200bb18d7afd3ab3524dc47d0a5343d5ad12b3fd627d803e05692dc9eb595
-
Filesize
377KB
MD5cab8faf819edc28278a9ef45d6cb7e13
SHA14228635a35bc2730aa10e40f6c962212c1aa1e64
SHA256a83c0f43bac72615000102ffa06a321a56631a656b541bff097ca12d5c7bc64a
SHA5122a7c1ae79d860054a431d44c60eb1c049ff22755ce55bdc8b79f19bdedd66dc2ba4200bb18d7afd3ab3524dc47d0a5343d5ad12b3fd627d803e05692dc9eb595
-
Filesize
206KB
MD509e7e8ea4467e922263198bbea50a6a2
SHA137f25ee887a1da756bee8f0e03651e3b86282c2c
SHA256bf9c43cd08d50d53a61119f0800d8341704d421941453c4a69ab1e94fb6ad254
SHA512f01fab3b96fcbfb2c664564568564b4785ef90165c403fbbbb133c0372065d3e8e50711baac44b4399a2a933c531a383d700359a6065aaba053ed5b97ee8be03
-
Filesize
206KB
MD509e7e8ea4467e922263198bbea50a6a2
SHA137f25ee887a1da756bee8f0e03651e3b86282c2c
SHA256bf9c43cd08d50d53a61119f0800d8341704d421941453c4a69ab1e94fb6ad254
SHA512f01fab3b96fcbfb2c664564568564b4785ef90165c403fbbbb133c0372065d3e8e50711baac44b4399a2a933c531a383d700359a6065aaba053ed5b97ee8be03
-
Filesize
12KB
MD5893392084b653859a026ab269a29784c
SHA1d1e4ee69b91c71b392fd03f862711ca1e2aae80c
SHA2560163732e696d36b9714cafb23954712bfb9646e6eb2e5ce047cb1d6c908af6ad
SHA5121b0edaaed51a0e6cd8f624e816b26af0d301b76741c328db2532e0e725f12b4e488034291da1cc09fc55b7aab9e9e93de9c1fa9cca084d48fe22edb144dff8e9
-
Filesize
12KB
MD5893392084b653859a026ab269a29784c
SHA1d1e4ee69b91c71b392fd03f862711ca1e2aae80c
SHA2560163732e696d36b9714cafb23954712bfb9646e6eb2e5ce047cb1d6c908af6ad
SHA5121b0edaaed51a0e6cd8f624e816b26af0d301b76741c328db2532e0e725f12b4e488034291da1cc09fc55b7aab9e9e93de9c1fa9cca084d48fe22edb144dff8e9
-
Filesize
172KB
MD5616e535d7a8337ab42f71442e1e1b99c
SHA1ed4eeef733c1c19878c26290ca38996e7eabcce3
SHA2566fd2a212b88649adbff5b8b12e2731b04864e6323c8483d5d4c2a8653a1c98d3
SHA5124201de57f03e21b32a2b0c5591996370f3c7977dc3eef4ae6c17b2b29eb027481bc1541d3542fcd5c86ddd675a6d92ed3137d3190bf997b321fe6412cf02afbd
-
Filesize
172KB
MD5616e535d7a8337ab42f71442e1e1b99c
SHA1ed4eeef733c1c19878c26290ca38996e7eabcce3
SHA2566fd2a212b88649adbff5b8b12e2731b04864e6323c8483d5d4c2a8653a1c98d3
SHA5124201de57f03e21b32a2b0c5591996370f3c7977dc3eef4ae6c17b2b29eb027481bc1541d3542fcd5c86ddd675a6d92ed3137d3190bf997b321fe6412cf02afbd