Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157.exe
Resource
win10v2004-20230220-en
General
-
Target
fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157.exe
-
Size
584KB
-
MD5
e7e9fbd5291c2f5b74c94f6844675aff
-
SHA1
69b25d9fab859c9fc6a3e5b6293e72c72fa8b6b2
-
SHA256
fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157
-
SHA512
4b67d7b008fafb7e331e1a42b5ef1caa3643388e4c88181cd0653ad55ba035769509c181360398810c25bf382c4247045b1564896bcfca186d2c03b5282c6858
-
SSDEEP
12288:XMrdy90K4aT1MyBJQGw0CVj0o1gPZ+pEjajOv6d+LA:Oy5TBWGw5jxcZ+KaZA8
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0572218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0572218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0572218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0572218.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k0572218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0572218.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 788 y7232725.exe 2388 y3563196.exe 4188 k0572218.exe 2392 l0601316.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k0572218.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7232725.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7232725.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3563196.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y3563196.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4188 k0572218.exe 4188 k0572218.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4188 k0572218.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2092 wrote to memory of 788 2092 fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157.exe 83 PID 2092 wrote to memory of 788 2092 fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157.exe 83 PID 2092 wrote to memory of 788 2092 fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157.exe 83 PID 788 wrote to memory of 2388 788 y7232725.exe 84 PID 788 wrote to memory of 2388 788 y7232725.exe 84 PID 788 wrote to memory of 2388 788 y7232725.exe 84 PID 2388 wrote to memory of 4188 2388 y3563196.exe 85 PID 2388 wrote to memory of 4188 2388 y3563196.exe 85 PID 2388 wrote to memory of 2392 2388 y3563196.exe 86 PID 2388 wrote to memory of 2392 2388 y3563196.exe 86 PID 2388 wrote to memory of 2392 2388 y3563196.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157.exe"C:\Users\Admin\AppData\Local\Temp\fb1315c34f10b602ba39e593e12f2872f4b5a4e7f96cb3806572ce7859132157.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7232725.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7232725.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3563196.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3563196.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0572218.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0572218.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0601316.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0601316.exe4⤵
- Executes dropped EXE
PID:2392
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5f63d30f4efb26fd751df86498e5360e5
SHA167ba744491ab5c9bd883642974120a4aa4ae97d7
SHA25631eceda7fc1e46b83ed28ba042a00c3f5e9d8a53514c445a4e0d98d82ea863b0
SHA512a053a410432db4476c03f601e9760f9b932d39b9365df1525480ea3394dc45d21868eeabb1346a3c6bfddbd9100612f9cc476fb893a1275e0577b041baed9a2c
-
Filesize
377KB
MD5f63d30f4efb26fd751df86498e5360e5
SHA167ba744491ab5c9bd883642974120a4aa4ae97d7
SHA25631eceda7fc1e46b83ed28ba042a00c3f5e9d8a53514c445a4e0d98d82ea863b0
SHA512a053a410432db4476c03f601e9760f9b932d39b9365df1525480ea3394dc45d21868eeabb1346a3c6bfddbd9100612f9cc476fb893a1275e0577b041baed9a2c
-
Filesize
206KB
MD599e563ad040711a2124f228f8af5c642
SHA19c5fc7568fbca5e084a5069441227d82fa251bb5
SHA2563bf8dc5be87a57725236a051469032594b2075e4aba23b0b894f6a55265f87d8
SHA5122a8a5c80146d87dbc6d4529d2409125c519a746d1e12f185bd828633df68a4a42083e56ce22e533859b9c3303ac18252d699a80d6c1d674e3a22d9aadb24704a
-
Filesize
206KB
MD599e563ad040711a2124f228f8af5c642
SHA19c5fc7568fbca5e084a5069441227d82fa251bb5
SHA2563bf8dc5be87a57725236a051469032594b2075e4aba23b0b894f6a55265f87d8
SHA5122a8a5c80146d87dbc6d4529d2409125c519a746d1e12f185bd828633df68a4a42083e56ce22e533859b9c3303ac18252d699a80d6c1d674e3a22d9aadb24704a
-
Filesize
13KB
MD575f93dd94c0b93390c9c54ef58de90d6
SHA160f18851afc81e2bf55aac2ba4fce7fc10911c2c
SHA256583d2cbd1c5bc2a9460a5a12488bd9692ddff97b052cc466eb706ee4be6ef301
SHA51205dd7176dfc62bc1fd17bc051159a33cd81c0b8327120ce6fbe6f995ae9b4833a786da21b4f802bceab18bcb816b7bc8e6ac16e1610635ebe02ab8ebedfecb08
-
Filesize
13KB
MD575f93dd94c0b93390c9c54ef58de90d6
SHA160f18851afc81e2bf55aac2ba4fce7fc10911c2c
SHA256583d2cbd1c5bc2a9460a5a12488bd9692ddff97b052cc466eb706ee4be6ef301
SHA51205dd7176dfc62bc1fd17bc051159a33cd81c0b8327120ce6fbe6f995ae9b4833a786da21b4f802bceab18bcb816b7bc8e6ac16e1610635ebe02ab8ebedfecb08
-
Filesize
172KB
MD5ec9b54ecff1baf2326c43dc4c49953c6
SHA1defe0e3b5e5e8f728d38d1e573bc7f26476b183e
SHA256d2ebb9bfa91b2207a0a60059caca3a8109ca2cd3000372b01c4c13bcd97482ec
SHA512a8df1f5b4b0af2820e5b7f3c91d782751e6c48a77d79d99c593fcc9ed4784aaff8f18d6f6ec7e5489ce32034f766a2548ccb26594df0d59e01d3d50d3e37b8f8
-
Filesize
172KB
MD5ec9b54ecff1baf2326c43dc4c49953c6
SHA1defe0e3b5e5e8f728d38d1e573bc7f26476b183e
SHA256d2ebb9bfa91b2207a0a60059caca3a8109ca2cd3000372b01c4c13bcd97482ec
SHA512a8df1f5b4b0af2820e5b7f3c91d782751e6c48a77d79d99c593fcc9ed4784aaff8f18d6f6ec7e5489ce32034f766a2548ccb26594df0d59e01d3d50d3e37b8f8