Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
2d8014ac8ee54a6f25410b3053359a084403062dae06f317623b9cf08b34271f.exe
Resource
win10v2004-20230221-en
General
-
Target
2d8014ac8ee54a6f25410b3053359a084403062dae06f317623b9cf08b34271f.exe
-
Size
850KB
-
MD5
cfb32317f4ce201471305c0b06406cfe
-
SHA1
d4772f1d85ed9ed66d2ce0c81af24c5ceae2dc49
-
SHA256
2d8014ac8ee54a6f25410b3053359a084403062dae06f317623b9cf08b34271f
-
SHA512
9e31df7421799e7441fe5d68a35b7e40e5fe8de305bbaec8680a666cc7f803fbeff27dbfc1707a29857d86aa00f13fadf28067bcb505751ce425fa1814bafc36
-
SSDEEP
12288:ZMrdy90arC53BPWVtjj07gthhpnOn+KcPSxf5LYS6Wr7OLKjMTTLz5N76LvXI:ky9+l2pI7848CyC/O/j3+E
Malware Config
Extracted
redline
loxa
83.97.73.129:19068
-
auth_value
c709e1d3fce1e71b1abb95c0a30242b8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o7457797.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection o7457797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o7457797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o7457797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o7457797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o7457797.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4264 z5778346.exe 2020 z0652855.exe 1808 o7457797.exe 2116 p9455358.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" o7457797.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0652855.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2d8014ac8ee54a6f25410b3053359a084403062dae06f317623b9cf08b34271f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2d8014ac8ee54a6f25410b3053359a084403062dae06f317623b9cf08b34271f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5778346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5778346.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0652855.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1808 o7457797.exe 1808 o7457797.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe 2116 p9455358.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1808 o7457797.exe Token: SeDebugPrivilege 2116 p9455358.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2984 wrote to memory of 4264 2984 2d8014ac8ee54a6f25410b3053359a084403062dae06f317623b9cf08b34271f.exe 86 PID 2984 wrote to memory of 4264 2984 2d8014ac8ee54a6f25410b3053359a084403062dae06f317623b9cf08b34271f.exe 86 PID 2984 wrote to memory of 4264 2984 2d8014ac8ee54a6f25410b3053359a084403062dae06f317623b9cf08b34271f.exe 86 PID 4264 wrote to memory of 2020 4264 z5778346.exe 87 PID 4264 wrote to memory of 2020 4264 z5778346.exe 87 PID 4264 wrote to memory of 2020 4264 z5778346.exe 87 PID 2020 wrote to memory of 1808 2020 z0652855.exe 88 PID 2020 wrote to memory of 1808 2020 z0652855.exe 88 PID 2020 wrote to memory of 2116 2020 z0652855.exe 89 PID 2020 wrote to memory of 2116 2020 z0652855.exe 89 PID 2020 wrote to memory of 2116 2020 z0652855.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d8014ac8ee54a6f25410b3053359a084403062dae06f317623b9cf08b34271f.exe"C:\Users\Admin\AppData\Local\Temp\2d8014ac8ee54a6f25410b3053359a084403062dae06f317623b9cf08b34271f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5778346.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5778346.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0652855.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0652855.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o7457797.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o7457797.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9455358.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9455358.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD5b72c105aae22415a0cd58eb765984428
SHA1f65a35ef139935d470e6fa58da2cbc55d6457aff
SHA2562e4bd9988674bf5a040c6f3417511b23bc005fb05d3f4c4168db783eb30814e5
SHA5121c736af98c9aecc887183cfb7b5171dd84c0ab582545ba280b5e6c90dcc304f168a4e832863c44b663d413c03ce1a61f111d39e71c6ae04f9b6af13f253faef6
-
Filesize
405KB
MD5b72c105aae22415a0cd58eb765984428
SHA1f65a35ef139935d470e6fa58da2cbc55d6457aff
SHA2562e4bd9988674bf5a040c6f3417511b23bc005fb05d3f4c4168db783eb30814e5
SHA5121c736af98c9aecc887183cfb7b5171dd84c0ab582545ba280b5e6c90dcc304f168a4e832863c44b663d413c03ce1a61f111d39e71c6ae04f9b6af13f253faef6
-
Filesize
206KB
MD56e01ab58f0adae507671f48830f4a0b4
SHA1ebcb0ff301cf4aed9a3c3deb9e3911e635f34000
SHA256edd9c9c71f02dcc2b7d547daaceb6c4b6784db9a984c653090ccc1d90a280a99
SHA512f68a493adf5d662a6b8b0a93970177b9507bfc1b80a4e053983c563bc178a69d5823fd516ddf2306f223753281e30c2405b32c6adcceb7901b32df0d8cf954d1
-
Filesize
206KB
MD56e01ab58f0adae507671f48830f4a0b4
SHA1ebcb0ff301cf4aed9a3c3deb9e3911e635f34000
SHA256edd9c9c71f02dcc2b7d547daaceb6c4b6784db9a984c653090ccc1d90a280a99
SHA512f68a493adf5d662a6b8b0a93970177b9507bfc1b80a4e053983c563bc178a69d5823fd516ddf2306f223753281e30c2405b32c6adcceb7901b32df0d8cf954d1
-
Filesize
11KB
MD5ffa806fcde598c40288f7dedcf1f3687
SHA1205b34112f10fb73813018f5e44c744386e1a96b
SHA25683ee008e83c0ab56a531c5ff7c7aefb9dee303aa02e7e81c8cf407d4dee617a0
SHA5126dbaaf246c6ea4246b5ca168e5effaa6fc9663668888250d232754ea48c14f6ba95c43e8b49480f46ba0d614b13a971a308b6a109b684c02b6d529af66769c67
-
Filesize
11KB
MD5ffa806fcde598c40288f7dedcf1f3687
SHA1205b34112f10fb73813018f5e44c744386e1a96b
SHA25683ee008e83c0ab56a531c5ff7c7aefb9dee303aa02e7e81c8cf407d4dee617a0
SHA5126dbaaf246c6ea4246b5ca168e5effaa6fc9663668888250d232754ea48c14f6ba95c43e8b49480f46ba0d614b13a971a308b6a109b684c02b6d529af66769c67
-
Filesize
172KB
MD5c2f1888af3e84dfb6f472a9f3ac3407e
SHA1daf70ee4e94db1d1cc7338bcebb7a47f5f47de30
SHA256fb67e11b9428a84af88d451aa6b1873750861ff4c983d5da955a6b117998cbe5
SHA5128789afe0d905b3af0be2bd3de00c7a73060d0ef581c6a8f5ef9b1d3b393ead79b0a2e688cb7f7a9c41c971bf5832cd687eebc970cee2edbe88c358e42e709594
-
Filesize
172KB
MD5c2f1888af3e84dfb6f472a9f3ac3407e
SHA1daf70ee4e94db1d1cc7338bcebb7a47f5f47de30
SHA256fb67e11b9428a84af88d451aa6b1873750861ff4c983d5da955a6b117998cbe5
SHA5128789afe0d905b3af0be2bd3de00c7a73060d0ef581c6a8f5ef9b1d3b393ead79b0a2e688cb7f7a9c41c971bf5832cd687eebc970cee2edbe88c358e42e709594