Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2023, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe
Resource
win10v2004-20230621-en
General
-
Target
a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe
-
Size
3.9MB
-
MD5
0a8dda5c8e9a46c11b53f30c317d9abc
-
SHA1
095e0dd12d6e5380af76c85db433c695d7298043
-
SHA256
a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865
-
SHA512
7ae634509f43f716f82be9f2177fa6d8d01560e5280453c48963036433122a54213cf63d4bde14d3577e6bffaffb5734c710ba0761724742fa30b83575f34891
-
SSDEEP
98304:IfglrRZXrEsmqkm4ClOMsgGx6KSmuihOBGHIvjLxMKdhHK2bDRIq0dqL:FhRZXrNm5Fg06KiBGHIvjLxM+KsL
Malware Config
Extracted
redline
drake
83.97.73.131:19071
-
auth_value
74ce6ffe4025a2e4027fb727915e7d7c
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7381128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7381128.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7381128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7381128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7381128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7381128.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Control Panel\International\Geo\Nation n7183648.exe Key value queried \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 7 IoCs
pid Process 992 y5564604.exe 5028 k7381128.exe 940 l9250116.exe 4076 n7183648.exe 4496 rugen.exe 4784 rugen.exe 3812 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 1004 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7381128.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7381128.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5564604.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5564604.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1204 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5028 k7381128.exe 5028 k7381128.exe 940 l9250116.exe 940 l9250116.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5028 k7381128.exe Token: SeDebugPrivilege 940 l9250116.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4076 n7183648.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2636 wrote to memory of 992 2636 a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe 86 PID 2636 wrote to memory of 992 2636 a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe 86 PID 2636 wrote to memory of 992 2636 a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe 86 PID 992 wrote to memory of 5028 992 y5564604.exe 87 PID 992 wrote to memory of 5028 992 y5564604.exe 87 PID 992 wrote to memory of 5028 992 y5564604.exe 87 PID 992 wrote to memory of 940 992 y5564604.exe 89 PID 992 wrote to memory of 940 992 y5564604.exe 89 PID 992 wrote to memory of 940 992 y5564604.exe 89 PID 2636 wrote to memory of 4076 2636 a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe 91 PID 2636 wrote to memory of 4076 2636 a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe 91 PID 2636 wrote to memory of 4076 2636 a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe 91 PID 4076 wrote to memory of 4496 4076 n7183648.exe 92 PID 4076 wrote to memory of 4496 4076 n7183648.exe 92 PID 4076 wrote to memory of 4496 4076 n7183648.exe 92 PID 4496 wrote to memory of 1204 4496 rugen.exe 93 PID 4496 wrote to memory of 1204 4496 rugen.exe 93 PID 4496 wrote to memory of 1204 4496 rugen.exe 93 PID 4496 wrote to memory of 3728 4496 rugen.exe 95 PID 4496 wrote to memory of 3728 4496 rugen.exe 95 PID 4496 wrote to memory of 3728 4496 rugen.exe 95 PID 3728 wrote to memory of 1588 3728 cmd.exe 97 PID 3728 wrote to memory of 1588 3728 cmd.exe 97 PID 3728 wrote to memory of 1588 3728 cmd.exe 97 PID 3728 wrote to memory of 3344 3728 cmd.exe 98 PID 3728 wrote to memory of 3344 3728 cmd.exe 98 PID 3728 wrote to memory of 3344 3728 cmd.exe 98 PID 3728 wrote to memory of 4372 3728 cmd.exe 99 PID 3728 wrote to memory of 4372 3728 cmd.exe 99 PID 3728 wrote to memory of 4372 3728 cmd.exe 99 PID 3728 wrote to memory of 4128 3728 cmd.exe 100 PID 3728 wrote to memory of 4128 3728 cmd.exe 100 PID 3728 wrote to memory of 4128 3728 cmd.exe 100 PID 3728 wrote to memory of 3688 3728 cmd.exe 101 PID 3728 wrote to memory of 3688 3728 cmd.exe 101 PID 3728 wrote to memory of 3688 3728 cmd.exe 101 PID 3728 wrote to memory of 1716 3728 cmd.exe 102 PID 3728 wrote to memory of 1716 3728 cmd.exe 102 PID 3728 wrote to memory of 1716 3728 cmd.exe 102 PID 4496 wrote to memory of 1004 4496 rugen.exe 106 PID 4496 wrote to memory of 1004 4496 rugen.exe 106 PID 4496 wrote to memory of 1004 4496 rugen.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe"C:\Users\Admin\AppData\Local\Temp\a821582e2c537914b2f0dc4098e2e602bd8f8c7c8e42924104db6d6399f10865.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5564604.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5564604.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7381128.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7381128.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9250116.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9250116.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7183648.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7183648.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:1204
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1588
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:3344
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:4372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4128
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:3688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:1716
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4784
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
411KB
MD53a5989d28357f92f6c7b62f10bba6b74
SHA1f0e4ae83ba2b15949f85c2c8d60dedbf2b6c4423
SHA256bda98c611f24d3d64a8a7d1939f5f4f2be8ecfe35588475401bf6a1ead7fc543
SHA512d8f489c198d6d5844d38d2ec09a3d651985c890fc337c32f12fb5301b110ab25d5c185607c9a419d31cd7d30d0311ef9e3857cf92c4dce692133b51c7c5e63b3
-
Filesize
411KB
MD53a5989d28357f92f6c7b62f10bba6b74
SHA1f0e4ae83ba2b15949f85c2c8d60dedbf2b6c4423
SHA256bda98c611f24d3d64a8a7d1939f5f4f2be8ecfe35588475401bf6a1ead7fc543
SHA512d8f489c198d6d5844d38d2ec09a3d651985c890fc337c32f12fb5301b110ab25d5c185607c9a419d31cd7d30d0311ef9e3857cf92c4dce692133b51c7c5e63b3
-
Filesize
196KB
MD5df439631ad9b2966f15d51f15d4db4e1
SHA1d6d362cb83add1c14d03b0bb466ea8311759a8e5
SHA256ec1737235ece3817ce6641220018e18f1bcaebe0f8b91d04ae8943506ab5b22d
SHA5121541eead45ce2d9a3833a830459958f475f2cfcaf128041eefb8cbd9aecc5c8ecc389e6110afc74662ab4c2730c739b79cbdb170aa72f229d856f4f9164e9bbc
-
Filesize
196KB
MD5df439631ad9b2966f15d51f15d4db4e1
SHA1d6d362cb83add1c14d03b0bb466ea8311759a8e5
SHA256ec1737235ece3817ce6641220018e18f1bcaebe0f8b91d04ae8943506ab5b22d
SHA5121541eead45ce2d9a3833a830459958f475f2cfcaf128041eefb8cbd9aecc5c8ecc389e6110afc74662ab4c2730c739b79cbdb170aa72f229d856f4f9164e9bbc
-
Filesize
1.3MB
MD519286e09bef66889bc4c51b4c8db7243
SHA12404a15ebaf8960d272b2ebe8bea51aaf7711720
SHA2565c14d5fa99f4d5163a3f2e74e8de1f969104c3630746b1c2ce09273d39739f98
SHA5121ac670b6fdbb86b4e4c263532f6d9f31d4a22823ffa31b39b3bce773e50695aab77eb9edea35a77170f1f81b013c00a0362b97f485245ae3074e597af6594e9d
-
Filesize
1.3MB
MD519286e09bef66889bc4c51b4c8db7243
SHA12404a15ebaf8960d272b2ebe8bea51aaf7711720
SHA2565c14d5fa99f4d5163a3f2e74e8de1f969104c3630746b1c2ce09273d39739f98
SHA5121ac670b6fdbb86b4e4c263532f6d9f31d4a22823ffa31b39b3bce773e50695aab77eb9edea35a77170f1f81b013c00a0362b97f485245ae3074e597af6594e9d
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d