Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2023, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
38a73350f14f7521147dea22faa01e6b56e1f296a0aa68335bce1133736262d2.exe
Resource
win10v2004-20230703-en
General
-
Target
38a73350f14f7521147dea22faa01e6b56e1f296a0aa68335bce1133736262d2.exe
-
Size
890KB
-
MD5
605759df0fda85e64629dce6caab56c8
-
SHA1
57106dbcba9c4cfc0a6cdada846a35915a93c10f
-
SHA256
38a73350f14f7521147dea22faa01e6b56e1f296a0aa68335bce1133736262d2
-
SHA512
3ab29f21311e790f8e49d1badeb3837ad468ef9e615cd8a99f1961adbee4bfff167ddd5eaabc7609bb5a2fcf5f35d86731a6966aae02b133a1427befa4f5e279
-
SSDEEP
24576:AyisRb4xFA7bzwD9dPyWUQjHvmZHyRcQ:HX4xyz+9FyW/Hv+yRc
Malware Config
Extracted
redline
jonka
77.91.124.73:19071
-
auth_value
c95bc30cd252fa6dff2a19fd78bfab4e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" r3673928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" r3673928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" r3673928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" r3673928.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection r3673928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" r3673928.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1828 z2770023.exe 1776 z8876881.exe 4960 z8950472.exe 4472 r3673928.exe 1940 s9101467.exe 3992 t2459678.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features r3673928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" r3673928.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 38a73350f14f7521147dea22faa01e6b56e1f296a0aa68335bce1133736262d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2770023.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8876881.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8950472.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2936 4472 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 r3673928.exe 4472 r3673928.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4472 r3673928.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1828 1664 38a73350f14f7521147dea22faa01e6b56e1f296a0aa68335bce1133736262d2.exe 83 PID 1664 wrote to memory of 1828 1664 38a73350f14f7521147dea22faa01e6b56e1f296a0aa68335bce1133736262d2.exe 83 PID 1664 wrote to memory of 1828 1664 38a73350f14f7521147dea22faa01e6b56e1f296a0aa68335bce1133736262d2.exe 83 PID 1828 wrote to memory of 1776 1828 z2770023.exe 84 PID 1828 wrote to memory of 1776 1828 z2770023.exe 84 PID 1828 wrote to memory of 1776 1828 z2770023.exe 84 PID 1776 wrote to memory of 4960 1776 z8876881.exe 85 PID 1776 wrote to memory of 4960 1776 z8876881.exe 85 PID 1776 wrote to memory of 4960 1776 z8876881.exe 85 PID 4960 wrote to memory of 4472 4960 z8950472.exe 86 PID 4960 wrote to memory of 4472 4960 z8950472.exe 86 PID 4960 wrote to memory of 4472 4960 z8950472.exe 86 PID 4960 wrote to memory of 1940 4960 z8950472.exe 99 PID 4960 wrote to memory of 1940 4960 z8950472.exe 99 PID 4960 wrote to memory of 1940 4960 z8950472.exe 99 PID 1776 wrote to memory of 3992 1776 z8876881.exe 100 PID 1776 wrote to memory of 3992 1776 z8876881.exe 100 PID 1776 wrote to memory of 3992 1776 z8876881.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\38a73350f14f7521147dea22faa01e6b56e1f296a0aa68335bce1133736262d2.exe"C:\Users\Admin\AppData\Local\Temp\38a73350f14f7521147dea22faa01e6b56e1f296a0aa68335bce1133736262d2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2770023.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2770023.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8876881.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8876881.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8950472.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8950472.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r3673928.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r3673928.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 10926⤵
- Program crash
PID:2936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9101467.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9101467.exe5⤵
- Executes dropped EXE
PID:1940
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2459678.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2459678.exe4⤵
- Executes dropped EXE
PID:3992
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4472 -ip 44721⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
775KB
MD57868bf0b799217886a8fc758dd83106e
SHA1e1b09cb3d3c4c9b31682028d63bb6152ef7db7a7
SHA2561bf41171ee8acc730f525eeecb571fe2bfa62cfe3a4f897dede364e60aabb2f4
SHA51222f8f76fd315e15eef1ade31f70f27aa587c176329419c8cdff8182317c6972e37d172affe6c4a1f12b5b0c8771bf045ec09f34cef133b545b1746deb22bf6f6
-
Filesize
775KB
MD57868bf0b799217886a8fc758dd83106e
SHA1e1b09cb3d3c4c9b31682028d63bb6152ef7db7a7
SHA2561bf41171ee8acc730f525eeecb571fe2bfa62cfe3a4f897dede364e60aabb2f4
SHA51222f8f76fd315e15eef1ade31f70f27aa587c176329419c8cdff8182317c6972e37d172affe6c4a1f12b5b0c8771bf045ec09f34cef133b545b1746deb22bf6f6
-
Filesize
549KB
MD543f208135fdd2a24238f75dbeb3632e3
SHA1fbe5e6574e6287722a12a1d3c57bf50d9f020c15
SHA25648727e0f59f03e1a03da9e8482eaa3e8d319d3b4023d7fca9db5e9ce346cd9e2
SHA51236950a9cb5f31373681fe1afa4f318dd76d8421f07acd86f5b8f9970ecf35be0adc0842933a3112e5aa93ef978cbd5a335e3f598fbaac2403150220481d44f33
-
Filesize
549KB
MD543f208135fdd2a24238f75dbeb3632e3
SHA1fbe5e6574e6287722a12a1d3c57bf50d9f020c15
SHA25648727e0f59f03e1a03da9e8482eaa3e8d319d3b4023d7fca9db5e9ce346cd9e2
SHA51236950a9cb5f31373681fe1afa4f318dd76d8421f07acd86f5b8f9970ecf35be0adc0842933a3112e5aa93ef978cbd5a335e3f598fbaac2403150220481d44f33
-
Filesize
174KB
MD52873b8b66a547327aef437fc48099ffd
SHA17fb523346dc975c538e5d27b1cd657c39b267d42
SHA256d1cad7ca6edfcb9fccce2ef66023d1b652c6adcfc5ec6589034876e9d754d6ff
SHA512c73ce31d8b4a7ff4f44f5cef0789afe12a0942cb59e9d6d5fe0797923f27afad59572eadeb6905672a3d7b27fe75316eac5d76714ecc4da74f014c6ec23a80e7
-
Filesize
174KB
MD52873b8b66a547327aef437fc48099ffd
SHA17fb523346dc975c538e5d27b1cd657c39b267d42
SHA256d1cad7ca6edfcb9fccce2ef66023d1b652c6adcfc5ec6589034876e9d754d6ff
SHA512c73ce31d8b4a7ff4f44f5cef0789afe12a0942cb59e9d6d5fe0797923f27afad59572eadeb6905672a3d7b27fe75316eac5d76714ecc4da74f014c6ec23a80e7
-
Filesize
392KB
MD599998c816ba10deb4b556dcc059de313
SHA175c7dda2db481959841c7042d7c8c991d61cea83
SHA2567fd0e790f1b1ef401e00bc0c9f6a839294a1224b5586df59ee4ac1d0c7676f39
SHA5121504fd237c5303f07b1f417ebbe60662bb1bcb656f166eb7e371352633b154474bea23b18990187f9ffa8592d820fd8d823a61946beca3ab81c59c8daf3838af
-
Filesize
392KB
MD599998c816ba10deb4b556dcc059de313
SHA175c7dda2db481959841c7042d7c8c991d61cea83
SHA2567fd0e790f1b1ef401e00bc0c9f6a839294a1224b5586df59ee4ac1d0c7676f39
SHA5121504fd237c5303f07b1f417ebbe60662bb1bcb656f166eb7e371352633b154474bea23b18990187f9ffa8592d820fd8d823a61946beca3ab81c59c8daf3838af
-
Filesize
273KB
MD59f2cf727714c138f749611a540848a9d
SHA19a7b8020168557e8d5de34ed0605b416f28424ef
SHA25632772a3bc8dc86ce487c79f0e90e7c4799e23866e6006a36ef8b81fd12a7b1d8
SHA512e7f195d5ebad65dea3a3d43efdfc3b4693109f76f16c698ebb9c02f04aa400d217116b49426e6ef821f0689d7c2df32d1438e1dfe2e48a33ab2cd6bf494fcc8a
-
Filesize
273KB
MD59f2cf727714c138f749611a540848a9d
SHA19a7b8020168557e8d5de34ed0605b416f28424ef
SHA25632772a3bc8dc86ce487c79f0e90e7c4799e23866e6006a36ef8b81fd12a7b1d8
SHA512e7f195d5ebad65dea3a3d43efdfc3b4693109f76f16c698ebb9c02f04aa400d217116b49426e6ef821f0689d7c2df32d1438e1dfe2e48a33ab2cd6bf494fcc8a
-
Filesize
140KB
MD58d5f17011509ea2a6f1334430c6fa664
SHA1dcae78973384c3b600af0f4c045b61cf62310907
SHA256566508cf56b529db924eeb1f99e33d7281088ec66655242fd5136ce4a25892ea
SHA5126e8f05ae41a27e865281819981aca8f5d2af9d4f86c089ca413db88bb4811504f19c7a2ed87698c91b8ba77aeb3752172064757591efed097f4ff250d18e27da
-
Filesize
140KB
MD58d5f17011509ea2a6f1334430c6fa664
SHA1dcae78973384c3b600af0f4c045b61cf62310907
SHA256566508cf56b529db924eeb1f99e33d7281088ec66655242fd5136ce4a25892ea
SHA5126e8f05ae41a27e865281819981aca8f5d2af9d4f86c089ca413db88bb4811504f19c7a2ed87698c91b8ba77aeb3752172064757591efed097f4ff250d18e27da