Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
09e148a390e7e504a16b68177f076a9c7f0b7b3bddb34d319a7a534a7ba0aed1.exe
Resource
win10v2004-20230703-en
General
-
Target
09e148a390e7e504a16b68177f076a9c7f0b7b3bddb34d319a7a534a7ba0aed1.exe
-
Size
823KB
-
MD5
518f0ed5a5fb0affd243f17820ff9daf
-
SHA1
713884f771ed469091f0ff492d993c55ac04cac4
-
SHA256
09e148a390e7e504a16b68177f076a9c7f0b7b3bddb34d319a7a534a7ba0aed1
-
SHA512
1ad6ab6dcf99b4aa6bed4c87e76c1bb0cd63efa848c5e1a1ce432a2f07275db137654822ba57328320b5771354e2184c8ad0b8cf37773633353ea7bae83610c0
-
SSDEEP
12288:dMrHy90GYbFfNluw400uhhOjSjuQNv6tBKJyCZiUOK1oab2KK6gVDAFI90:KyfAQR0R0jypCBmytUZ1B2lrDAFI90
Malware Config
Extracted
redline
chang
77.91.124.73:19071
-
auth_value
92b880db64e691d6bb290d1536ce7688
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" r9134785.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection r9134785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" r9134785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" r9134785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" r9134785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" r9134785.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 712 z3247757.exe 5028 z1936523.exe 4768 z5054176.exe 868 r9134785.exe 4200 s6948536.exe 1832 t8290100.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features r9134785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" r9134785.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3247757.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1936523.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5054176.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 09e148a390e7e504a16b68177f076a9c7f0b7b3bddb34d319a7a534a7ba0aed1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 868 r9134785.exe 868 r9134785.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 868 r9134785.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 876 wrote to memory of 712 876 09e148a390e7e504a16b68177f076a9c7f0b7b3bddb34d319a7a534a7ba0aed1.exe 82 PID 876 wrote to memory of 712 876 09e148a390e7e504a16b68177f076a9c7f0b7b3bddb34d319a7a534a7ba0aed1.exe 82 PID 876 wrote to memory of 712 876 09e148a390e7e504a16b68177f076a9c7f0b7b3bddb34d319a7a534a7ba0aed1.exe 82 PID 712 wrote to memory of 5028 712 z3247757.exe 83 PID 712 wrote to memory of 5028 712 z3247757.exe 83 PID 712 wrote to memory of 5028 712 z3247757.exe 83 PID 5028 wrote to memory of 4768 5028 z1936523.exe 84 PID 5028 wrote to memory of 4768 5028 z1936523.exe 84 PID 5028 wrote to memory of 4768 5028 z1936523.exe 84 PID 4768 wrote to memory of 868 4768 z5054176.exe 85 PID 4768 wrote to memory of 868 4768 z5054176.exe 85 PID 4768 wrote to memory of 868 4768 z5054176.exe 85 PID 4768 wrote to memory of 4200 4768 z5054176.exe 91 PID 4768 wrote to memory of 4200 4768 z5054176.exe 91 PID 4768 wrote to memory of 4200 4768 z5054176.exe 91 PID 5028 wrote to memory of 1832 5028 z1936523.exe 92 PID 5028 wrote to memory of 1832 5028 z1936523.exe 92 PID 5028 wrote to memory of 1832 5028 z1936523.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\09e148a390e7e504a16b68177f076a9c7f0b7b3bddb34d319a7a534a7ba0aed1.exe"C:\Users\Admin\AppData\Local\Temp\09e148a390e7e504a16b68177f076a9c7f0b7b3bddb34d319a7a534a7ba0aed1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3247757.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3247757.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1936523.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1936523.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5054176.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5054176.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r9134785.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r9134785.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6948536.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6948536.exe5⤵
- Executes dropped EXE
PID:4200
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8290100.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8290100.exe4⤵
- Executes dropped EXE
PID:1832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
707KB
MD57927ad2571ee151e719282edbd2458cc
SHA12d56fccb26b895c5114bdebbd845b930c488cf17
SHA256a4aca7c99565ca6aa70b65dcc3b7deb5cc677cbed163e104428949a3da10c818
SHA512f5ddfcb24425fcc337800b5f3819b558ba12f3d20af3542af2dcce435d8f14b5b91a34a41b7bec2052335c67afe3498790d7868b66a159c477f3f7a59ee14deb
-
Filesize
707KB
MD57927ad2571ee151e719282edbd2458cc
SHA12d56fccb26b895c5114bdebbd845b930c488cf17
SHA256a4aca7c99565ca6aa70b65dcc3b7deb5cc677cbed163e104428949a3da10c818
SHA512f5ddfcb24425fcc337800b5f3819b558ba12f3d20af3542af2dcce435d8f14b5b91a34a41b7bec2052335c67afe3498790d7868b66a159c477f3f7a59ee14deb
-
Filesize
481KB
MD5ef513038c10c441231df5b78db86cae9
SHA19f4dd8e29d38abf408a1bc5a9842e5b45ffb2e68
SHA2569efe89f05778ef3c43f22b63cd2d788b0ad6cb79e770ead51ddba98eb3a36d2b
SHA512c0d73ecc3595928ef483375b39a8ee8e03f51fb58b4a7c803fb8dc0dd5f190a132ff7422647dc4e576dd721d7a99bbc8460f8ef8e8e72a066287ecd2434c62c4
-
Filesize
481KB
MD5ef513038c10c441231df5b78db86cae9
SHA19f4dd8e29d38abf408a1bc5a9842e5b45ffb2e68
SHA2569efe89f05778ef3c43f22b63cd2d788b0ad6cb79e770ead51ddba98eb3a36d2b
SHA512c0d73ecc3595928ef483375b39a8ee8e03f51fb58b4a7c803fb8dc0dd5f190a132ff7422647dc4e576dd721d7a99bbc8460f8ef8e8e72a066287ecd2434c62c4
-
Filesize
174KB
MD5b46fe6193104956c6d09bf9ef4b8f8b6
SHA1e3da2884b4c77e79d724dd7b32c8b668e001e624
SHA25696048617de3496479bae310308147d15b9c1c5e17b1b5851d7f269ce1cb82ae8
SHA5122ee096f0d594cf69fe0af327daaabb767cf79752b55bbaca0771217cd95e548689da37b471befe0f8ec004c08bcaddfaa240bc94c1f4ec8c0fdcb6b44c7cf109
-
Filesize
174KB
MD5b46fe6193104956c6d09bf9ef4b8f8b6
SHA1e3da2884b4c77e79d724dd7b32c8b668e001e624
SHA25696048617de3496479bae310308147d15b9c1c5e17b1b5851d7f269ce1cb82ae8
SHA5122ee096f0d594cf69fe0af327daaabb767cf79752b55bbaca0771217cd95e548689da37b471befe0f8ec004c08bcaddfaa240bc94c1f4ec8c0fdcb6b44c7cf109
-
Filesize
325KB
MD500588a191b2caaf55649f016c233aa91
SHA1a87bdeb861974c87679e4a602b5fa44f0cbef029
SHA256f12cbb20df47a8ffd882f3e16e77b827b5c12ea046050875a4574aa9b78b868b
SHA5127ad92c1e9f10c8a986b02f74dbd073e862e81ec1101a1652db7a056c32e0c9f89b04c752f693525fe4c5855efe41446968426ae293f83d67e66a17f322535a2f
-
Filesize
325KB
MD500588a191b2caaf55649f016c233aa91
SHA1a87bdeb861974c87679e4a602b5fa44f0cbef029
SHA256f12cbb20df47a8ffd882f3e16e77b827b5c12ea046050875a4574aa9b78b868b
SHA5127ad92c1e9f10c8a986b02f74dbd073e862e81ec1101a1652db7a056c32e0c9f89b04c752f693525fe4c5855efe41446968426ae293f83d67e66a17f322535a2f
-
Filesize
184KB
MD50e84681bbe354c5dd0f4c3699aaee45a
SHA13bcff93f45e3829076c1112e96f18b6d9c442990
SHA256ad60d5d23315b133eaba4449fab335bd8b1de5fc402be006cd9f120e042252ed
SHA5123478fd1476336bc89807753b913c82247ee640ddc4184c1904cb653a5a75b553324cfcaa6894f3629afc1032b447ac36850576da3f9014bdb1cdacfe827f65dc
-
Filesize
184KB
MD50e84681bbe354c5dd0f4c3699aaee45a
SHA13bcff93f45e3829076c1112e96f18b6d9c442990
SHA256ad60d5d23315b133eaba4449fab335bd8b1de5fc402be006cd9f120e042252ed
SHA5123478fd1476336bc89807753b913c82247ee640ddc4184c1904cb653a5a75b553324cfcaa6894f3629afc1032b447ac36850576da3f9014bdb1cdacfe827f65dc
-
Filesize
140KB
MD5d72c309217fda594191502466d14bf93
SHA145787757b2e95339c5f3078896d5a1d822cd93b1
SHA256244eecef8e469634f0da412a2a60b485748185d6886f87fef90e0fdcb2b0d658
SHA512c9b88f65512396d6a65f7424b62497a9f6c88a39c5ce3f780f346d9412bf28d1dd545a261e8cb432a4c64354a53f3dfafe0f8cb68a028d8fcc7f43f91213ddee
-
Filesize
140KB
MD5d72c309217fda594191502466d14bf93
SHA145787757b2e95339c5f3078896d5a1d822cd93b1
SHA256244eecef8e469634f0da412a2a60b485748185d6886f87fef90e0fdcb2b0d658
SHA512c9b88f65512396d6a65f7424b62497a9f6c88a39c5ce3f780f346d9412bf28d1dd545a261e8cb432a4c64354a53f3dfafe0f8cb68a028d8fcc7f43f91213ddee