Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
15/10/2022, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
bd8ddd8ffb89f7c714dd72e2e968e813b2d5bcaa5897bfbe6eca084ef62da571.exe
Resource
win10-20220901-en
General
-
Target
bd8ddd8ffb89f7c714dd72e2e968e813b2d5bcaa5897bfbe6eca084ef62da571.exe
-
Size
231KB
-
MD5
7e7a634365c4c641d84c14a3e4b6d489
-
SHA1
e22affddaaaf3c01a457295d9cc3ff5c835faab3
-
SHA256
bd8ddd8ffb89f7c714dd72e2e968e813b2d5bcaa5897bfbe6eca084ef62da571
-
SHA512
9aeb24afbc98a3a8d827a28f51be07d5cd4b0ae9348d7683bbe7cac7a235358907a43b468e7dd64e5c4f8d2155daa384dda3bb27ec59e0f0ee6c52ba16c75ced
-
SSDEEP
3072:XXpSgQApY0x5KrgKJ5mrsOvLmIyFa0gaNnToXD0KNkjZ+3cQA:HwgQApViSrfv25gU0XD0lZ+i
Malware Config
Extracted
redline
45.15.156.37:110
-
auth_value
5b663effac3b92fe687f0181631eeff2
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 3860 16C4.exe 1456 1CA1.exe 3540 2E55.exe 4820 3B37.exe 5028 4097.exe -
Deletes itself 1 IoCs
pid Process 3068 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd8ddd8ffb89f7c714dd72e2e968e813b2d5bcaa5897bfbe6eca084ef62da571.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd8ddd8ffb89f7c714dd72e2e968e813b2d5bcaa5897bfbe6eca084ef62da571.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bd8ddd8ffb89f7c714dd72e2e968e813b2d5bcaa5897bfbe6eca084ef62da571.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4264 bd8ddd8ffb89f7c714dd72e2e968e813b2d5bcaa5897bfbe6eca084ef62da571.exe 4264 bd8ddd8ffb89f7c714dd72e2e968e813b2d5bcaa5897bfbe6eca084ef62da571.exe 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3068 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 4264 bd8ddd8ffb89f7c714dd72e2e968e813b2d5bcaa5897bfbe6eca084ef62da571.exe 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeDebugPrivilege 5028 4097.exe Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3860 3068 Process not Found 67 PID 3068 wrote to memory of 3860 3068 Process not Found 67 PID 3068 wrote to memory of 3860 3068 Process not Found 67 PID 3068 wrote to memory of 1456 3068 Process not Found 68 PID 3068 wrote to memory of 1456 3068 Process not Found 68 PID 3068 wrote to memory of 1456 3068 Process not Found 68 PID 3068 wrote to memory of 3540 3068 Process not Found 69 PID 3068 wrote to memory of 3540 3068 Process not Found 69 PID 3068 wrote to memory of 3540 3068 Process not Found 69 PID 3068 wrote to memory of 4820 3068 Process not Found 70 PID 3068 wrote to memory of 4820 3068 Process not Found 70 PID 3068 wrote to memory of 4820 3068 Process not Found 70 PID 3068 wrote to memory of 5028 3068 Process not Found 72 PID 3068 wrote to memory of 5028 3068 Process not Found 72 PID 3068 wrote to memory of 5028 3068 Process not Found 72 PID 3068 wrote to memory of 4404 3068 Process not Found 73 PID 3068 wrote to memory of 4404 3068 Process not Found 73 PID 3068 wrote to memory of 4404 3068 Process not Found 73 PID 3068 wrote to memory of 4404 3068 Process not Found 73 PID 3068 wrote to memory of 456 3068 Process not Found 74 PID 3068 wrote to memory of 456 3068 Process not Found 74 PID 3068 wrote to memory of 456 3068 Process not Found 74 PID 3068 wrote to memory of 1496 3068 Process not Found 75 PID 3068 wrote to memory of 1496 3068 Process not Found 75 PID 3068 wrote to memory of 1496 3068 Process not Found 75 PID 3068 wrote to memory of 1496 3068 Process not Found 75 PID 3068 wrote to memory of 1788 3068 Process not Found 77 PID 3068 wrote to memory of 1788 3068 Process not Found 77 PID 3068 wrote to memory of 1788 3068 Process not Found 77 PID 3068 wrote to memory of 4236 3068 Process not Found 78 PID 3068 wrote to memory of 4236 3068 Process not Found 78 PID 3068 wrote to memory of 4236 3068 Process not Found 78 PID 3068 wrote to memory of 4236 3068 Process not Found 78 PID 3068 wrote to memory of 4840 3068 Process not Found 79 PID 3068 wrote to memory of 4840 3068 Process not Found 79 PID 3068 wrote to memory of 4840 3068 Process not Found 79 PID 3068 wrote to memory of 4840 3068 Process not Found 79 PID 3068 wrote to memory of 4920 3068 Process not Found 80 PID 3068 wrote to memory of 4920 3068 Process not Found 80 PID 3068 wrote to memory of 4920 3068 Process not Found 80 PID 3068 wrote to memory of 4920 3068 Process not Found 80 PID 3068 wrote to memory of 4408 3068 Process not Found 81 PID 3068 wrote to memory of 4408 3068 Process not Found 81 PID 3068 wrote to memory of 4408 3068 Process not Found 81 PID 3068 wrote to memory of 3392 3068 Process not Found 82 PID 3068 wrote to memory of 3392 3068 Process not Found 82 PID 3068 wrote to memory of 3392 3068 Process not Found 82 PID 3068 wrote to memory of 3392 3068 Process not Found 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd8ddd8ffb89f7c714dd72e2e968e813b2d5bcaa5897bfbe6eca084ef62da571.exe"C:\Users\Admin\AppData\Local\Temp\bd8ddd8ffb89f7c714dd72e2e968e813b2d5bcaa5897bfbe6eca084ef62da571.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4264
-
C:\Users\Admin\AppData\Local\Temp\16C4.exeC:\Users\Admin\AppData\Local\Temp\16C4.exe1⤵
- Executes dropped EXE
PID:3860
-
C:\Users\Admin\AppData\Local\Temp\1CA1.exeC:\Users\Admin\AppData\Local\Temp\1CA1.exe1⤵
- Executes dropped EXE
PID:1456
-
C:\Users\Admin\AppData\Local\Temp\2E55.exeC:\Users\Admin\AppData\Local\Temp\2E55.exe1⤵
- Executes dropped EXE
PID:3540
-
C:\Users\Admin\AppData\Local\Temp\3B37.exeC:\Users\Admin\AppData\Local\Temp\3B37.exe1⤵
- Executes dropped EXE
PID:4820
-
C:\Users\Admin\AppData\Local\Temp\4097.exeC:\Users\Admin\AppData\Local\Temp\4097.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4404
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:456
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1496
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1788
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4236
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4840
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4920
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4408
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
419KB
MD593773c9cab9b15bd9238aebfe36712bf
SHA15d8878372c87b08a64298db91c884645ccf28443
SHA256b88c64f57a70f95f35fbe30ab3614608f34a2b9a6121c055d5da0358e24b6890
SHA51278d6ba07ae1e3cad90cc199f41f7d71fd2b69f2d844e7a0a6579509d48634b486165df657cb837eba3dc650612c3c71f4b1f808139d8dc85988a848381c70d87
-
Filesize
419KB
MD593773c9cab9b15bd9238aebfe36712bf
SHA15d8878372c87b08a64298db91c884645ccf28443
SHA256b88c64f57a70f95f35fbe30ab3614608f34a2b9a6121c055d5da0358e24b6890
SHA51278d6ba07ae1e3cad90cc199f41f7d71fd2b69f2d844e7a0a6579509d48634b486165df657cb837eba3dc650612c3c71f4b1f808139d8dc85988a848381c70d87
-
Filesize
356KB
MD570682f6421f864560af22030f9592d6e
SHA1873c3d4e7237813b74d20f6f598d422c08e536ab
SHA256acb8a59668d365181ce19a1fdd19aa992d86a9797f148e408daf5c7e9fa62bd3
SHA51227a576447278c55fdee54cdd3e38098774bcabba6f007d494966104572951f11b3984f314cdb1a833e8a69280d1a500a089ba5660f0f4a3a32fef575aba0c5a5
-
Filesize
356KB
MD570682f6421f864560af22030f9592d6e
SHA1873c3d4e7237813b74d20f6f598d422c08e536ab
SHA256acb8a59668d365181ce19a1fdd19aa992d86a9797f148e408daf5c7e9fa62bd3
SHA51227a576447278c55fdee54cdd3e38098774bcabba6f007d494966104572951f11b3984f314cdb1a833e8a69280d1a500a089ba5660f0f4a3a32fef575aba0c5a5
-
Filesize
356KB
MD534c6dc517df5134a240359e7e5bcaa1a
SHA15b933fa9f7634bc9813d5332b0e65e3276ef7148
SHA256d1a868c3491d26107fb5f7019b54b1ebd467294091c9675198e2fcf805a3c28e
SHA512101e18032ef5634bba987e9d33b2cc1c5f91db0db2beada259dde3367ee363924471f71a4a4cf985255b41995761927910bea0a8a0e790ef978bfbcfe8d7e7fa
-
Filesize
356KB
MD534c6dc517df5134a240359e7e5bcaa1a
SHA15b933fa9f7634bc9813d5332b0e65e3276ef7148
SHA256d1a868c3491d26107fb5f7019b54b1ebd467294091c9675198e2fcf805a3c28e
SHA512101e18032ef5634bba987e9d33b2cc1c5f91db0db2beada259dde3367ee363924471f71a4a4cf985255b41995761927910bea0a8a0e790ef978bfbcfe8d7e7fa
-
Filesize
720KB
MD56a4b0bf0bd9f496ee1398e702dcb25e1
SHA1bb020b724fc67dc818ae7a2f354fb268ed42f706
SHA2560103856c001d654207c4496b55b06921f5ed3818450a624464c5062b7668abb5
SHA512c09b4adf6f8fbb3718ec18aefba052e52179594ecfc6b08daede38815c03fa8ed3ca3b8de0fb4ec9acafb10f40ae835ba7f364e1c5876ae18aaf6291b444f4e2
-
Filesize
720KB
MD56a4b0bf0bd9f496ee1398e702dcb25e1
SHA1bb020b724fc67dc818ae7a2f354fb268ed42f706
SHA2560103856c001d654207c4496b55b06921f5ed3818450a624464c5062b7668abb5
SHA512c09b4adf6f8fbb3718ec18aefba052e52179594ecfc6b08daede38815c03fa8ed3ca3b8de0fb4ec9acafb10f40ae835ba7f364e1c5876ae18aaf6291b444f4e2
-
Filesize
447KB
MD589352e8c08c9fd0f48a76822f3f5a3b3
SHA13b1421963698640a76fb0677694f65afe1c75bc1
SHA2564b7f5a3df8170c4ea12a0ff058abb3cab8978063f551f32174ec63fa0d39071d
SHA51260c111082b26bdd38a401b3b283f63044312d73b14acc95dca474f9eeeca7bac9179d2ddff9f4172d1c5669ca2c8148c3b144bfebf9b8505aa7aeadbb1586db3
-
Filesize
447KB
MD589352e8c08c9fd0f48a76822f3f5a3b3
SHA13b1421963698640a76fb0677694f65afe1c75bc1
SHA2564b7f5a3df8170c4ea12a0ff058abb3cab8978063f551f32174ec63fa0d39071d
SHA51260c111082b26bdd38a401b3b283f63044312d73b14acc95dca474f9eeeca7bac9179d2ddff9f4172d1c5669ca2c8148c3b144bfebf9b8505aa7aeadbb1586db3