Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/03/2023, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe
Resource
win10-20230220-en
General
-
Target
6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe
-
Size
535KB
-
MD5
5c487bd685db4d64b7f522d4414ef887
-
SHA1
8dcac6e13d9df12ccf8bd57bd3468452b23a1e14
-
SHA256
6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864
-
SHA512
197a557c3a23439fc87278bf55749715b3b700b4b83aed18db1aeae967c0578efb00e1798a9883e3cc0a8984808abfe830e2e496f02d1df737cc2f1f453d28f9
-
SSDEEP
12288:5MrFy90/b9ww49kVMwVTV76hC2Z/JDE16s9JE8zU+6K7Oxz:8yWbipWVMwVh6bZEdE8aKW
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw23OG64OS34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw23OG64OS34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw23OG64OS34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw23OG64OS34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw23OG64OS34.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/348-140-0x0000000002540000-0x0000000002586000-memory.dmp family_redline behavioral1/memory/348-142-0x0000000004AF0000-0x0000000004B34000-memory.dmp family_redline behavioral1/memory/348-143-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-144-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-146-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-150-0x0000000004C60000-0x0000000004C70000-memory.dmp family_redline behavioral1/memory/348-149-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-155-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-152-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-157-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-159-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-161-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-163-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-165-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-167-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-169-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-171-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-173-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-175-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-177-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-179-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-181-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-183-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-185-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-187-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-189-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-191-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-193-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-195-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-197-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-199-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-201-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-203-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-205-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-207-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/348-209-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4076 vmu3035dV.exe 4680 sw23OG64OS34.exe 348 tas80GS15.exe 4700 uOR69FF49.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw23OG64OS34.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmu3035dV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmu3035dV.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4680 sw23OG64OS34.exe 4680 sw23OG64OS34.exe 348 tas80GS15.exe 348 tas80GS15.exe 4700 uOR69FF49.exe 4700 uOR69FF49.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4680 sw23OG64OS34.exe Token: SeDebugPrivilege 348 tas80GS15.exe Token: SeDebugPrivilege 4700 uOR69FF49.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3520 wrote to memory of 4076 3520 6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe 66 PID 3520 wrote to memory of 4076 3520 6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe 66 PID 3520 wrote to memory of 4076 3520 6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe 66 PID 4076 wrote to memory of 4680 4076 vmu3035dV.exe 67 PID 4076 wrote to memory of 4680 4076 vmu3035dV.exe 67 PID 4076 wrote to memory of 348 4076 vmu3035dV.exe 68 PID 4076 wrote to memory of 348 4076 vmu3035dV.exe 68 PID 4076 wrote to memory of 348 4076 vmu3035dV.exe 68 PID 3520 wrote to memory of 4700 3520 6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe 70 PID 3520 wrote to memory of 4700 3520 6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe 70 PID 3520 wrote to memory of 4700 3520 6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe"C:\Users\Admin\AppData\Local\Temp\6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmu3035dV.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmu3035dV.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw23OG64OS34.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw23OG64OS34.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tas80GS15.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tas80GS15.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uOR69FF49.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uOR69FF49.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD52a3b535749ab913d70301a13b32b7974
SHA1c374d59cc4d946379f525eecaa226e8419e1da03
SHA25673015e88599e40eb2c545a8334751ad90ffc6a5c1da35dd63bf98b05fcd7ca57
SHA5127def2540589a2d9221a360ae6d525b964a65b4d0fc56bbe172659251db8543e966d7d89f72bdb1ab4fd114a243e67294d0000c6da764deeb19dd5fbfa90346bc
-
Filesize
175KB
MD52a3b535749ab913d70301a13b32b7974
SHA1c374d59cc4d946379f525eecaa226e8419e1da03
SHA25673015e88599e40eb2c545a8334751ad90ffc6a5c1da35dd63bf98b05fcd7ca57
SHA5127def2540589a2d9221a360ae6d525b964a65b4d0fc56bbe172659251db8543e966d7d89f72bdb1ab4fd114a243e67294d0000c6da764deeb19dd5fbfa90346bc
-
Filesize
391KB
MD50271de9fd30001145ae76aa8150bbbfa
SHA1cc6395259d79fef1262e18648724d401b6e125c8
SHA2567532a1178a8579be7b0aa729001ed312fc40a81d5d9f404514b47ee1b6c06f87
SHA512c59a9aca72a5adf1de32102aaa8cf0618feb018ad71f87949d664803d162fd22714548804ad23a6c4ab49821ea76aaa7a0c9bfba19aafeae06f4778ba83b6451
-
Filesize
391KB
MD50271de9fd30001145ae76aa8150bbbfa
SHA1cc6395259d79fef1262e18648724d401b6e125c8
SHA2567532a1178a8579be7b0aa729001ed312fc40a81d5d9f404514b47ee1b6c06f87
SHA512c59a9aca72a5adf1de32102aaa8cf0618feb018ad71f87949d664803d162fd22714548804ad23a6c4ab49821ea76aaa7a0c9bfba19aafeae06f4778ba83b6451
-
Filesize
11KB
MD5f98c592dc383dea1e57fb014e254ab32
SHA10ee773115c77af3099adc2e2cb1378feaa4768bc
SHA256af3086e869cbfa48f88e61aac4f302bd9e25ec28ec647daa8264e09b5ee509a5
SHA51286a06292592f1778887e152d6430e918f1215d1d77613a2c6642fb2e3e5cb98c81d923f836e25653596150a89936d8cef6bb6dd8e69aaad61d83a33079446548
-
Filesize
11KB
MD5f98c592dc383dea1e57fb014e254ab32
SHA10ee773115c77af3099adc2e2cb1378feaa4768bc
SHA256af3086e869cbfa48f88e61aac4f302bd9e25ec28ec647daa8264e09b5ee509a5
SHA51286a06292592f1778887e152d6430e918f1215d1d77613a2c6642fb2e3e5cb98c81d923f836e25653596150a89936d8cef6bb6dd8e69aaad61d83a33079446548
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd