Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/03/2023, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe
Resource
win10-20230220-en
General
-
Target
c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe
-
Size
536KB
-
MD5
4826cd54b93b76f7f367fe5060ad2244
-
SHA1
97ebcd743fc3de014682e27f6c40d104f7d96afb
-
SHA256
c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59
-
SHA512
93613a97c7cabd320aea773b61304ba50a37809f1cc6810f5206cd6f983b72051f1b59a0d061154a325f3bd06882a0629de1042ce9fb6500ac09774c554ea40f
-
SSDEEP
12288:PMrGy9090mNEQ/4JrVmKWXei7a402BYmPyDpb:tyBmF6EKWXei7a4nZa9
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw14dp68vo04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw14dp68vo04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw14dp68vo04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw14dp68vo04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw14dp68vo04.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1928-136-0x00000000022B0000-0x00000000022F6000-memory.dmp family_redline behavioral1/memory/1928-138-0x0000000004B70000-0x0000000004BB4000-memory.dmp family_redline behavioral1/memory/1928-143-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-144-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-146-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-148-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-150-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-152-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-154-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-156-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-158-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-160-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-162-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-164-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-166-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-168-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-170-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-172-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-174-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-176-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-178-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-180-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-182-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-184-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-186-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-188-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-190-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-192-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-194-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-196-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-198-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-200-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-202-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-204-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1928-206-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3924 vaG2915Qd.exe 4944 sw14dp68vo04.exe 1928 tqh52fq14.exe 2684 uiW82vV51.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw14dp68vo04.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vaG2915Qd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vaG2915Qd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4944 sw14dp68vo04.exe 4944 sw14dp68vo04.exe 1928 tqh52fq14.exe 1928 tqh52fq14.exe 2684 uiW82vV51.exe 2684 uiW82vV51.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4944 sw14dp68vo04.exe Token: SeDebugPrivilege 1928 tqh52fq14.exe Token: SeDebugPrivilege 2684 uiW82vV51.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4140 wrote to memory of 3924 4140 c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe 66 PID 4140 wrote to memory of 3924 4140 c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe 66 PID 4140 wrote to memory of 3924 4140 c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe 66 PID 3924 wrote to memory of 4944 3924 vaG2915Qd.exe 67 PID 3924 wrote to memory of 4944 3924 vaG2915Qd.exe 67 PID 3924 wrote to memory of 1928 3924 vaG2915Qd.exe 68 PID 3924 wrote to memory of 1928 3924 vaG2915Qd.exe 68 PID 3924 wrote to memory of 1928 3924 vaG2915Qd.exe 68 PID 4140 wrote to memory of 2684 4140 c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe 70 PID 4140 wrote to memory of 2684 4140 c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe 70 PID 4140 wrote to memory of 2684 4140 c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe"C:\Users\Admin\AppData\Local\Temp\c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vaG2915Qd.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vaG2915Qd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw14dp68vo04.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw14dp68vo04.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tqh52fq14.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tqh52fq14.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uiW82vV51.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uiW82vV51.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c6593634d571666e5e14259300c9d670
SHA1d2eaae11004187755e4bf7f772356dd1a66b9177
SHA256d6650121e25bac68fb1217d039afd63f911d0a601fbda5f217ca59b97f668592
SHA5121dcf9e2ee5a9cc4d7495e30a27d45531d068ba08177457cc4d002e0ce0ae75c9082f9d4587ddba691664b51d8e1de468b5b642ca58576985eebb4455e3f15b45
-
Filesize
175KB
MD5c6593634d571666e5e14259300c9d670
SHA1d2eaae11004187755e4bf7f772356dd1a66b9177
SHA256d6650121e25bac68fb1217d039afd63f911d0a601fbda5f217ca59b97f668592
SHA5121dcf9e2ee5a9cc4d7495e30a27d45531d068ba08177457cc4d002e0ce0ae75c9082f9d4587ddba691664b51d8e1de468b5b642ca58576985eebb4455e3f15b45
-
Filesize
391KB
MD55dac3e39f9f782c8080e0ceb530b7b23
SHA139b476374f39e0e676b0d808e8bc656151ba89d0
SHA2563075457ccc52072552a825eb728ddebd9247d332e10ace5c5f1832041213af0c
SHA5124de987429dbca0d95f9d62640758016f069e030fdde0f0e949e1f0f426db9183352e6be1c63e11f73b326f2084ec497b431da1a066a93bbbfa6177126f51b797
-
Filesize
391KB
MD55dac3e39f9f782c8080e0ceb530b7b23
SHA139b476374f39e0e676b0d808e8bc656151ba89d0
SHA2563075457ccc52072552a825eb728ddebd9247d332e10ace5c5f1832041213af0c
SHA5124de987429dbca0d95f9d62640758016f069e030fdde0f0e949e1f0f426db9183352e6be1c63e11f73b326f2084ec497b431da1a066a93bbbfa6177126f51b797
-
Filesize
11KB
MD556437247eac756c77d8358b886d51dd3
SHA1697718c23e3e4725f7327d69128bd3fff4d6c2f6
SHA25630f08dc44e1d8dfc1d1c568415abaa51805e07d8abe233fac97fe89724a4426e
SHA512c7be7a9450262fa574941c2e212a6f69d7a9ed1b4faf04ef912313ca75e82e8bfc9932c569ce357f3c3c8dd2b95a57eb12aaaf49a0c378bf888986d262b5f594
-
Filesize
11KB
MD556437247eac756c77d8358b886d51dd3
SHA1697718c23e3e4725f7327d69128bd3fff4d6c2f6
SHA25630f08dc44e1d8dfc1d1c568415abaa51805e07d8abe233fac97fe89724a4426e
SHA512c7be7a9450262fa574941c2e212a6f69d7a9ed1b4faf04ef912313ca75e82e8bfc9932c569ce357f3c3c8dd2b95a57eb12aaaf49a0c378bf888986d262b5f594
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e