Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/03/2023, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe
Resource
win10-20230220-en
General
-
Target
2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe
-
Size
693KB
-
MD5
e9d40ad63e4137feee241f74a524a716
-
SHA1
dd45e8d842e0227dc35e7dc8163f9fa409164286
-
SHA256
2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990
-
SHA512
ec1a9c292dc2c2875aedff12c4204b4b6851a6998b844dab1d5588afc87e789cd4d604ea8918071e3d23d0c6479fd5256b9c6b7da381b9dbb63be4d229f7f6e3
-
SSDEEP
12288:4MrXy90ZlA4EHzWanKNGuGGKYumsyDBazzPNHA9amOAK+x8ofpc:fyIWHKWa5Kxmsyw3PNHyugrfpc
Malware Config
Extracted
redline
ruzhpe
pepunn.com:4162
-
auth_value
f735ced96ae8d01d0bd1d514240e54e0
Extracted
redline
fchan
pepunn.com:4162
-
auth_value
127bd53d55e8c4f0dd2f6e1ea60deef4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urKM22MS23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urKM22MS23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urKM22MS23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urKM22MS23.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urKM22MS23.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4444-179-0x0000000003070000-0x00000000030B6000-memory.dmp family_redline behavioral1/memory/4444-182-0x0000000004AF0000-0x0000000004B34000-memory.dmp family_redline behavioral1/memory/4444-184-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-186-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-183-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-188-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-190-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-192-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-194-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-196-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-198-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-200-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-202-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-204-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-206-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-208-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-210-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-212-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-215-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/4444-217-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4044 ycwf96Pa35.exe 4128 urKM22MS23.exe 4444 wrGj16cb55.exe 4588 xuNn27bE50.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urKM22MS23.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urKM22MS23.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ycwf96Pa35.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycwf96Pa35.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4128 urKM22MS23.exe 4128 urKM22MS23.exe 4444 wrGj16cb55.exe 4444 wrGj16cb55.exe 4588 xuNn27bE50.exe 4588 xuNn27bE50.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4128 urKM22MS23.exe Token: SeDebugPrivilege 4444 wrGj16cb55.exe Token: SeDebugPrivilege 4588 xuNn27bE50.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4300 wrote to memory of 4044 4300 2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe 66 PID 4300 wrote to memory of 4044 4300 2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe 66 PID 4300 wrote to memory of 4044 4300 2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe 66 PID 4044 wrote to memory of 4128 4044 ycwf96Pa35.exe 67 PID 4044 wrote to memory of 4128 4044 ycwf96Pa35.exe 67 PID 4044 wrote to memory of 4128 4044 ycwf96Pa35.exe 67 PID 4044 wrote to memory of 4444 4044 ycwf96Pa35.exe 68 PID 4044 wrote to memory of 4444 4044 ycwf96Pa35.exe 68 PID 4044 wrote to memory of 4444 4044 ycwf96Pa35.exe 68 PID 4300 wrote to memory of 4588 4300 2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe 70 PID 4300 wrote to memory of 4588 4300 2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe 70 PID 4300 wrote to memory of 4588 4300 2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe"C:\Users\Admin\AppData\Local\Temp\2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycwf96Pa35.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycwf96Pa35.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urKM22MS23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urKM22MS23.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGj16cb55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGj16cb55.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuNn27bE50.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuNn27bE50.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5347000255a377eff6fb9b7b65105ae9f
SHA1405d3f6db5bc71e59b7be2d9126af024ce124580
SHA25688549c26ed9d798aa77e1d22dc19238daa4bf63ca438f662e2a3515386713486
SHA5121355aa36ce508e00b08b0845c4e303ea7b4d34f62856d29b6e5c78dcf74248fdaa2dc829dfae21215d14bc8f73c0e94cd0fb2e19d3b0e9033de8973869030cf8
-
Filesize
175KB
MD5347000255a377eff6fb9b7b65105ae9f
SHA1405d3f6db5bc71e59b7be2d9126af024ce124580
SHA25688549c26ed9d798aa77e1d22dc19238daa4bf63ca438f662e2a3515386713486
SHA5121355aa36ce508e00b08b0845c4e303ea7b4d34f62856d29b6e5c78dcf74248fdaa2dc829dfae21215d14bc8f73c0e94cd0fb2e19d3b0e9033de8973869030cf8
-
Filesize
548KB
MD513982f23afe0c6d0ede1cf006755bb57
SHA1b41a3edd5a20b53825877878e158f0100bf51843
SHA256051b4ac35c5ddc85de3b652aafeb0d1016dd2a39a4045fed27c9699991d21dee
SHA5122648c2378c9d63d9e0c0411650ee0a30168b5eeb06eb6840ea13a9ee00cf56e31157925df51c46bc63f2de7b737d491f1ec88cfb121aa2f54367f94edbde1bf9
-
Filesize
548KB
MD513982f23afe0c6d0ede1cf006755bb57
SHA1b41a3edd5a20b53825877878e158f0100bf51843
SHA256051b4ac35c5ddc85de3b652aafeb0d1016dd2a39a4045fed27c9699991d21dee
SHA5122648c2378c9d63d9e0c0411650ee0a30168b5eeb06eb6840ea13a9ee00cf56e31157925df51c46bc63f2de7b737d491f1ec88cfb121aa2f54367f94edbde1bf9
-
Filesize
352KB
MD56345b3da7da3d9a3012ba87a252a29f6
SHA1a36f23e5d0802652705df132bce0a8589ff5e7bf
SHA256caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df
SHA5123d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82
-
Filesize
352KB
MD56345b3da7da3d9a3012ba87a252a29f6
SHA1a36f23e5d0802652705df132bce0a8589ff5e7bf
SHA256caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df
SHA5123d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82
-
Filesize
410KB
MD5cc1e39c942634bbd04ef3eb880af3cb4
SHA1390ee64e70074c204d8c7fc736e69b91940375bc
SHA25698f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec
SHA512f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2
-
Filesize
410KB
MD5cc1e39c942634bbd04ef3eb880af3cb4
SHA1390ee64e70074c204d8c7fc736e69b91940375bc
SHA25698f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec
SHA512f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2