Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
56s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05/03/2023, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe
Resource
win10-20230220-en
General
-
Target
a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe
-
Size
530KB
-
MD5
a9e8bab6da6d60a329faf78e0b2efab2
-
SHA1
0d49d120d1a34769976e8706f9b753a5de573c2d
-
SHA256
a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c
-
SHA512
4f825e6ade660723a53993a7bf7b4155477843b08f53122f5a8e64a6b3aab3b1abd32c357ed40474960de1148f213e76283373b3d9afd9955e7b6338454f9ee8
-
SSDEEP
12288:tMrfy9045p3D2Ho/ptF/vSs62qPGFSG0gc9N:yyh5MCpmPPGFq7
Malware Config
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf13Iz98KQ34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf13Iz98KQ34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf13Iz98KQ34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf13Iz98KQ34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf13Iz98KQ34.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 37 IoCs
resource yara_rule behavioral1/memory/2240-138-0x0000000002590000-0x00000000025D6000-memory.dmp family_redline behavioral1/memory/2240-140-0x0000000004B10000-0x0000000004B54000-memory.dmp family_redline behavioral1/memory/2240-141-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-144-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-146-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-142-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-148-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-150-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-152-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-154-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-156-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-159-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-163-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-165-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-167-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-169-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-171-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-173-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-175-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-177-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-179-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-181-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-183-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-185-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-187-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-189-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-191-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-193-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-195-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-197-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-199-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-201-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-203-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-205-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-207-0x0000000004B10000-0x0000000004B4E000-memory.dmp family_redline behavioral1/memory/2240-1061-0x0000000004BD0000-0x0000000004BE0000-memory.dmp family_redline behavioral1/memory/2240-1063-0x0000000004BD0000-0x0000000004BE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1424 vhqw9767Hk.exe 4144 sf13Iz98KQ34.exe 2240 tf03wr94QZ95.exe 3040 uhBP89vV16xa.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf13Iz98KQ34.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhqw9767Hk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhqw9767Hk.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4144 sf13Iz98KQ34.exe 4144 sf13Iz98KQ34.exe 2240 tf03wr94QZ95.exe 2240 tf03wr94QZ95.exe 3040 uhBP89vV16xa.exe 3040 uhBP89vV16xa.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4144 sf13Iz98KQ34.exe Token: SeDebugPrivilege 2240 tf03wr94QZ95.exe Token: SeDebugPrivilege 3040 uhBP89vV16xa.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 352 wrote to memory of 1424 352 a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe 66 PID 352 wrote to memory of 1424 352 a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe 66 PID 352 wrote to memory of 1424 352 a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe 66 PID 1424 wrote to memory of 4144 1424 vhqw9767Hk.exe 67 PID 1424 wrote to memory of 4144 1424 vhqw9767Hk.exe 67 PID 1424 wrote to memory of 2240 1424 vhqw9767Hk.exe 68 PID 1424 wrote to memory of 2240 1424 vhqw9767Hk.exe 68 PID 1424 wrote to memory of 2240 1424 vhqw9767Hk.exe 68 PID 352 wrote to memory of 3040 352 a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe 70 PID 352 wrote to memory of 3040 352 a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe 70 PID 352 wrote to memory of 3040 352 a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe"C:\Users\Admin\AppData\Local\Temp\a10dfeb1752c52cfc6bbfaf0ab66fbf07eab270c82d6e36d1437b80ec258fb6c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhqw9767Hk.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhqw9767Hk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf13Iz98KQ34.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf13Iz98KQ34.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03wr94QZ95.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf03wr94QZ95.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhBP89vV16xa.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhBP89vV16xa.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD596fda0275f5e6d19a55c5b415360862b
SHA1a905088bccd23ba53d083f52d00dc45a3540f8e0
SHA256d7e59e2ee2b7620b003aca4c046199cbaf07ee4bb94326d597e2a86dffe3d71b
SHA512a493847bd64782cfa719acffa191b4980550d23b89021fa3b79321307f12aafd3b71c96b479a14329b7dbb9d516f1109c1bf8e913302c0569667273c86e97f73
-
Filesize
175KB
MD596fda0275f5e6d19a55c5b415360862b
SHA1a905088bccd23ba53d083f52d00dc45a3540f8e0
SHA256d7e59e2ee2b7620b003aca4c046199cbaf07ee4bb94326d597e2a86dffe3d71b
SHA512a493847bd64782cfa719acffa191b4980550d23b89021fa3b79321307f12aafd3b71c96b479a14329b7dbb9d516f1109c1bf8e913302c0569667273c86e97f73
-
Filesize
386KB
MD54858894522074c52a70f538747b21c14
SHA110940bb0911fd476e04f66edefdead440274858d
SHA256d70ef1ec9f18d956dc223661d798b25096a7fe7e570bb17bb6ac11c9c68af007
SHA512043460d9e5101f08767ad336bfe514f80bfb25d031dd19aa877f54e1f1b2e56f43067a7855009ae6f0e6fb4ffc154d7d5aca3bebe953ee3033b3adf29b98db39
-
Filesize
386KB
MD54858894522074c52a70f538747b21c14
SHA110940bb0911fd476e04f66edefdead440274858d
SHA256d70ef1ec9f18d956dc223661d798b25096a7fe7e570bb17bb6ac11c9c68af007
SHA512043460d9e5101f08767ad336bfe514f80bfb25d031dd19aa877f54e1f1b2e56f43067a7855009ae6f0e6fb4ffc154d7d5aca3bebe953ee3033b3adf29b98db39
-
Filesize
11KB
MD551ca1ac1040845b78480127865ac0378
SHA13bd4dd4d620728117aa090dc828d17da6f6eb8c8
SHA25627d0fa6fd2d83136684d43fc81540375e2e047e5a1aecd793a576879fd0fd781
SHA5124f9cabf1e71089acbcae35a180226b5fb4dd03f084bab03c85ac10a77545d0730d6cfbd8f80ed85e9337e6f2a99cc5431db90ce892fca908bb09d9c62d5b404d
-
Filesize
11KB
MD551ca1ac1040845b78480127865ac0378
SHA13bd4dd4d620728117aa090dc828d17da6f6eb8c8
SHA25627d0fa6fd2d83136684d43fc81540375e2e047e5a1aecd793a576879fd0fd781
SHA5124f9cabf1e71089acbcae35a180226b5fb4dd03f084bab03c85ac10a77545d0730d6cfbd8f80ed85e9337e6f2a99cc5431db90ce892fca908bb09d9c62d5b404d
-
Filesize
293KB
MD5dc46cb34b733eb4be1b44f9cc7c7d6e1
SHA108972fbd4db0346b9a5aa7651f1948e212cbbe6f
SHA25679e234cc24dfe4d038a4e8eeb3f6f993d71c4c7823ae4a7abfc0e149df57103e
SHA5128cf36db8e149189b1262d31be684329159f3fd41b2bbd1a23a91413d821eb7d0b825a467b56e508d921d1464fcaa183424dc05ebe45280dfc389bec65ba1f1b4
-
Filesize
293KB
MD5dc46cb34b733eb4be1b44f9cc7c7d6e1
SHA108972fbd4db0346b9a5aa7651f1948e212cbbe6f
SHA25679e234cc24dfe4d038a4e8eeb3f6f993d71c4c7823ae4a7abfc0e149df57103e
SHA5128cf36db8e149189b1262d31be684329159f3fd41b2bbd1a23a91413d821eb7d0b825a467b56e508d921d1464fcaa183424dc05ebe45280dfc389bec65ba1f1b4