Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/03/2023, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe
Resource
win10-20230220-en
General
-
Target
e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe
-
Size
562KB
-
MD5
32ac7989d4e6b0eb6246f9ee3c3f89a4
-
SHA1
1fd782b5e03974fe4d61bf315e68ea75bbffc479
-
SHA256
e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed
-
SHA512
e8320a4bb7d91701e24ef9851e650a414df461acfaae20a911d6011cab947bf6332b7f81aebae38f32d9509fc0d70dd55b376c8db97bd4cb7f9c417e175373cf
-
SSDEEP
12288:QMrcy90/QeT/nWokqjCLNg8ZbgYYyJ00cLvAYOssqwW0L:cyb9qjCzV00cLIYOsr90L
Malware Config
Extracted
redline
fabio
193.233.20.27:4123
-
auth_value
56b82736c3f56b13be8e64c87d2cf9e5
Extracted
redline
fud
193.233.20.27:4123
-
auth_value
cddc991efd6918ad5321d80dac884b40
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf49bZ64dG06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf49bZ64dG06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf49bZ64dG06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf49bZ64dG06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf49bZ64dG06.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/3132-151-0x0000000004950000-0x0000000004996000-memory.dmp family_redline behavioral1/memory/3132-154-0x0000000004EE0000-0x0000000004F24000-memory.dmp family_redline behavioral1/memory/3132-156-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-157-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-160-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-163-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-165-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-171-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-169-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-173-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-175-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-177-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-180-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-183-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-185-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-187-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-189-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-191-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-193-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-195-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-197-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-199-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-201-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-203-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-205-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-207-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-209-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-211-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-213-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-215-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-217-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-219-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3132-221-0x0000000004EE0000-0x0000000004F1E000-memory.dmp family_redline behavioral1/memory/3932-1077-0x0000000005060000-0x0000000005070000-memory.dmp family_redline -
Executes dropped EXE 5 IoCs
pid Process 2348 vhJg2890xE.exe 2576 sf49bZ64dG06.exe 2700 tf45Dp58lE06.exe 3132 tf45Dp58lE06.exe 3932 uhsQ43TJ17jB.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf49bZ64dG06.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vhJg2890xE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhJg2890xE.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 3132 2700 tf45Dp58lE06.exe 69 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2576 sf49bZ64dG06.exe 2576 sf49bZ64dG06.exe 3932 uhsQ43TJ17jB.exe 3932 uhsQ43TJ17jB.exe 3132 tf45Dp58lE06.exe 3132 tf45Dp58lE06.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2576 sf49bZ64dG06.exe Token: SeDebugPrivilege 3132 tf45Dp58lE06.exe Token: SeDebugPrivilege 3932 uhsQ43TJ17jB.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2348 2132 e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe 66 PID 2132 wrote to memory of 2348 2132 e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe 66 PID 2132 wrote to memory of 2348 2132 e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe 66 PID 2348 wrote to memory of 2576 2348 vhJg2890xE.exe 67 PID 2348 wrote to memory of 2576 2348 vhJg2890xE.exe 67 PID 2348 wrote to memory of 2700 2348 vhJg2890xE.exe 68 PID 2348 wrote to memory of 2700 2348 vhJg2890xE.exe 68 PID 2348 wrote to memory of 2700 2348 vhJg2890xE.exe 68 PID 2700 wrote to memory of 3132 2700 tf45Dp58lE06.exe 69 PID 2700 wrote to memory of 3132 2700 tf45Dp58lE06.exe 69 PID 2700 wrote to memory of 3132 2700 tf45Dp58lE06.exe 69 PID 2700 wrote to memory of 3132 2700 tf45Dp58lE06.exe 69 PID 2700 wrote to memory of 3132 2700 tf45Dp58lE06.exe 69 PID 2700 wrote to memory of 3132 2700 tf45Dp58lE06.exe 69 PID 2700 wrote to memory of 3132 2700 tf45Dp58lE06.exe 69 PID 2700 wrote to memory of 3132 2700 tf45Dp58lE06.exe 69 PID 2700 wrote to memory of 3132 2700 tf45Dp58lE06.exe 69 PID 2132 wrote to memory of 3932 2132 e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe 70 PID 2132 wrote to memory of 3932 2132 e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe 70 PID 2132 wrote to memory of 3932 2132 e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe"C:\Users\Admin\AppData\Local\Temp\e45bfde16f296a41109a990c06659eecfc4cfdbbdb7e21edcff7bd149629f0ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhJg2890xE.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhJg2890xE.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf49bZ64dG06.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf49bZ64dG06.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf45Dp58lE06.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf45Dp58lE06.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf45Dp58lE06.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf45Dp58lE06.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhsQ43TJ17jB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhsQ43TJ17jB.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD56d45b8ebd7094edf5f494a4dbe2390d8
SHA1f54d3185fb37b4d1ae1fd33e7be25a0a0d40290e
SHA25620649f7f872d7fcb468f782a450ca014fb91d03c297312d5d4803110331b56f5
SHA512831bcc6e7b1ae4ee87c1ee075545e473098e206b4de5cfa81202b8ba726f0827dc0163d8adc247afb088f3d7a0e24c677863962d7f82855433d3d485ee344963
-
Filesize
176KB
MD56d45b8ebd7094edf5f494a4dbe2390d8
SHA1f54d3185fb37b4d1ae1fd33e7be25a0a0d40290e
SHA25620649f7f872d7fcb468f782a450ca014fb91d03c297312d5d4803110331b56f5
SHA512831bcc6e7b1ae4ee87c1ee075545e473098e206b4de5cfa81202b8ba726f0827dc0163d8adc247afb088f3d7a0e24c677863962d7f82855433d3d485ee344963
-
Filesize
417KB
MD5eab0518dca6305af6f8f1ef37b4b195d
SHA1dafbaa03b32df1ff988bae04089c272c22925103
SHA25650d9036519d4fca464051f3b9fce860fa31754342a0cf3ab43c0d9835dd670a9
SHA512509ae2437e9631c47819404eb9934eb8adb676a80ffac326227b9b83d213841aa26953c5b6a622537a11ad18af3fe5f1826d17095fe1bea37c65a74a1366dde8
-
Filesize
417KB
MD5eab0518dca6305af6f8f1ef37b4b195d
SHA1dafbaa03b32df1ff988bae04089c272c22925103
SHA25650d9036519d4fca464051f3b9fce860fa31754342a0cf3ab43c0d9835dd670a9
SHA512509ae2437e9631c47819404eb9934eb8adb676a80ffac326227b9b83d213841aa26953c5b6a622537a11ad18af3fe5f1826d17095fe1bea37c65a74a1366dde8
-
Filesize
12KB
MD5b441deea68e22f7eef0e0c322b609d36
SHA1d70b770bc4c93fd9006f79a1e2e73c8ed965b73d
SHA25646ac548c9a4fd01ee46d7ede581988f420a3dab59ed4155a3c3a980aa259d41a
SHA512e8f55e823a7fce14896d89eac9141b0e1b0f51652c7e68d59fc062c76f6ea227ac9a904d1de5ced6df24eb04751f9793ca2c5c35d57fcf22b7fba86dedaa0696
-
Filesize
12KB
MD5b441deea68e22f7eef0e0c322b609d36
SHA1d70b770bc4c93fd9006f79a1e2e73c8ed965b73d
SHA25646ac548c9a4fd01ee46d7ede581988f420a3dab59ed4155a3c3a980aa259d41a
SHA512e8f55e823a7fce14896d89eac9141b0e1b0f51652c7e68d59fc062c76f6ea227ac9a904d1de5ced6df24eb04751f9793ca2c5c35d57fcf22b7fba86dedaa0696
-
Filesize
421KB
MD5a1a8c7e021590c6ccb05a2a54e7d6f12
SHA176cabb2806779c8bcaba0f6ca25de05d2a4cda32
SHA256ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8
SHA512556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2
-
Filesize
421KB
MD5a1a8c7e021590c6ccb05a2a54e7d6f12
SHA176cabb2806779c8bcaba0f6ca25de05d2a4cda32
SHA256ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8
SHA512556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2
-
Filesize
421KB
MD5a1a8c7e021590c6ccb05a2a54e7d6f12
SHA176cabb2806779c8bcaba0f6ca25de05d2a4cda32
SHA256ffa315cca20806209add23fb058b99380ac07212267bf8fceb265976a24207b8
SHA512556cb80ba26000eb1426c652b995add13e2f8eb062820d34549317e82e785805b10d19b72942c505e3e1a0c5d985e9e01fcff7ab41124d903b72ce0570acaac2