Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/03/2023, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe
Resource
win10-20230220-en
General
-
Target
3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe
-
Size
550KB
-
MD5
a85330aac14de3fa2beb5d4bbc822333
-
SHA1
851821c71c2ab4c541f3272ece5fad50a6dd07f4
-
SHA256
3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18
-
SHA512
2fbe8b89f89bbc3e84e8adf2046ce2f195d3d10eb62e4570acce5cb64c9fac4396d0fb2ce105b0415e43b1e074f6401b3ed72a8468254252793bc7ce7abcf662
-
SSDEEP
12288:gMrGy90eOq+owy2hc40JqzQ50canEcwBVJBui:WyRfwyX4aDmEcwBVB
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5488Vn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5488Vn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5488Vn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5488Vn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5488Vn.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2384-142-0x0000000004A60000-0x0000000004AA6000-memory.dmp family_redline behavioral1/memory/2384-144-0x0000000005000000-0x0000000005044000-memory.dmp family_redline behavioral1/memory/2384-148-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-149-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-151-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-153-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-155-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-157-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-159-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-163-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-161-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-165-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-169-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-167-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-171-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-173-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-175-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-179-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-177-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-183-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-181-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-187-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-189-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-193-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-191-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-197-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-199-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-203-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-211-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-209-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-207-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-205-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-201-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-195-0x0000000005000000-0x000000000503E000-memory.dmp family_redline behavioral1/memory/2384-185-0x0000000005000000-0x000000000503E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1220 nice1491.exe 1468 b5488Vn.exe 2384 c45XY73.exe 3820 djfAo24.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5488Vn.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice1491.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice1491.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1468 b5488Vn.exe 1468 b5488Vn.exe 2384 c45XY73.exe 2384 c45XY73.exe 3820 djfAo24.exe 3820 djfAo24.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1468 b5488Vn.exe Token: SeDebugPrivilege 2384 c45XY73.exe Token: SeDebugPrivilege 3820 djfAo24.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1028 wrote to memory of 1220 1028 3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe 66 PID 1028 wrote to memory of 1220 1028 3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe 66 PID 1028 wrote to memory of 1220 1028 3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe 66 PID 1220 wrote to memory of 1468 1220 nice1491.exe 67 PID 1220 wrote to memory of 1468 1220 nice1491.exe 67 PID 1220 wrote to memory of 2384 1220 nice1491.exe 68 PID 1220 wrote to memory of 2384 1220 nice1491.exe 68 PID 1220 wrote to memory of 2384 1220 nice1491.exe 68 PID 1028 wrote to memory of 3820 1028 3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe 70 PID 1028 wrote to memory of 3820 1028 3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe 70 PID 1028 wrote to memory of 3820 1028 3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe"C:\Users\Admin\AppData\Local\Temp\3563dd9dcaab82663d0fe12eabdc8a5d8be00f85cb460ca6392eb99aa6affc18.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice1491.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice1491.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5488Vn.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5488Vn.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c45XY73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c45XY73.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\djfAo24.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\djfAo24.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
405KB
MD5dbdfa53b1822bfc9dbb393627f7ff680
SHA1fe994026fc8cbd819b0ce21a2cf6f3a8853726e8
SHA256989637e42808651aca00aa71c2e1b390f4861c20968e299a2d519efe4b99399c
SHA51268279436122287734410ad997cb3e3b9eb2998c720763d9877248c8b4375a9fab07a92551ea41406352b028ff67b91aa328c8218621fcef169a95c404cc016c1
-
Filesize
405KB
MD5dbdfa53b1822bfc9dbb393627f7ff680
SHA1fe994026fc8cbd819b0ce21a2cf6f3a8853726e8
SHA256989637e42808651aca00aa71c2e1b390f4861c20968e299a2d519efe4b99399c
SHA51268279436122287734410ad997cb3e3b9eb2998c720763d9877248c8b4375a9fab07a92551ea41406352b028ff67b91aa328c8218621fcef169a95c404cc016c1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
373KB
MD5daaf03783a48918495bfa8bf8a54e9a1
SHA18134d5b7f9293f034c637dad31c3cce0e9ba97f5
SHA256ac0d29166950289292b6cd17423c60ae3be7b27000ed4754931a4ca4897c2f77
SHA5125c70b79fb9a33342cae3e0776cc43916f26a5076e90cf40eed9519b438b9de03510a55b26bffc5fa98ce3c3c46eb7397220a7bd94cf6d193f8bd05c33c2800a2
-
Filesize
373KB
MD5daaf03783a48918495bfa8bf8a54e9a1
SHA18134d5b7f9293f034c637dad31c3cce0e9ba97f5
SHA256ac0d29166950289292b6cd17423c60ae3be7b27000ed4754931a4ca4897c2f77
SHA5125c70b79fb9a33342cae3e0776cc43916f26a5076e90cf40eed9519b438b9de03510a55b26bffc5fa98ce3c3c46eb7397220a7bd94cf6d193f8bd05c33c2800a2