Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
252s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
12/03/2023, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe
Resource
win10-20230220-en
General
-
Target
e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe
-
Size
810KB
-
MD5
723cc9cc858c079f624d9ee5ca18d9d6
-
SHA1
f7b14e53e9a3962fe764e596b9b6d06837e01967
-
SHA256
e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32
-
SHA512
6508d5ab2127136e98463b7dcd5f10277cfda7a8591964db65f6bb1d79703712bfccf32ce3ad42c901c11a5d14408e74c71ad35a66c32e66d9d17427e184bd0d
-
SSDEEP
24576:hybQFaqQMkqfTHbVtyeeUNXd80Mf5jlET:UbQ0qQMk6/Vty0XSFf5jlE
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
dezik
193.56.146.220:4174
-
auth_value
d39f21dca8edc10800b036ab83f4d75e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c24Zz69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b4695dg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b4695dg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b4695dg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b4695dg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c24Zz69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b4695dg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c24Zz69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c24Zz69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c24Zz69.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral2/memory/2896-186-0x00000000023F0000-0x0000000002436000-memory.dmp family_redline behavioral2/memory/2896-187-0x00000000024C0000-0x0000000002504000-memory.dmp family_redline behavioral2/memory/2896-189-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-197-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-199-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-195-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-193-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-191-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-203-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-211-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-209-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-217-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-219-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-215-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-221-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-228-0x0000000004CA0000-0x0000000004CB0000-memory.dmp family_redline behavioral2/memory/2896-213-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-207-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-205-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-201-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-188-0x00000000024C0000-0x00000000024FE000-memory.dmp family_redline behavioral2/memory/2896-1110-0x0000000004CA0000-0x0000000004CB0000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3708 nice0966.exe 4296 nice8127.exe 4832 b4695dg.exe 2124 c24Zz69.exe 2896 dbGOa68.exe 4876 e51qz98.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b4695dg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c24Zz69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c24Zz69.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice0966.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice0966.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice8127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nice8127.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4832 b4695dg.exe 4832 b4695dg.exe 2124 c24Zz69.exe 2124 c24Zz69.exe 2896 dbGOa68.exe 2896 dbGOa68.exe 4876 e51qz98.exe 4876 e51qz98.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4832 b4695dg.exe Token: SeDebugPrivilege 2124 c24Zz69.exe Token: SeDebugPrivilege 2896 dbGOa68.exe Token: SeDebugPrivilege 4876 e51qz98.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3704 wrote to memory of 3708 3704 e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe 44 PID 3704 wrote to memory of 3708 3704 e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe 44 PID 3704 wrote to memory of 3708 3704 e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe 44 PID 3708 wrote to memory of 4296 3708 nice0966.exe 46 PID 3708 wrote to memory of 4296 3708 nice0966.exe 46 PID 3708 wrote to memory of 4296 3708 nice0966.exe 46 PID 4296 wrote to memory of 4832 4296 nice8127.exe 47 PID 4296 wrote to memory of 4832 4296 nice8127.exe 47 PID 4296 wrote to memory of 2124 4296 nice8127.exe 69 PID 4296 wrote to memory of 2124 4296 nice8127.exe 69 PID 4296 wrote to memory of 2124 4296 nice8127.exe 69 PID 3708 wrote to memory of 2896 3708 nice0966.exe 70 PID 3708 wrote to memory of 2896 3708 nice0966.exe 70 PID 3708 wrote to memory of 2896 3708 nice0966.exe 70 PID 3704 wrote to memory of 4876 3704 e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe 72 PID 3704 wrote to memory of 4876 3704 e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe 72 PID 3704 wrote to memory of 4876 3704 e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe"C:\Users\Admin\AppData\Local\Temp\e92881d9491223befcbf1edfcaa642c8a807bb83dda92630475a475d2cc3ed32.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice0966.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice0966.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice8127.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nice8127.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4695dg.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4695dg.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c24Zz69.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c24Zz69.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbGOa68.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dbGOa68.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e51qz98.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e51qz98.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
175KB
MD592f2a148b8f701e50e2f838f73d4d7b7
SHA1324d8546e35d4f4285cac15b21620299ba5cb023
SHA2569ad66388140ef3b4a7c2918eb3c9083dd80396949f385dd6d17c28f97cf14f04
SHA5123300c7606f872e75deaff924ee77fcd975e515a0dbca907ddd16b25910f250c6b8c46c6cabda3ac4780a8dce5fb9a70bd0c4c184f649cd5375fb6278b2a0ea6c
-
Filesize
665KB
MD5c48ded0ec8ba752ec96f2b520f7c11d1
SHA145c2624eaf76ed061c167dfc34bbeeb9a93c3ae9
SHA256e6a6c2954e3568587e47f620489e6f764a161b82882607a8b9bef2a0200f4d03
SHA512437bcbee88a36c44a793ea9f78f77c24cd8ed731f8c9340a487e1849bc406bb13f86c05c3c0fa5369abe9fe108af5e17ee8d85aea8ed4a78ae401320661a2417
-
Filesize
665KB
MD5c48ded0ec8ba752ec96f2b520f7c11d1
SHA145c2624eaf76ed061c167dfc34bbeeb9a93c3ae9
SHA256e6a6c2954e3568587e47f620489e6f764a161b82882607a8b9bef2a0200f4d03
SHA512437bcbee88a36c44a793ea9f78f77c24cd8ed731f8c9340a487e1849bc406bb13f86c05c3c0fa5369abe9fe108af5e17ee8d85aea8ed4a78ae401320661a2417
-
Filesize
307KB
MD5d764c9c93bae96f4d8e23dd49f49de51
SHA1ccc6262ab495ad1f2cb24a9d8200ec42541b1e96
SHA25660dae267daf039593aeb81b26712937cb39c038201dcb382d425b1614b37464f
SHA5126096a5fb5c00b2d1b8ea9afb30980aa9a1019b74e3a428d70b70370b38d39db89c3e46f55101109936d7abb6d6d910ef8e6f0afdb8c0eea9a254343f2a47b3d5
-
Filesize
307KB
MD5d764c9c93bae96f4d8e23dd49f49de51
SHA1ccc6262ab495ad1f2cb24a9d8200ec42541b1e96
SHA25660dae267daf039593aeb81b26712937cb39c038201dcb382d425b1614b37464f
SHA5126096a5fb5c00b2d1b8ea9afb30980aa9a1019b74e3a428d70b70370b38d39db89c3e46f55101109936d7abb6d6d910ef8e6f0afdb8c0eea9a254343f2a47b3d5
-
Filesize
333KB
MD5105dfb77e028f1abd5846e11fe9838d9
SHA1e75d0d5e76e79e0492d7b38046fbadc197e4ee01
SHA256b697461eed90f554f2eb73694dd8eddd3d6bda59376eac909b6e2f8c7ddc02c4
SHA5126f68a656f892f2864e330d6c5d773ac4bda4dc2fa83635aa37a02fb645ae2074fb59f5c3e0d36806bb9d14e10348f197947d202f9275f1fa81eb679860c176cb
-
Filesize
333KB
MD5105dfb77e028f1abd5846e11fe9838d9
SHA1e75d0d5e76e79e0492d7b38046fbadc197e4ee01
SHA256b697461eed90f554f2eb73694dd8eddd3d6bda59376eac909b6e2f8c7ddc02c4
SHA5126f68a656f892f2864e330d6c5d773ac4bda4dc2fa83635aa37a02fb645ae2074fb59f5c3e0d36806bb9d14e10348f197947d202f9275f1fa81eb679860c176cb
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
249KB
MD5dc89903abe8b603537afdce89ef284ea
SHA15891cdc4f3e47ef9cc9d8ae30592a675fe3346c1
SHA256b7a4a4ce4a28affe108f1151361fad906a96c04a2d86e5a8683847274ebd8463
SHA51242ada0f06045ba0efc0e3570411e6bf81707bdb9f8b3a97cf260df7a28e8d8d1a7a222d80bea987fe27a789cbac6a28330d18ceac5f543ec3865b571f3a6d873
-
Filesize
249KB
MD5dc89903abe8b603537afdce89ef284ea
SHA15891cdc4f3e47ef9cc9d8ae30592a675fe3346c1
SHA256b7a4a4ce4a28affe108f1151361fad906a96c04a2d86e5a8683847274ebd8463
SHA51242ada0f06045ba0efc0e3570411e6bf81707bdb9f8b3a97cf260df7a28e8d8d1a7a222d80bea987fe27a789cbac6a28330d18ceac5f543ec3865b571f3a6d873