Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/03/2023, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe
Resource
win10-20230220-en
General
-
Target
620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe
-
Size
656KB
-
MD5
35a4bbf219f14e2391d50447026dc9a3
-
SHA1
7aea149c61bdd8a2a21ffa64df12c1d1bc7929e7
-
SHA256
620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545
-
SHA512
6dcc5a62c312c3acfe5ac166636826cd965de3d2f27dffa6499ed7261f40fe441fdafb19aa77c7d059e914cec46ce64408877685a391ac9939b825a838547ad0
-
SSDEEP
12288:dMrMy90dFyQuGfSiZUWvzy8DUPWyo/AjYXJo2jXRED2:ZyTa2WoPKHrzREK
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c39Bx44.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c39Bx44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c39Bx44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c39Bx44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c39Bx44.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 23 IoCs
resource yara_rule behavioral1/memory/548-128-0x00000000008B0000-0x00000000008F6000-memory.dmp family_redline behavioral1/memory/548-129-0x0000000002280000-0x00000000022C4000-memory.dmp family_redline behavioral1/memory/548-130-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-131-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-141-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-139-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-137-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-135-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-143-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-133-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-149-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-155-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-157-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-161-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-163-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-159-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-153-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-151-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-147-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-145-0x0000000002280000-0x00000000022BE000-memory.dmp family_redline behavioral1/memory/548-321-0x0000000000660000-0x00000000006A0000-memory.dmp family_redline behavioral1/memory/548-322-0x0000000000660000-0x00000000006A0000-memory.dmp family_redline behavioral1/memory/548-1039-0x0000000000660000-0x00000000006A0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1472 nice8937.exe 516 b5203Nn.exe 576 c39Bx44.exe 548 dcNPv76.exe -
Loads dropped DLL 9 IoCs
pid Process 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 1472 nice8937.exe 1472 nice8937.exe 1472 nice8937.exe 1472 nice8937.exe 576 c39Bx44.exe 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 548 dcNPv76.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5203Nn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features c39Bx44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c39Bx44.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice8937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice8937.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 516 b5203Nn.exe 516 b5203Nn.exe 576 c39Bx44.exe 576 c39Bx44.exe 548 dcNPv76.exe 548 dcNPv76.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 516 b5203Nn.exe Token: SeDebugPrivilege 576 c39Bx44.exe Token: SeDebugPrivilege 548 dcNPv76.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1472 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 28 PID 1416 wrote to memory of 1472 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 28 PID 1416 wrote to memory of 1472 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 28 PID 1416 wrote to memory of 1472 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 28 PID 1416 wrote to memory of 1472 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 28 PID 1416 wrote to memory of 1472 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 28 PID 1416 wrote to memory of 1472 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 28 PID 1472 wrote to memory of 516 1472 nice8937.exe 29 PID 1472 wrote to memory of 516 1472 nice8937.exe 29 PID 1472 wrote to memory of 516 1472 nice8937.exe 29 PID 1472 wrote to memory of 516 1472 nice8937.exe 29 PID 1472 wrote to memory of 516 1472 nice8937.exe 29 PID 1472 wrote to memory of 516 1472 nice8937.exe 29 PID 1472 wrote to memory of 516 1472 nice8937.exe 29 PID 1472 wrote to memory of 576 1472 nice8937.exe 30 PID 1472 wrote to memory of 576 1472 nice8937.exe 30 PID 1472 wrote to memory of 576 1472 nice8937.exe 30 PID 1472 wrote to memory of 576 1472 nice8937.exe 30 PID 1472 wrote to memory of 576 1472 nice8937.exe 30 PID 1472 wrote to memory of 576 1472 nice8937.exe 30 PID 1472 wrote to memory of 576 1472 nice8937.exe 30 PID 1416 wrote to memory of 548 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 31 PID 1416 wrote to memory of 548 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 31 PID 1416 wrote to memory of 548 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 31 PID 1416 wrote to memory of 548 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 31 PID 1416 wrote to memory of 548 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 31 PID 1416 wrote to memory of 548 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 31 PID 1416 wrote to memory of 548 1416 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe"C:\Users\Admin\AppData\Local\Temp\620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice8937.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice8937.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5203Nn.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5203Nn.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c39Bx44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c39Bx44.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dcNPv76.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dcNPv76.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD50b6f18b8f2a67968290d25d861a773a4
SHA15791445b8c80a36b0c5c6493a1789ce9a6c84474
SHA25600afc2bc75d63a36153e649b87830e72ab1e360a5ff146d8fc28c7f39f2e548a
SHA512762012e47f5d13b11d653d3442ef3d1b83463d9ee3830d52124a53817c27fc84629d3c5f11991efc3d21b8ec8aca5ab2b8e158f6f43f6db9b4bd06e5d99b8c18
-
Filesize
297KB
MD50b6f18b8f2a67968290d25d861a773a4
SHA15791445b8c80a36b0c5c6493a1789ce9a6c84474
SHA25600afc2bc75d63a36153e649b87830e72ab1e360a5ff146d8fc28c7f39f2e548a
SHA512762012e47f5d13b11d653d3442ef3d1b83463d9ee3830d52124a53817c27fc84629d3c5f11991efc3d21b8ec8aca5ab2b8e158f6f43f6db9b4bd06e5d99b8c18
-
Filesize
297KB
MD50b6f18b8f2a67968290d25d861a773a4
SHA15791445b8c80a36b0c5c6493a1789ce9a6c84474
SHA25600afc2bc75d63a36153e649b87830e72ab1e360a5ff146d8fc28c7f39f2e548a
SHA512762012e47f5d13b11d653d3442ef3d1b83463d9ee3830d52124a53817c27fc84629d3c5f11991efc3d21b8ec8aca5ab2b8e158f6f43f6db9b4bd06e5d99b8c18
-
Filesize
328KB
MD564248739bb2c939f5458c3c07d213c0d
SHA14073fd67251c9a9bc5e338936c01d7e79a481750
SHA2569e7b1e6b384e1a1f1831a17b961fa53fd4e6718ed5fac4a01029bdbfc37d8bd7
SHA5121aeb804ddd1aa99b00e38c660ea11f829a5941e01a0de5207848c854bcde6d4372c0ae2d9c8f4c77494f9b1785aaf3b0da1f848fc430ed98be59a649f428b3b7
-
Filesize
328KB
MD564248739bb2c939f5458c3c07d213c0d
SHA14073fd67251c9a9bc5e338936c01d7e79a481750
SHA2569e7b1e6b384e1a1f1831a17b961fa53fd4e6718ed5fac4a01029bdbfc37d8bd7
SHA5121aeb804ddd1aa99b00e38c660ea11f829a5941e01a0de5207848c854bcde6d4372c0ae2d9c8f4c77494f9b1785aaf3b0da1f848fc430ed98be59a649f428b3b7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD5f953ac64debdee7b17f77ce4d09a0a93
SHA153a48596b06bf89ba6f9ba6711187b45983c91db
SHA2565bf291e06617a9697e718d16f8e167be67013d6acd95f5c8cdd873f3d7e1dfad
SHA5122a7776042b6dd3c89984c11544a083f0a81b656fee2fe983f06f536034f5913f16d8cc1c91377cb2cff47f71a0a83b1d6a78c292a4b9462a5f9d1c3dfb5906c7
-
Filesize
239KB
MD5f953ac64debdee7b17f77ce4d09a0a93
SHA153a48596b06bf89ba6f9ba6711187b45983c91db
SHA2565bf291e06617a9697e718d16f8e167be67013d6acd95f5c8cdd873f3d7e1dfad
SHA5122a7776042b6dd3c89984c11544a083f0a81b656fee2fe983f06f536034f5913f16d8cc1c91377cb2cff47f71a0a83b1d6a78c292a4b9462a5f9d1c3dfb5906c7
-
Filesize
239KB
MD5f953ac64debdee7b17f77ce4d09a0a93
SHA153a48596b06bf89ba6f9ba6711187b45983c91db
SHA2565bf291e06617a9697e718d16f8e167be67013d6acd95f5c8cdd873f3d7e1dfad
SHA5122a7776042b6dd3c89984c11544a083f0a81b656fee2fe983f06f536034f5913f16d8cc1c91377cb2cff47f71a0a83b1d6a78c292a4b9462a5f9d1c3dfb5906c7
-
Filesize
297KB
MD50b6f18b8f2a67968290d25d861a773a4
SHA15791445b8c80a36b0c5c6493a1789ce9a6c84474
SHA25600afc2bc75d63a36153e649b87830e72ab1e360a5ff146d8fc28c7f39f2e548a
SHA512762012e47f5d13b11d653d3442ef3d1b83463d9ee3830d52124a53817c27fc84629d3c5f11991efc3d21b8ec8aca5ab2b8e158f6f43f6db9b4bd06e5d99b8c18
-
Filesize
297KB
MD50b6f18b8f2a67968290d25d861a773a4
SHA15791445b8c80a36b0c5c6493a1789ce9a6c84474
SHA25600afc2bc75d63a36153e649b87830e72ab1e360a5ff146d8fc28c7f39f2e548a
SHA512762012e47f5d13b11d653d3442ef3d1b83463d9ee3830d52124a53817c27fc84629d3c5f11991efc3d21b8ec8aca5ab2b8e158f6f43f6db9b4bd06e5d99b8c18
-
Filesize
297KB
MD50b6f18b8f2a67968290d25d861a773a4
SHA15791445b8c80a36b0c5c6493a1789ce9a6c84474
SHA25600afc2bc75d63a36153e649b87830e72ab1e360a5ff146d8fc28c7f39f2e548a
SHA512762012e47f5d13b11d653d3442ef3d1b83463d9ee3830d52124a53817c27fc84629d3c5f11991efc3d21b8ec8aca5ab2b8e158f6f43f6db9b4bd06e5d99b8c18
-
Filesize
328KB
MD564248739bb2c939f5458c3c07d213c0d
SHA14073fd67251c9a9bc5e338936c01d7e79a481750
SHA2569e7b1e6b384e1a1f1831a17b961fa53fd4e6718ed5fac4a01029bdbfc37d8bd7
SHA5121aeb804ddd1aa99b00e38c660ea11f829a5941e01a0de5207848c854bcde6d4372c0ae2d9c8f4c77494f9b1785aaf3b0da1f848fc430ed98be59a649f428b3b7
-
Filesize
328KB
MD564248739bb2c939f5458c3c07d213c0d
SHA14073fd67251c9a9bc5e338936c01d7e79a481750
SHA2569e7b1e6b384e1a1f1831a17b961fa53fd4e6718ed5fac4a01029bdbfc37d8bd7
SHA5121aeb804ddd1aa99b00e38c660ea11f829a5941e01a0de5207848c854bcde6d4372c0ae2d9c8f4c77494f9b1785aaf3b0da1f848fc430ed98be59a649f428b3b7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD5f953ac64debdee7b17f77ce4d09a0a93
SHA153a48596b06bf89ba6f9ba6711187b45983c91db
SHA2565bf291e06617a9697e718d16f8e167be67013d6acd95f5c8cdd873f3d7e1dfad
SHA5122a7776042b6dd3c89984c11544a083f0a81b656fee2fe983f06f536034f5913f16d8cc1c91377cb2cff47f71a0a83b1d6a78c292a4b9462a5f9d1c3dfb5906c7
-
Filesize
239KB
MD5f953ac64debdee7b17f77ce4d09a0a93
SHA153a48596b06bf89ba6f9ba6711187b45983c91db
SHA2565bf291e06617a9697e718d16f8e167be67013d6acd95f5c8cdd873f3d7e1dfad
SHA5122a7776042b6dd3c89984c11544a083f0a81b656fee2fe983f06f536034f5913f16d8cc1c91377cb2cff47f71a0a83b1d6a78c292a4b9462a5f9d1c3dfb5906c7
-
Filesize
239KB
MD5f953ac64debdee7b17f77ce4d09a0a93
SHA153a48596b06bf89ba6f9ba6711187b45983c91db
SHA2565bf291e06617a9697e718d16f8e167be67013d6acd95f5c8cdd873f3d7e1dfad
SHA5122a7776042b6dd3c89984c11544a083f0a81b656fee2fe983f06f536034f5913f16d8cc1c91377cb2cff47f71a0a83b1d6a78c292a4b9462a5f9d1c3dfb5906c7