Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
86s -
max time network
186s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/03/2023, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe
Resource
win10-20230220-en
General
-
Target
620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe
-
Size
656KB
-
MD5
35a4bbf219f14e2391d50447026dc9a3
-
SHA1
7aea149c61bdd8a2a21ffa64df12c1d1bc7929e7
-
SHA256
620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545
-
SHA512
6dcc5a62c312c3acfe5ac166636826cd965de3d2f27dffa6499ed7261f40fe441fdafb19aa77c7d059e914cec46ce64408877685a391ac9939b825a838547ad0
-
SSDEEP
12288:dMrMy90dFyQuGfSiZUWvzy8DUPWyo/AjYXJo2jXRED2:ZyTa2WoPKHrzREK
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c39Bx44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c39Bx44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c39Bx44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c39Bx44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5203Nn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c39Bx44.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral2/memory/2796-181-0x0000000002490000-0x00000000024D6000-memory.dmp family_redline behavioral2/memory/2796-182-0x0000000004F50000-0x0000000004F94000-memory.dmp family_redline behavioral2/memory/2796-184-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-186-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-183-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-188-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-190-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-192-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-194-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-196-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-198-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-200-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-206-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-208-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-204-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-202-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-210-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-216-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-214-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-212-0x0000000004F50000-0x0000000004F8E000-memory.dmp family_redline behavioral2/memory/2796-1105-0x0000000002350000-0x0000000002360000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4020 nice8937.exe 4500 b5203Nn.exe 4872 c39Bx44.exe 2796 dcNPv76.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c39Bx44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5203Nn.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c39Bx44.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nice8937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nice8937.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4500 b5203Nn.exe 4500 b5203Nn.exe 4872 c39Bx44.exe 4872 c39Bx44.exe 2796 dcNPv76.exe 2796 dcNPv76.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4500 b5203Nn.exe Token: SeDebugPrivilege 4872 c39Bx44.exe Token: SeDebugPrivilege 2796 dcNPv76.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4020 4040 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 66 PID 4040 wrote to memory of 4020 4040 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 66 PID 4040 wrote to memory of 4020 4040 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 66 PID 4020 wrote to memory of 4500 4020 nice8937.exe 67 PID 4020 wrote to memory of 4500 4020 nice8937.exe 67 PID 4020 wrote to memory of 4872 4020 nice8937.exe 68 PID 4020 wrote to memory of 4872 4020 nice8937.exe 68 PID 4020 wrote to memory of 4872 4020 nice8937.exe 68 PID 4040 wrote to memory of 2796 4040 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 69 PID 4040 wrote to memory of 2796 4040 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 69 PID 4040 wrote to memory of 2796 4040 620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe"C:\Users\Admin\AppData\Local\Temp\620ba0373445ce060094fff187461eba71f38a17d44ff803f6e1a32bad92b545.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice8937.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nice8937.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5203Nn.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5203Nn.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c39Bx44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c39Bx44.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dcNPv76.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dcNPv76.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD50b6f18b8f2a67968290d25d861a773a4
SHA15791445b8c80a36b0c5c6493a1789ce9a6c84474
SHA25600afc2bc75d63a36153e649b87830e72ab1e360a5ff146d8fc28c7f39f2e548a
SHA512762012e47f5d13b11d653d3442ef3d1b83463d9ee3830d52124a53817c27fc84629d3c5f11991efc3d21b8ec8aca5ab2b8e158f6f43f6db9b4bd06e5d99b8c18
-
Filesize
297KB
MD50b6f18b8f2a67968290d25d861a773a4
SHA15791445b8c80a36b0c5c6493a1789ce9a6c84474
SHA25600afc2bc75d63a36153e649b87830e72ab1e360a5ff146d8fc28c7f39f2e548a
SHA512762012e47f5d13b11d653d3442ef3d1b83463d9ee3830d52124a53817c27fc84629d3c5f11991efc3d21b8ec8aca5ab2b8e158f6f43f6db9b4bd06e5d99b8c18
-
Filesize
328KB
MD564248739bb2c939f5458c3c07d213c0d
SHA14073fd67251c9a9bc5e338936c01d7e79a481750
SHA2569e7b1e6b384e1a1f1831a17b961fa53fd4e6718ed5fac4a01029bdbfc37d8bd7
SHA5121aeb804ddd1aa99b00e38c660ea11f829a5941e01a0de5207848c854bcde6d4372c0ae2d9c8f4c77494f9b1785aaf3b0da1f848fc430ed98be59a649f428b3b7
-
Filesize
328KB
MD564248739bb2c939f5458c3c07d213c0d
SHA14073fd67251c9a9bc5e338936c01d7e79a481750
SHA2569e7b1e6b384e1a1f1831a17b961fa53fd4e6718ed5fac4a01029bdbfc37d8bd7
SHA5121aeb804ddd1aa99b00e38c660ea11f829a5941e01a0de5207848c854bcde6d4372c0ae2d9c8f4c77494f9b1785aaf3b0da1f848fc430ed98be59a649f428b3b7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
239KB
MD5f953ac64debdee7b17f77ce4d09a0a93
SHA153a48596b06bf89ba6f9ba6711187b45983c91db
SHA2565bf291e06617a9697e718d16f8e167be67013d6acd95f5c8cdd873f3d7e1dfad
SHA5122a7776042b6dd3c89984c11544a083f0a81b656fee2fe983f06f536034f5913f16d8cc1c91377cb2cff47f71a0a83b1d6a78c292a4b9462a5f9d1c3dfb5906c7
-
Filesize
239KB
MD5f953ac64debdee7b17f77ce4d09a0a93
SHA153a48596b06bf89ba6f9ba6711187b45983c91db
SHA2565bf291e06617a9697e718d16f8e167be67013d6acd95f5c8cdd873f3d7e1dfad
SHA5122a7776042b6dd3c89984c11544a083f0a81b656fee2fe983f06f536034f5913f16d8cc1c91377cb2cff47f71a0a83b1d6a78c292a4b9462a5f9d1c3dfb5906c7