Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
56s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15/03/2023, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe
Resource
win10-20230220-en
General
-
Target
5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe
-
Size
874KB
-
MD5
cf017376abd2d1fe4d7d20b0f98e8d09
-
SHA1
ba5165d6be8250b08b97caef3f9974acda27e013
-
SHA256
5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c
-
SHA512
614003915dc82ba9768f6305d82f87444d90042af32ec22f6caa083c4ad0d2d74dc743ff8b69ca6718de9f78c434a6ff532583549b547ae2a7cf45dbc9a43008
-
SSDEEP
12288:cMrpy904BJsLRE91tuKyCz9cN9rST9ySgmFhl5tUR6am8HbhdnlhGj15SPO5ym0M:FyMLRenxjhlf06d8zlhc5BdzVf9
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
sito
193.233.20.28:4125
-
auth_value
030f94d8e396dbe51ce339b815cdad17
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8597jA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8597jA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c71zH32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c71zH32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c71zH32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8597jA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8597jA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8597jA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c71zH32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c71zH32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2948-193-0x0000000007010000-0x0000000007056000-memory.dmp family_redline behavioral1/memory/2948-194-0x00000000075A0000-0x00000000075E4000-memory.dmp family_redline behavioral1/memory/2948-195-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-196-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-198-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-200-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-202-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-204-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-206-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-208-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-210-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-212-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-214-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-218-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-216-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-221-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-225-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-228-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-230-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline behavioral1/memory/2948-232-0x00000000075A0000-0x00000000075DE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4212 tice3037.exe 4216 tice2106.exe 1080 b8597jA.exe 4316 c71zH32.exe 2948 dtTkN90.exe 2720 e88YC62.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b8597jA.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c71zH32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c71zH32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice3037.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice2106.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice2106.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice3037.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1080 b8597jA.exe 1080 b8597jA.exe 4316 c71zH32.exe 4316 c71zH32.exe 2948 dtTkN90.exe 2948 dtTkN90.exe 2720 e88YC62.exe 2720 e88YC62.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1080 b8597jA.exe Token: SeDebugPrivilege 4316 c71zH32.exe Token: SeDebugPrivilege 2948 dtTkN90.exe Token: SeDebugPrivilege 2720 e88YC62.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3752 wrote to memory of 4212 3752 5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe 66 PID 3752 wrote to memory of 4212 3752 5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe 66 PID 3752 wrote to memory of 4212 3752 5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe 66 PID 4212 wrote to memory of 4216 4212 tice3037.exe 67 PID 4212 wrote to memory of 4216 4212 tice3037.exe 67 PID 4212 wrote to memory of 4216 4212 tice3037.exe 67 PID 4216 wrote to memory of 1080 4216 tice2106.exe 68 PID 4216 wrote to memory of 1080 4216 tice2106.exe 68 PID 4216 wrote to memory of 4316 4216 tice2106.exe 69 PID 4216 wrote to memory of 4316 4216 tice2106.exe 69 PID 4216 wrote to memory of 4316 4216 tice2106.exe 69 PID 4212 wrote to memory of 2948 4212 tice3037.exe 70 PID 4212 wrote to memory of 2948 4212 tice3037.exe 70 PID 4212 wrote to memory of 2948 4212 tice3037.exe 70 PID 3752 wrote to memory of 2720 3752 5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe 72 PID 3752 wrote to memory of 2720 3752 5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe 72 PID 3752 wrote to memory of 2720 3752 5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe"C:\Users\Admin\AppData\Local\Temp\5020fb4ac78166754a595b80274b8ce38d2b14165dff1a2794368dca3612805c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3037.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice3037.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2106.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice2106.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8597jA.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8597jA.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c71zH32.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c71zH32.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dtTkN90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dtTkN90.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e88YC62.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e88YC62.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
175KB
MD5795f3fe5687db9b19853eaf6acdc389a
SHA1cd1ba862909c58a01d3a8e44c29cb71bb6b50630
SHA256448bad37914cb6f2102c2c8b10cd93770e529ab4fd13e616ee99e2e184cb0e56
SHA512d9fdfef28242f378cda4698e6e89ae736dc60f5e1852aa414519bf0bdfce129e6c015306c43c7f10ab7648d158761ebaeb4dd54c1a04fa6d20a2f35cbf2b6130
-
Filesize
729KB
MD54690e66bf12ff6f4e1008fa73f05e00a
SHA1747225b04df7949d8763905e91cae03349b72a2d
SHA256c038930accf215ccd6131b7779c7138e506e313c170abb6cc20d528e306371be
SHA5125f2db42d03181647fb97c52aa8ab8b0da9bd6e976cb217d7dd8e917b422a86e00fb11d972f3d6b06a9664c27272fa72fcf8153cac670cf2b7c280b4ff6a1c61b
-
Filesize
729KB
MD54690e66bf12ff6f4e1008fa73f05e00a
SHA1747225b04df7949d8763905e91cae03349b72a2d
SHA256c038930accf215ccd6131b7779c7138e506e313c170abb6cc20d528e306371be
SHA5125f2db42d03181647fb97c52aa8ab8b0da9bd6e976cb217d7dd8e917b422a86e00fb11d972f3d6b06a9664c27272fa72fcf8153cac670cf2b7c280b4ff6a1c61b
-
Filesize
408KB
MD5acf946990cce268bab83e423eba360f4
SHA10d3bdccf0182f0807380473466d5b6b60f193904
SHA25617cd8db80e084509a543f7ec21399d4f9cf9c8906d6890a3db4da80854bf8d27
SHA512aed8bd98b0f033d724091419548880c463be734886c8a5e0b8065a66060b350783221049475d0fad4999425d03b8dcc889e7fbff7b9fd3b1575f1745f3e7f4f1
-
Filesize
408KB
MD5acf946990cce268bab83e423eba360f4
SHA10d3bdccf0182f0807380473466d5b6b60f193904
SHA25617cd8db80e084509a543f7ec21399d4f9cf9c8906d6890a3db4da80854bf8d27
SHA512aed8bd98b0f033d724091419548880c463be734886c8a5e0b8065a66060b350783221049475d0fad4999425d03b8dcc889e7fbff7b9fd3b1575f1745f3e7f4f1
-
Filesize
365KB
MD53a5820a8fee9833d5b486e60502677f5
SHA142bc63f25deae86b694bf607230909bff91f3b2d
SHA25617080a59f7489790629c61c70fde514b70ed5cfed705da159d375e96d3b96b82
SHA512d618d39bf9990e1554eb9876e9c13d82e74122745c88ac63a0fcbe978be8135375dce5a0666b129f057c34884e8a86300e2afa808cb4ef6384a04022a7d833c6
-
Filesize
365KB
MD53a5820a8fee9833d5b486e60502677f5
SHA142bc63f25deae86b694bf607230909bff91f3b2d
SHA25617080a59f7489790629c61c70fde514b70ed5cfed705da159d375e96d3b96b82
SHA512d618d39bf9990e1554eb9876e9c13d82e74122745c88ac63a0fcbe978be8135375dce5a0666b129f057c34884e8a86300e2afa808cb4ef6384a04022a7d833c6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD5ff1800b6e8f9a60395425226a5a76d1c
SHA10872a5e7a2c25b60df6b1ccceb39d472658ad502
SHA2564fe41b77721fb7a0794c189fa93ad03ad938a6085c77914a0f174b5bc4129ee1
SHA51227585f4743067bc1bfc2dfe048f01779fe10595a52545d6b90e60b67a9fbb0aeb97e75941f4ccd705ba58a96cccc4b00af8c1f3d4d4b5fa8591f62560311911a
-
Filesize
351KB
MD5ff1800b6e8f9a60395425226a5a76d1c
SHA10872a5e7a2c25b60df6b1ccceb39d472658ad502
SHA2564fe41b77721fb7a0794c189fa93ad03ad938a6085c77914a0f174b5bc4129ee1
SHA51227585f4743067bc1bfc2dfe048f01779fe10595a52545d6b90e60b67a9fbb0aeb97e75941f4ccd705ba58a96cccc4b00af8c1f3d4d4b5fa8591f62560311911a