Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
56s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16/03/2023, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe
Resource
win10-20230220-en
General
-
Target
3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe
-
Size
793KB
-
MD5
2c2a2e209172b051755fa7fa0203f1a0
-
SHA1
6d88b2b81d411f1063c66aaa14ce3191e4473bc6
-
SHA256
3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d
-
SHA512
12da53ca6e56ded530acbb8aeeaae854ecfa8c9affafb08abed088af4e0e76194c9753b10201177d75b4711db9b5139c7442bc67d93c13f6d5ce721d56198e02
-
SSDEEP
12288:aMr+y90Fq856VdLm9FVGYK/My1BR/+frlv+BvlCHbCovVb/GHLOj:oygVkbLm9FVrqmfrmvlcb/NbOHLOj
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
rako
193.233.20.28:4125
-
auth_value
69e2d139981e0b037a6786e01a92824d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c48Mm19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c48Mm19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b9684LV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b9684LV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b9684LV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c48Mm19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c48Mm19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c48Mm19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b9684LV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b9684LV.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4716-193-0x0000000002580000-0x00000000025C6000-memory.dmp family_redline behavioral1/memory/4716-194-0x0000000004F90000-0x0000000004FD4000-memory.dmp family_redline behavioral1/memory/4716-195-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-196-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-198-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-200-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-202-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-204-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-206-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-208-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-210-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-212-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-214-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-216-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-218-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-220-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-222-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-224-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-226-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-228-0x0000000004F90000-0x0000000004FCE000-memory.dmp family_redline behavioral1/memory/4716-1112-0x00000000025F0000-0x0000000002600000-memory.dmp family_redline behavioral1/memory/4716-1113-0x00000000025F0000-0x0000000002600000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3320 tice5186.exe 3572 tice4088.exe 304 b9684LV.exe 3924 c48Mm19.exe 4716 dByFX64.exe 1744 e75Rp45.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b9684LV.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c48Mm19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c48Mm19.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice5186.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice5186.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice4088.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice4088.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 304 b9684LV.exe 304 b9684LV.exe 3924 c48Mm19.exe 3924 c48Mm19.exe 4716 dByFX64.exe 4716 dByFX64.exe 1744 e75Rp45.exe 1744 e75Rp45.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 304 b9684LV.exe Token: SeDebugPrivilege 3924 c48Mm19.exe Token: SeDebugPrivilege 4716 dByFX64.exe Token: SeDebugPrivilege 1744 e75Rp45.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4064 wrote to memory of 3320 4064 3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe 66 PID 4064 wrote to memory of 3320 4064 3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe 66 PID 4064 wrote to memory of 3320 4064 3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe 66 PID 3320 wrote to memory of 3572 3320 tice5186.exe 67 PID 3320 wrote to memory of 3572 3320 tice5186.exe 67 PID 3320 wrote to memory of 3572 3320 tice5186.exe 67 PID 3572 wrote to memory of 304 3572 tice4088.exe 68 PID 3572 wrote to memory of 304 3572 tice4088.exe 68 PID 3572 wrote to memory of 3924 3572 tice4088.exe 69 PID 3572 wrote to memory of 3924 3572 tice4088.exe 69 PID 3572 wrote to memory of 3924 3572 tice4088.exe 69 PID 3320 wrote to memory of 4716 3320 tice5186.exe 70 PID 3320 wrote to memory of 4716 3320 tice5186.exe 70 PID 3320 wrote to memory of 4716 3320 tice5186.exe 70 PID 4064 wrote to memory of 1744 4064 3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe 72 PID 4064 wrote to memory of 1744 4064 3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe 72 PID 4064 wrote to memory of 1744 4064 3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe"C:\Users\Admin\AppData\Local\Temp\3ce88ad0bb7917bde965f5861780f4d053bfe921f635c7cb512475bc5e9f373d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5186.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice5186.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4088.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice4088.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9684LV.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9684LV.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:304
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48Mm19.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c48Mm19.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dByFX64.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dByFX64.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e75Rp45.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e75Rp45.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5759627441452bd502f0d0fba797bcd52
SHA118eea75008b488b74217784ee0c88428af8fc30e
SHA2560898215e951a61929012606a99ecc6f18db7e35aea3b46294be9e0bdc4a634e6
SHA51245b9a4cb1b1f4a1277a905a9a16d3491ec8a5ba87264ab83aebf87158bc3beb50b32093aaf406b44b85f353fd2b2636fbcd34866d99c4e2f5fbb3c2b8e888bdc
-
Filesize
175KB
MD5759627441452bd502f0d0fba797bcd52
SHA118eea75008b488b74217784ee0c88428af8fc30e
SHA2560898215e951a61929012606a99ecc6f18db7e35aea3b46294be9e0bdc4a634e6
SHA51245b9a4cb1b1f4a1277a905a9a16d3491ec8a5ba87264ab83aebf87158bc3beb50b32093aaf406b44b85f353fd2b2636fbcd34866d99c4e2f5fbb3c2b8e888bdc
-
Filesize
648KB
MD5af27026ae6ca6b6fc3871ae82a2ba913
SHA1b1b60b7087b975abf316f47b1898a82aa6b131f1
SHA256387c0e510e8d5d31744be4258f4a3158dbcae0098d92797ad5466da3cb492fe9
SHA512d29b19dbf86acc83e2b5536942ebdc27e9dcff466b4ce8ae15d0c48809849f843818090d33f19fda57e6e80bc7029e77043ef78147ea0dc517eed9c3ad360da2
-
Filesize
648KB
MD5af27026ae6ca6b6fc3871ae82a2ba913
SHA1b1b60b7087b975abf316f47b1898a82aa6b131f1
SHA256387c0e510e8d5d31744be4258f4a3158dbcae0098d92797ad5466da3cb492fe9
SHA512d29b19dbf86acc83e2b5536942ebdc27e9dcff466b4ce8ae15d0c48809849f843818090d33f19fda57e6e80bc7029e77043ef78147ea0dc517eed9c3ad360da2
-
Filesize
283KB
MD5db5f2f86fb7dd4912c94875acd92a402
SHA10b9dd9ada8c396914f4291094d3228971fbfcc9b
SHA2560106d6a2b24050ebe999f09a9e2e905375e86819cb3f74e7b3f7438852fa5989
SHA512e5a212482c79e481854990c1c5f55f6791ba2aa7de5826b4f6dd701b0b99683c4d6dfc47e298a067f263e083906de37ec4d2576239d5e09df83b139633f9d677
-
Filesize
283KB
MD5db5f2f86fb7dd4912c94875acd92a402
SHA10b9dd9ada8c396914f4291094d3228971fbfcc9b
SHA2560106d6a2b24050ebe999f09a9e2e905375e86819cb3f74e7b3f7438852fa5989
SHA512e5a212482c79e481854990c1c5f55f6791ba2aa7de5826b4f6dd701b0b99683c4d6dfc47e298a067f263e083906de37ec4d2576239d5e09df83b139633f9d677
-
Filesize
325KB
MD5ee9ca7b6b703e38ba6a6f12f8c77feff
SHA15e23175439e7d2bf3b66c0540f26830e698368d1
SHA256d5c81c45e38510a928592267e9bd012dad8e42932291256a76562b26607250e7
SHA512e1e89c90da4c4b5f618c66d10e2ac4232d77e31431f97cf1d6d8a989c581072b4747ed640542b83482904009c855b33fa814981c8b929615b96f3b368500ef32
-
Filesize
325KB
MD5ee9ca7b6b703e38ba6a6f12f8c77feff
SHA15e23175439e7d2bf3b66c0540f26830e698368d1
SHA256d5c81c45e38510a928592267e9bd012dad8e42932291256a76562b26607250e7
SHA512e1e89c90da4c4b5f618c66d10e2ac4232d77e31431f97cf1d6d8a989c581072b4747ed640542b83482904009c855b33fa814981c8b929615b96f3b368500ef32
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD5250614c304fbb9a36d315e5ac94b6b26
SHA18302a46aaed10c54e43809b647f3e074f6670b6e
SHA256b850398384ee87480ef1acb4597991784fbaf90369611a3d5fa3d8075142585b
SHA512aefac6447a8d0691cab55fee922ce37e8404a801d9b86711543c05f30d129581d6bec9bf5ebe7330a78afd9fe8b561a5a2b36e0f7094bf01ca5351b13246f4bf
-
Filesize
226KB
MD5250614c304fbb9a36d315e5ac94b6b26
SHA18302a46aaed10c54e43809b647f3e074f6670b6e
SHA256b850398384ee87480ef1acb4597991784fbaf90369611a3d5fa3d8075142585b
SHA512aefac6447a8d0691cab55fee922ce37e8404a801d9b86711543c05f30d129581d6bec9bf5ebe7330a78afd9fe8b561a5a2b36e0f7094bf01ca5351b13246f4bf