Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
49s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16/03/2023, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe
Resource
win10-20230220-en
General
-
Target
fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe
-
Size
794KB
-
MD5
d5c6ae5d9205ab23c615b5be98cda401
-
SHA1
3bf03c9cf78f05d8e41d463e4e78dbdae47f04ab
-
SHA256
fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074
-
SHA512
8eed582f739dbeed2e5dcd758b89b7e9ade5341cff0462dccab2b356f5ceab6c518450042ae57a1d2dc7f74dc1e9798fbc571fe2a04b51291afd679142bb6d8c
-
SSDEEP
12288:uMrYy90tLu/1h1fJOL+gK11d0N2U0LsU2xHC0oLpchygSLwpYnt1GCFX4MFs/Z:iyCLu/v1kLJ2U6sUUHC0Mp4BSYoHFsR
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
laba
193.233.20.28:4125
-
auth_value
2cf01cffff9092a85ca7e106c547190b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b0347jI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c35us97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c35us97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c35us97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c35us97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b0347jI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b0347jI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b0347jI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b0347jI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c35us97.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3576-189-0x0000000002240000-0x0000000002286000-memory.dmp family_redline behavioral1/memory/3576-190-0x0000000002610000-0x0000000002654000-memory.dmp family_redline behavioral1/memory/3576-191-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-192-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-194-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-196-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-198-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-200-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-202-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-204-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-207-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-211-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-214-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-216-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-218-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-220-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-222-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-224-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-226-0x0000000002610000-0x000000000264E000-memory.dmp family_redline behavioral1/memory/3576-228-0x0000000002610000-0x000000000264E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2296 tice4422.exe 2572 tice0638.exe 2636 b0347jI.exe 3136 c35us97.exe 3576 duScF80.exe 4732 e31LN91.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b0347jI.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c35us97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c35us97.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice4422.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" tice4422.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tice0638.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tice0638.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2636 b0347jI.exe 2636 b0347jI.exe 3136 c35us97.exe 3136 c35us97.exe 3576 duScF80.exe 3576 duScF80.exe 4732 e31LN91.exe 4732 e31LN91.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2636 b0347jI.exe Token: SeDebugPrivilege 3136 c35us97.exe Token: SeDebugPrivilege 3576 duScF80.exe Token: SeDebugPrivilege 4732 e31LN91.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2296 2076 fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe 66 PID 2076 wrote to memory of 2296 2076 fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe 66 PID 2076 wrote to memory of 2296 2076 fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe 66 PID 2296 wrote to memory of 2572 2296 tice4422.exe 67 PID 2296 wrote to memory of 2572 2296 tice4422.exe 67 PID 2296 wrote to memory of 2572 2296 tice4422.exe 67 PID 2572 wrote to memory of 2636 2572 tice0638.exe 68 PID 2572 wrote to memory of 2636 2572 tice0638.exe 68 PID 2572 wrote to memory of 3136 2572 tice0638.exe 69 PID 2572 wrote to memory of 3136 2572 tice0638.exe 69 PID 2572 wrote to memory of 3136 2572 tice0638.exe 69 PID 2296 wrote to memory of 3576 2296 tice4422.exe 70 PID 2296 wrote to memory of 3576 2296 tice4422.exe 70 PID 2296 wrote to memory of 3576 2296 tice4422.exe 70 PID 2076 wrote to memory of 4732 2076 fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe 72 PID 2076 wrote to memory of 4732 2076 fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe 72 PID 2076 wrote to memory of 4732 2076 fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe"C:\Users\Admin\AppData\Local\Temp\fdb6594ef88ebd5d85faa0f8bd6303124fad8364d7be067d067e6fc73cf52074.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4422.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tice4422.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tice0638.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0347jI.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0347jI.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c35us97.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c35us97.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\duScF80.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\duScF80.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e31LN91.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e31LN91.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
175KB
MD5478e884952392c14b85cca1a6a4f3e35
SHA1f3475db1427fec3eedf583f1b7b0f839b27f8d74
SHA256bc576bf5f9a72ebbfbc11e59b8e384a1923eca8ec6c5234313c37865f74b7413
SHA512b3a1c504d2a108049a5ee193da2f1bcdd99d269e75f08199c3fccedc0de298996418421b5e48d5c0f582bf775087537ff8f83c341ed2c0cbbcf38e956bffebe9
-
Filesize
648KB
MD589f6443cbfceb557201412e4fcf3d6a9
SHA19edff94b19ec785a5f0f64d1c4cbd9431dca3e5a
SHA256b7774b5b184b9ec469add6021b617f250b5c264d7b7e00c86fb8838ee2f89e30
SHA512ad2fc9bb639e4284ab996f89b376aeb7ca2bcbdd1af16ca7faf1aae2664168206435b4aa05a7285ef2fdb1f12d50f1a34e5acfeb3680bf3833ce39e728a21c6a
-
Filesize
648KB
MD589f6443cbfceb557201412e4fcf3d6a9
SHA19edff94b19ec785a5f0f64d1c4cbd9431dca3e5a
SHA256b7774b5b184b9ec469add6021b617f250b5c264d7b7e00c86fb8838ee2f89e30
SHA512ad2fc9bb639e4284ab996f89b376aeb7ca2bcbdd1af16ca7faf1aae2664168206435b4aa05a7285ef2fdb1f12d50f1a34e5acfeb3680bf3833ce39e728a21c6a
-
Filesize
284KB
MD5478300072b55b94fd1afc4a304db6c13
SHA1b70a6f91d0262ba3f3506df4600a63771243cac2
SHA2568fe228a88c5f651dd353fe7d857cc17e5a0adb1da9c5a6de204c51daa0a6aa0f
SHA512d3f3848b593ca138ec376c2e84b55a8187b987146d98a85743d7ddbdf753a553d007d098d48fea789abf843eaadf84eafa871c70483fcde2434e66c144dc610d
-
Filesize
284KB
MD5478300072b55b94fd1afc4a304db6c13
SHA1b70a6f91d0262ba3f3506df4600a63771243cac2
SHA2568fe228a88c5f651dd353fe7d857cc17e5a0adb1da9c5a6de204c51daa0a6aa0f
SHA512d3f3848b593ca138ec376c2e84b55a8187b987146d98a85743d7ddbdf753a553d007d098d48fea789abf843eaadf84eafa871c70483fcde2434e66c144dc610d
-
Filesize
324KB
MD529bb3e6d7a37bb17f9fa47d14aa97a32
SHA1a98ff5fd6f97b40a77e820f207ae0dd7e5aca2f8
SHA256e1f7d3cc0842dbd1e153e26465719de09906774a5e0202b4c3a08f9a06f640a5
SHA51240098e3fa84e9b6eb23f74ad7934684684a6f57a880282429ccb7d6568744446246f80ba5eb26c4db7e088587f6b809c9e546eb4f6eff275880baecce4495d44
-
Filesize
324KB
MD529bb3e6d7a37bb17f9fa47d14aa97a32
SHA1a98ff5fd6f97b40a77e820f207ae0dd7e5aca2f8
SHA256e1f7d3cc0842dbd1e153e26465719de09906774a5e0202b4c3a08f9a06f640a5
SHA51240098e3fa84e9b6eb23f74ad7934684684a6f57a880282429ccb7d6568744446246f80ba5eb26c4db7e088587f6b809c9e546eb4f6eff275880baecce4495d44
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
226KB
MD5b2e29b7b4c283e4e49c5cb6f685af813
SHA1194009992134a2bc7026844e45d42e390cc16d2e
SHA256d0b4a89e48a8e2e0a7e21188076c5813498dd5efb588134d75376c834f51d3ed
SHA5120ce19bbbbe34ce71500f3552909d2c09ce817e8c0dc6199371ea66f6295689053cc5f032c4804ce44984786315fcc0362a4f66893d15ebb3ee84170a1bb308b8
-
Filesize
226KB
MD5b2e29b7b4c283e4e49c5cb6f685af813
SHA1194009992134a2bc7026844e45d42e390cc16d2e
SHA256d0b4a89e48a8e2e0a7e21188076c5813498dd5efb588134d75376c834f51d3ed
SHA5120ce19bbbbe34ce71500f3552909d2c09ce817e8c0dc6199371ea66f6295689053cc5f032c4804ce44984786315fcc0362a4f66893d15ebb3ee84170a1bb308b8