Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19/03/2023, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe
Resource
win10-20230220-en
General
-
Target
3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe
-
Size
836KB
-
MD5
8ea107ce3343cfc56b8d6f63bf959906
-
SHA1
f6b802a350a5b994c4ebfd7bcf95896bf89c3c5d
-
SHA256
3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882
-
SHA512
ddc4363243c7998929b2be664c68a50fd1dd1e0f3507ef1735d4d834a6cc6535075e9b71e1bed7844834af7a18880cc744af19481a048047504ee3a3f2a940cd
-
SSDEEP
12288:iMrBy90hjOKdkzAWgu5gZ2iUuGqw0LY8Jk8q5SaVimN35xKfUVc+RixhmX6qaj:byyjxOAu6ZlUFyk8SzLB33KfTMixQAj
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu2539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu2539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu2539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8240.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu2539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu2539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8240.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2680-190-0x0000000004890000-0x00000000048D6000-memory.dmp family_redline behavioral1/memory/2680-191-0x00000000075C0000-0x0000000007604000-memory.dmp family_redline behavioral1/memory/2680-192-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-193-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-195-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-197-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-199-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-201-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-208-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-205-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-210-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-212-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-214-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-216-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-218-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-220-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-222-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-224-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-226-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline behavioral1/memory/2680-228-0x00000000075C0000-0x00000000075FE000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 4436 unio4356.exe 4916 unio0965.exe 1996 pro8240.exe 1812 qu2539.exe 2680 rsc10s51.exe 4316 si183746.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu2539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8240.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu2539.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio4356.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio4356.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio0965.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio0965.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1996 pro8240.exe 1996 pro8240.exe 1812 qu2539.exe 1812 qu2539.exe 2680 rsc10s51.exe 2680 rsc10s51.exe 4316 si183746.exe 4316 si183746.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1996 pro8240.exe Token: SeDebugPrivilege 1812 qu2539.exe Token: SeDebugPrivilege 2680 rsc10s51.exe Token: SeDebugPrivilege 4316 si183746.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4436 4052 3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe 67 PID 4052 wrote to memory of 4436 4052 3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe 67 PID 4052 wrote to memory of 4436 4052 3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe 67 PID 4436 wrote to memory of 4916 4436 unio4356.exe 68 PID 4436 wrote to memory of 4916 4436 unio4356.exe 68 PID 4436 wrote to memory of 4916 4436 unio4356.exe 68 PID 4916 wrote to memory of 1996 4916 unio0965.exe 69 PID 4916 wrote to memory of 1996 4916 unio0965.exe 69 PID 4916 wrote to memory of 1812 4916 unio0965.exe 70 PID 4916 wrote to memory of 1812 4916 unio0965.exe 70 PID 4916 wrote to memory of 1812 4916 unio0965.exe 70 PID 4436 wrote to memory of 2680 4436 unio4356.exe 71 PID 4436 wrote to memory of 2680 4436 unio4356.exe 71 PID 4436 wrote to memory of 2680 4436 unio4356.exe 71 PID 4052 wrote to memory of 4316 4052 3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe 73 PID 4052 wrote to memory of 4316 4052 3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe 73 PID 4052 wrote to memory of 4316 4052 3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe"C:\Users\Admin\AppData\Local\Temp\3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4356.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4356.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio0965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio0965.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8240.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8240.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu2539.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu2539.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rsc10s51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rsc10s51.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183746.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183746.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
694KB
MD5a9166b7f7616573753abef5b45afd56a
SHA160f1f9add81f77122a858f7792e5e6d89a3fc811
SHA2567ed56b5684a1a715f9cc96e867601c777e12e4e9c1994b2caad4ae502f212956
SHA512d32a5459644958aa5e5455c746e51faebb7529a64292936c4aafca2319c28bd87ac116243d59f8078580b9b79b00bc41a1e8d8aea40e5e1f099d8b8d80ab9b32
-
Filesize
694KB
MD5a9166b7f7616573753abef5b45afd56a
SHA160f1f9add81f77122a858f7792e5e6d89a3fc811
SHA2567ed56b5684a1a715f9cc96e867601c777e12e4e9c1994b2caad4ae502f212956
SHA512d32a5459644958aa5e5455c746e51faebb7529a64292936c4aafca2319c28bd87ac116243d59f8078580b9b79b00bc41a1e8d8aea40e5e1f099d8b8d80ab9b32
-
Filesize
391KB
MD5387f07e53552f919bbad91a0c347c994
SHA11d25fe369c5f11b6b6b98d6516361c3e3fc4b9ec
SHA256b9858e182e5a1211dc918f3390123dd4b2d707787ba3c76a1dafbf7cad94d097
SHA51291cbbe79cd36ebb07b996139378d8ffd6e12bcd0a9e77be22c67aaf74ab644c6bc1bf820f8b0a1674761e692f9ba7d76e69e4411f501046f43d6843edd123022
-
Filesize
391KB
MD5387f07e53552f919bbad91a0c347c994
SHA11d25fe369c5f11b6b6b98d6516361c3e3fc4b9ec
SHA256b9858e182e5a1211dc918f3390123dd4b2d707787ba3c76a1dafbf7cad94d097
SHA51291cbbe79cd36ebb07b996139378d8ffd6e12bcd0a9e77be22c67aaf74ab644c6bc1bf820f8b0a1674761e692f9ba7d76e69e4411f501046f43d6843edd123022
-
Filesize
344KB
MD5ae55e48f03001f94dee145116e5d3c33
SHA181d3291ca9ea9d621e1ae2fc89ad33950fc25946
SHA25619fc1ed716dc30053b52e00e6d32452b00df270924f23850bfdfb9a077969238
SHA51289962b584f4b7ccc878327a85f223c40aeb89ae0a5bfd8a203482f84d357870dcbfe00b4abe463e8decdbd978f8329d42aef7fd093cf4cb70f4ade74da742125
-
Filesize
344KB
MD5ae55e48f03001f94dee145116e5d3c33
SHA181d3291ca9ea9d621e1ae2fc89ad33950fc25946
SHA25619fc1ed716dc30053b52e00e6d32452b00df270924f23850bfdfb9a077969238
SHA51289962b584f4b7ccc878327a85f223c40aeb89ae0a5bfd8a203482f84d357870dcbfe00b4abe463e8decdbd978f8329d42aef7fd093cf4cb70f4ade74da742125
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
334KB
MD5f07b1480095d4b9abd084cc984364101
SHA188de38fdaf725930798beedd8cef8b43a13e2f0f
SHA25664d5ba58e8087788b85f3c1ba76a1ebefe71c1064d40413a0052e2d7b5699437
SHA51243600a5cc99285f0664031d5afeff40a045f4a472d4f6f366d1e6b2977a36a2b04e375bc25cf1e3919ad5df951931c4913660e835510dc740aea12c1ad388bb5
-
Filesize
334KB
MD5f07b1480095d4b9abd084cc984364101
SHA188de38fdaf725930798beedd8cef8b43a13e2f0f
SHA25664d5ba58e8087788b85f3c1ba76a1ebefe71c1064d40413a0052e2d7b5699437
SHA51243600a5cc99285f0664031d5afeff40a045f4a472d4f6f366d1e6b2977a36a2b04e375bc25cf1e3919ad5df951931c4913660e835510dc740aea12c1ad388bb5