Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
85s -
max time network
88s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/03/2023, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe
Resource
win10-20230220-en
General
-
Target
8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe
-
Size
907KB
-
MD5
3514963358f969c128e6906c1d785f77
-
SHA1
b6654cad610ef8f7032ae9163ae77c66dbf62c6c
-
SHA256
8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c
-
SHA512
8c4b284cee4045f7a45b185ca5649bca2aefa5ce4acf234f13aa68b2f1232e114b8478238dfe8e5885ff937d098c337175cefae72c03f3abf7f1d7b0ec740242
-
SSDEEP
24576:2yzv07zIvGlkgQM0B/gQCA53aEr/Dk+IPTW:Fzv0vkJB/Z3
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8981.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1280-190-0x0000000002500000-0x0000000002546000-memory.dmp family_redline behavioral1/memory/1280-191-0x0000000004D40000-0x0000000004D84000-memory.dmp family_redline behavioral1/memory/1280-192-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-193-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-195-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-197-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-199-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-201-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-203-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-205-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-207-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-209-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-211-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-216-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-219-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-221-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-223-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-225-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-227-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/1280-229-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2092 unio6381.exe 4256 unio6079.exe 4952 pro8981.exe 356 qu2889.exe 1280 rGr42s04.exe 4208 si840682.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8981.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu2889.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio6079.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio6079.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio6381.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio6381.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4952 pro8981.exe 4952 pro8981.exe 356 qu2889.exe 356 qu2889.exe 1280 rGr42s04.exe 1280 rGr42s04.exe 4208 si840682.exe 4208 si840682.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4952 pro8981.exe Token: SeDebugPrivilege 356 qu2889.exe Token: SeDebugPrivilege 1280 rGr42s04.exe Token: SeDebugPrivilege 4208 si840682.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3956 wrote to memory of 2092 3956 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe 66 PID 3956 wrote to memory of 2092 3956 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe 66 PID 3956 wrote to memory of 2092 3956 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe 66 PID 2092 wrote to memory of 4256 2092 unio6381.exe 67 PID 2092 wrote to memory of 4256 2092 unio6381.exe 67 PID 2092 wrote to memory of 4256 2092 unio6381.exe 67 PID 4256 wrote to memory of 4952 4256 unio6079.exe 68 PID 4256 wrote to memory of 4952 4256 unio6079.exe 68 PID 4256 wrote to memory of 356 4256 unio6079.exe 69 PID 4256 wrote to memory of 356 4256 unio6079.exe 69 PID 4256 wrote to memory of 356 4256 unio6079.exe 69 PID 2092 wrote to memory of 1280 2092 unio6381.exe 70 PID 2092 wrote to memory of 1280 2092 unio6381.exe 70 PID 2092 wrote to memory of 1280 2092 unio6381.exe 70 PID 3956 wrote to memory of 4208 3956 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe 72 PID 3956 wrote to memory of 4208 3956 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe 72 PID 3956 wrote to memory of 4208 3956 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe"C:\Users\Admin\AppData\Local\Temp\8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6381.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6381.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio6079.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio6079.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8981.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8981.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu2889.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu2889.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:356
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rGr42s04.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rGr42s04.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840682.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840682.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
765KB
MD510dd0d138f640da05f4cf5b68e328eec
SHA1328383f543464f8e48071f4d94c4a86ed791d6b6
SHA256b5452bc501dc99c8bed4095028d8316acf55a26fc525f90a381ec537793576e3
SHA512941811508dac2caabf2eb2c5c4a52a613ac621cfdb887aa75412e0293d4292321e06f4ac78b8bc9628f4a98828aa04ea400d4905d82bd97af12d0ec27d8819f7
-
Filesize
765KB
MD510dd0d138f640da05f4cf5b68e328eec
SHA1328383f543464f8e48071f4d94c4a86ed791d6b6
SHA256b5452bc501dc99c8bed4095028d8316acf55a26fc525f90a381ec537793576e3
SHA512941811508dac2caabf2eb2c5c4a52a613ac621cfdb887aa75412e0293d4292321e06f4ac78b8bc9628f4a98828aa04ea400d4905d82bd97af12d0ec27d8819f7
-
Filesize
457KB
MD5756eb7939f2ffc37ec17cf7711110b69
SHA1a9c8e1547c4d7a23f9fb2587ded8640cf2245672
SHA2563808a4de9951571e4a23ea486a64582720264bc612aa62dd2e9a2a8e6f72c2f5
SHA5129c2aa7386eaf67e84998f182c381064d1475a7ded6fc011d33050aa43b8bb0c9a7668e3538d9a4a17d5bb882b393d5299cde77536ee03099a3634a9f064c4a40
-
Filesize
457KB
MD5756eb7939f2ffc37ec17cf7711110b69
SHA1a9c8e1547c4d7a23f9fb2587ded8640cf2245672
SHA2563808a4de9951571e4a23ea486a64582720264bc612aa62dd2e9a2a8e6f72c2f5
SHA5129c2aa7386eaf67e84998f182c381064d1475a7ded6fc011d33050aa43b8bb0c9a7668e3538d9a4a17d5bb882b393d5299cde77536ee03099a3634a9f064c4a40
-
Filesize
379KB
MD57b8b31002487ad91d979152490674b5a
SHA178be39da9dcc7a8ef90bf9736ab0d82226432f99
SHA2568f139982114be62195aa8240a00d1d0ed7c2ffc22127d9834eaa0fd66235dbf6
SHA5126370c6c209b42b9f4aaa37eb9b52d5ab90b16555638fac09a652db52be98ed616fc4a5100c9f164d01606ead773e3821521c3664788e7120afb785d9f9915250
-
Filesize
379KB
MD57b8b31002487ad91d979152490674b5a
SHA178be39da9dcc7a8ef90bf9736ab0d82226432f99
SHA2568f139982114be62195aa8240a00d1d0ed7c2ffc22127d9834eaa0fd66235dbf6
SHA5126370c6c209b42b9f4aaa37eb9b52d5ab90b16555638fac09a652db52be98ed616fc4a5100c9f164d01606ead773e3821521c3664788e7120afb785d9f9915250
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
399KB
MD5263f3783d29c5a6f9fce53d5cafdf6c5
SHA1f357e9b0b8b18b682b0ef2e684b0b6fabc951308
SHA25667d2b8e767033ec0a440e44588c17895546aa4d2ae5f373b450833fba0c91d6a
SHA5124683c877f2b5802b57cd15a660e6aa938aca4f95ade3ba372705b24dba9f731dbc9a0f58611de87a0ca3307b69570d4f6a02623f2155d035cb52c98f725cf32d
-
Filesize
399KB
MD5263f3783d29c5a6f9fce53d5cafdf6c5
SHA1f357e9b0b8b18b682b0ef2e684b0b6fabc951308
SHA25667d2b8e767033ec0a440e44588c17895546aa4d2ae5f373b450833fba0c91d6a
SHA5124683c877f2b5802b57cd15a660e6aa938aca4f95ade3ba372705b24dba9f731dbc9a0f58611de87a0ca3307b69570d4f6a02623f2155d035cb52c98f725cf32d