Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
21/03/2023, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe
Resource
win10-20230220-en
General
-
Target
fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe
-
Size
779KB
-
MD5
896961f0853f5a1d777492e9ba4f5ebb
-
SHA1
45592c0f5dbcef8daa464b6379d0f86357dc3415
-
SHA256
fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9
-
SHA512
92b96a8459031c695a5730efb0848f01b7f190c63b34fe195dbf6ae0468a943f3c91b03b4b394b62af7c1f00ac745d14c14fc14113b3c2f610fc7e136f5312d0
-
SSDEEP
12288:+Mrfy903IcFPAsMsLPv4tRd+2xuhDe+k/94FSbZD9gzKXn4d5pccrgz4YeE7fp8:hyQHItRd+2xuhCV+SJCO+5V89fp8
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
relon
193.233.20.30:4125
-
auth_value
17da69809725577b595e217ba006b869
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu8663.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1428-193-0x0000000002350000-0x0000000002396000-memory.dmp family_redline behavioral1/memory/1428-194-0x00000000023F0000-0x0000000002434000-memory.dmp family_redline behavioral1/memory/1428-195-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-196-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-198-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-200-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-202-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-204-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-206-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-208-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-210-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-212-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-214-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-216-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-218-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-220-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-222-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-224-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-226-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline behavioral1/memory/1428-228-0x00000000023F0000-0x000000000242E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1908 unio2317.exe 2404 unio5420.exe 2592 pro1084.exe 3172 qu8663.exe 1428 rSK92s86.exe 1256 si059522.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1084.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu8663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu8663.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio2317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio2317.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio5420.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio5420.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2592 pro1084.exe 2592 pro1084.exe 3172 qu8663.exe 3172 qu8663.exe 1428 rSK92s86.exe 1428 rSK92s86.exe 1256 si059522.exe 1256 si059522.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2592 pro1084.exe Token: SeDebugPrivilege 3172 qu8663.exe Token: SeDebugPrivilege 1428 rSK92s86.exe Token: SeDebugPrivilege 1256 si059522.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1908 2008 fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe 66 PID 2008 wrote to memory of 1908 2008 fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe 66 PID 2008 wrote to memory of 1908 2008 fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe 66 PID 1908 wrote to memory of 2404 1908 unio2317.exe 67 PID 1908 wrote to memory of 2404 1908 unio2317.exe 67 PID 1908 wrote to memory of 2404 1908 unio2317.exe 67 PID 2404 wrote to memory of 2592 2404 unio5420.exe 68 PID 2404 wrote to memory of 2592 2404 unio5420.exe 68 PID 2404 wrote to memory of 3172 2404 unio5420.exe 69 PID 2404 wrote to memory of 3172 2404 unio5420.exe 69 PID 2404 wrote to memory of 3172 2404 unio5420.exe 69 PID 1908 wrote to memory of 1428 1908 unio2317.exe 70 PID 1908 wrote to memory of 1428 1908 unio2317.exe 70 PID 1908 wrote to memory of 1428 1908 unio2317.exe 70 PID 2008 wrote to memory of 1256 2008 fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe 72 PID 2008 wrote to memory of 1256 2008 fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe 72 PID 2008 wrote to memory of 1256 2008 fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe"C:\Users\Admin\AppData\Local\Temp\fe81b675f8b1d1695b6896a93887321de3701259f5905ada1005c9e864bae0e9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2317.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2317.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5420.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5420.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1084.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro1084.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8663.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8663.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rSK92s86.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rSK92s86.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si059522.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si059522.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
175KB
MD56fbff2d7c9ba7f0a71f02a5c70df9dfc
SHA1003da0075734cd2d7f201c5b0e4779b8e1f33621
SHA256cb56407367a42f61993842b66bcd24993a30c87116313c26d6af9e37bbb1b6b3
SHA51225842b9df4767b16096f2bfcedc9d368a9696e6c6d9c7b2c75987769a5b338ae04b23b1e89f18eef2244e84f04e4acf6af56643a97abfe5b605f66cba0bac27f
-
Filesize
636KB
MD5bf80dc55a51abcf8d88fb23f7038b732
SHA135f238f371940cd05d75e7ff132726eea1fd0f4c
SHA25678cf7e45af9b3be834b2867462d6d60b21567c976eaf8fa0cb4e6795e7ec1611
SHA512fc620e43a7b463426087a8f0da8efae120e3adf919cbf53fecd9ab7ecaea6f08be86eb364baba9a6f90815c87681b9516b3f3c72d69cfe06a9f02b55a5c91aa8
-
Filesize
636KB
MD5bf80dc55a51abcf8d88fb23f7038b732
SHA135f238f371940cd05d75e7ff132726eea1fd0f4c
SHA25678cf7e45af9b3be834b2867462d6d60b21567c976eaf8fa0cb4e6795e7ec1611
SHA512fc620e43a7b463426087a8f0da8efae120e3adf919cbf53fecd9ab7ecaea6f08be86eb364baba9a6f90815c87681b9516b3f3c72d69cfe06a9f02b55a5c91aa8
-
Filesize
290KB
MD58b013cbe0ee1ae9cba6d32f878472a56
SHA1adf44317e61a18070b70daadb70b200e8bcb4ad7
SHA2563ee7755f8d43deca6902ef204a634976f60cb9ba917b95f5ea56a2d043143864
SHA5127edc7cdb8502a8d53b30b29fecf9a7810bc936d6c84295d40dfa4485a1ef4d99ab549c9b4bec008a70d92a9a4c08a8447ad105423c9a9f514cf3fac1d19ed40b
-
Filesize
290KB
MD58b013cbe0ee1ae9cba6d32f878472a56
SHA1adf44317e61a18070b70daadb70b200e8bcb4ad7
SHA2563ee7755f8d43deca6902ef204a634976f60cb9ba917b95f5ea56a2d043143864
SHA5127edc7cdb8502a8d53b30b29fecf9a7810bc936d6c84295d40dfa4485a1ef4d99ab549c9b4bec008a70d92a9a4c08a8447ad105423c9a9f514cf3fac1d19ed40b
-
Filesize
315KB
MD5c7498d0a771f14094051bb80e6c5e238
SHA12c1a408027b7249ec6bb4bfef4533fddc4e373dd
SHA256354859b64f4ef25a6ea1bbfeed442b81e423683a20401b871693f829739c950b
SHA5121e977005dd90f6b4d0e206dcac5f40f404dcbd28d9bf8d7cb05427d7b217a954156b718888afe8f5565381e56c621320cdd8ec79337b314e6ad5f5fc1f2468a5
-
Filesize
315KB
MD5c7498d0a771f14094051bb80e6c5e238
SHA12c1a408027b7249ec6bb4bfef4533fddc4e373dd
SHA256354859b64f4ef25a6ea1bbfeed442b81e423683a20401b871693f829739c950b
SHA5121e977005dd90f6b4d0e206dcac5f40f404dcbd28d9bf8d7cb05427d7b217a954156b718888afe8f5565381e56c621320cdd8ec79337b314e6ad5f5fc1f2468a5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
232KB
MD5c20bc0f8dec7043aa379fd11bdf8d314
SHA11df8d4bb9086b1f39fdc9767648fee9747ca8805
SHA25649d90a571bccfde5e3451e576c9c3b2e71465121e3220f56f9dc236c0c1a0adb
SHA5126e306a65776d001571cd42c88d3536114870a0b8ecd43660a0872737e15d6b543dcbe13d9115e3bb632f4995cd908a106492d857e850a2fde1b42331a941f83b
-
Filesize
232KB
MD5c20bc0f8dec7043aa379fd11bdf8d314
SHA11df8d4bb9086b1f39fdc9767648fee9747ca8805
SHA25649d90a571bccfde5e3451e576c9c3b2e71465121e3220f56f9dc236c0c1a0adb
SHA5126e306a65776d001571cd42c88d3536114870a0b8ecd43660a0872737e15d6b543dcbe13d9115e3bb632f4995cd908a106492d857e850a2fde1b42331a941f83b