Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
22/03/2023, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe
Resource
win10-20230220-en
General
-
Target
929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe
-
Size
540KB
-
MD5
b1643268a3806420078497b2ea4653d0
-
SHA1
9ea1be01043857afa562af72b2bf427ba5e47b7d
-
SHA256
929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8
-
SHA512
1f80763bf7fd2786c4250b6546bc9a1fdc8af5a7ba83313c5622f66bd380cdbc08ff5166ee996f1fb0222c0026d96a7ef33cc4faf87467202a94defcc5c312ac
-
SSDEEP
12288:2Mryy905XmW6hDROWkz6CzhrCgAnBsV/:YyInWy6gCg8Bs1
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
polo
193.233.20.31:4125
-
auth_value
f1a1b1041a864e0f1f788d42ececa8b3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8894.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8894.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2524-139-0x00000000024C0000-0x0000000002506000-memory.dmp family_redline behavioral1/memory/2524-141-0x0000000004A70000-0x0000000004AB4000-memory.dmp family_redline behavioral1/memory/2524-145-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-146-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-148-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-150-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-152-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-154-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-156-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-158-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-160-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-162-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-164-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-166-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-168-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-170-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-172-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-174-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-176-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-178-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-180-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-182-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-184-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-186-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-188-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-190-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-192-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-194-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-196-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-198-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-200-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-202-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-204-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-206-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline behavioral1/memory/2524-208-0x0000000004A70000-0x0000000004AAE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2016 unio0283.exe 2440 pro8894.exe 2524 qu1768.exe 3964 si177696.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8894.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio0283.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce unio0283.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2440 pro8894.exe 2440 pro8894.exe 2524 qu1768.exe 2524 qu1768.exe 3964 si177696.exe 3964 si177696.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2440 pro8894.exe Token: SeDebugPrivilege 2524 qu1768.exe Token: SeDebugPrivilege 3964 si177696.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2016 2008 929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe 66 PID 2008 wrote to memory of 2016 2008 929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe 66 PID 2008 wrote to memory of 2016 2008 929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe 66 PID 2016 wrote to memory of 2440 2016 unio0283.exe 67 PID 2016 wrote to memory of 2440 2016 unio0283.exe 67 PID 2016 wrote to memory of 2524 2016 unio0283.exe 68 PID 2016 wrote to memory of 2524 2016 unio0283.exe 68 PID 2016 wrote to memory of 2524 2016 unio0283.exe 68 PID 2008 wrote to memory of 3964 2008 929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe 70 PID 2008 wrote to memory of 3964 2008 929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe 70 PID 2008 wrote to memory of 3964 2008 929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe"C:\Users\Admin\AppData\Local\Temp\929072d1e8e71606f419f90c92ebed3dfebae858217adce9b433a59d73ac1ca8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0283.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio0283.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8894.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8894.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1768.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1768.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177696.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177696.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
175KB
MD544a26d7004f8b65e1a8bac0ccac86d6a
SHA130b583c2c04c1167703ae255b4d44b96b411c8ff
SHA25637384f1bfb6d2193e4ece0ed1f6989f9ebd238e7b4582e1aedfa136cdfd07eb9
SHA51217788355a5190ca17ead744cad71ebb7cfc7ceb84625310d31a469af0fbd50b2c304ce969530e99effeb0d23b0530b57a001f02fe918abc40ea68ad336fa187b
-
Filesize
398KB
MD5c5bcbab93ef5880dee51cc75a26c6200
SHA1ba772fe6693a33994c96f998d472876910ee186f
SHA256e4a840dfd7ade94021ea2b2e558278e29d0c4ee640c47241e546470b03187730
SHA512cb04a1ad3eba6433f618bde6d79af3edcdac70eb2611187f27cdf506dc3524e96aa30bc915dc8401c278e0a4d3f09867c07baff7600e4ac3c9af2223344a77bc
-
Filesize
398KB
MD5c5bcbab93ef5880dee51cc75a26c6200
SHA1ba772fe6693a33994c96f998d472876910ee186f
SHA256e4a840dfd7ade94021ea2b2e558278e29d0c4ee640c47241e546470b03187730
SHA512cb04a1ad3eba6433f618bde6d79af3edcdac70eb2611187f27cdf506dc3524e96aa30bc915dc8401c278e0a4d3f09867c07baff7600e4ac3c9af2223344a77bc
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
470KB
MD5345dc7e880fc7658309dd53621dd8403
SHA1b774ad088324919b3418db0f727f7b792c180757
SHA256b618db042376c67c16a8a86e99122b7421cbd74e4cf3b066b57d148989e476d2
SHA51267f90596263bc2218e7fbaa7811dafb2a173d51757ef2ea4b07b105c466809cf88c63dac6e2a5233caf13d1b6dfe591db354328e79a8e129f8cc4394c69ea502
-
Filesize
470KB
MD5345dc7e880fc7658309dd53621dd8403
SHA1b774ad088324919b3418db0f727f7b792c180757
SHA256b618db042376c67c16a8a86e99122b7421cbd74e4cf3b066b57d148989e476d2
SHA51267f90596263bc2218e7fbaa7811dafb2a173d51757ef2ea4b07b105c466809cf88c63dac6e2a5233caf13d1b6dfe591db354328e79a8e129f8cc4394c69ea502