Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
52s -
max time network
55s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/03/2023, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe
Resource
win10-20230220-en
General
-
Target
75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe
-
Size
546KB
-
MD5
d59ab64d2ba5c4a34627ebb331a9fcf8
-
SHA1
4b9689051869bf712a73483e819cde542ada7c5b
-
SHA256
75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f
-
SHA512
dc22c4186ca80652d9e1bc85b2f5869222b6f72831c5466d673d8413156a62de69d556227beaeb7532d7ebdf827b7385de4942abead915dd913dd770052873b3
-
SSDEEP
12288:7Mriy90B7R8HLR+lRGBEejtpwLXHu2vrc6ogl2:hy4l8HLR+ewX2gl2
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h37cq52.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h37cq52.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h37cq52.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h37cq52.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h37cq52.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2820-142-0x00000000027F0000-0x0000000002836000-memory.dmp family_redline behavioral1/memory/2820-144-0x0000000005210000-0x0000000005254000-memory.dmp family_redline behavioral1/memory/2820-147-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-148-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-150-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-154-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-152-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-158-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-156-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-160-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-162-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-164-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-166-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-178-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-176-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-174-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-172-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-170-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-168-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-180-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-186-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-184-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-182-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-190-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-188-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-192-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-194-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-206-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-208-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-210-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-204-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-202-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-200-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-198-0x0000000005210000-0x000000000524E000-memory.dmp family_redline behavioral1/memory/2820-196-0x0000000005210000-0x000000000524E000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2452 niba1797.exe 2592 h37cq52.exe 2820 iUArG41.exe 2188 l13Hg05.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h37cq52.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba1797.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba1797.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2592 h37cq52.exe 2592 h37cq52.exe 2820 iUArG41.exe 2820 iUArG41.exe 2188 l13Hg05.exe 2188 l13Hg05.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2592 h37cq52.exe Token: SeDebugPrivilege 2820 iUArG41.exe Token: SeDebugPrivilege 2188 l13Hg05.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2452 2132 75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe 66 PID 2132 wrote to memory of 2452 2132 75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe 66 PID 2132 wrote to memory of 2452 2132 75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe 66 PID 2452 wrote to memory of 2592 2452 niba1797.exe 67 PID 2452 wrote to memory of 2592 2452 niba1797.exe 67 PID 2452 wrote to memory of 2820 2452 niba1797.exe 68 PID 2452 wrote to memory of 2820 2452 niba1797.exe 68 PID 2452 wrote to memory of 2820 2452 niba1797.exe 68 PID 2132 wrote to memory of 2188 2132 75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe 70 PID 2132 wrote to memory of 2188 2132 75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe 70 PID 2132 wrote to memory of 2188 2132 75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe"C:\Users\Admin\AppData\Local\Temp\75bdc9fc91cfc67a3d6ec0f1e4cbc04954f8136755f6ae47b6db396988433a1f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba1797.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba1797.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h37cq52.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h37cq52.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iUArG41.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iUArG41.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l13Hg05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l13Hg05.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD578efaf7292c2027da40635ca1aae855a
SHA1686227a48e23b382a06c74f17d9b6f36e76042fd
SHA2562f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab
SHA51219e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a
-
Filesize
175KB
MD578efaf7292c2027da40635ca1aae855a
SHA1686227a48e23b382a06c74f17d9b6f36e76042fd
SHA2562f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab
SHA51219e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a
-
Filesize
404KB
MD55e00809532b04617d202d49f72dd4e86
SHA1a61d4f7eabb77af13b0e89de9f2e99ab6af3b7c7
SHA2568623abc3c0223a8495802768520a89db377055630f68b5b1a3c7141254360eca
SHA51276303e9f5a4ae222e0ea08942bdcd911c82669717afdccf9194b53b5e23b7909d7ba46b40055709f7d87b45d5dbe463a2be5068dc24b748ea4e90b579a703fd8
-
Filesize
404KB
MD55e00809532b04617d202d49f72dd4e86
SHA1a61d4f7eabb77af13b0e89de9f2e99ab6af3b7c7
SHA2568623abc3c0223a8495802768520a89db377055630f68b5b1a3c7141254360eca
SHA51276303e9f5a4ae222e0ea08942bdcd911c82669717afdccf9194b53b5e23b7909d7ba46b40055709f7d87b45d5dbe463a2be5068dc24b748ea4e90b579a703fd8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
358KB
MD557a3042e986c0c82ae124c839a6a4418
SHA1f5e0ba9b7d1f06fcb9ef68bf2af44aeb5569e006
SHA256b58b2eca533618cf8a080bed6d55f8f568cac9c926ba8d6ee3cbe7db6ef143bd
SHA5120ce89b63751fc7f1c0142b8bee7c37b716022a0edacf3a3f9806ed0800854414d47fa19f255f62c61d1d3770e11c064dddb7518050dd1f1353bf802083781ce2
-
Filesize
358KB
MD557a3042e986c0c82ae124c839a6a4418
SHA1f5e0ba9b7d1f06fcb9ef68bf2af44aeb5569e006
SHA256b58b2eca533618cf8a080bed6d55f8f568cac9c926ba8d6ee3cbe7db6ef143bd
SHA5120ce89b63751fc7f1c0142b8bee7c37b716022a0edacf3a3f9806ed0800854414d47fa19f255f62c61d1d3770e11c064dddb7518050dd1f1353bf802083781ce2