Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2023, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe
Resource
win10v2004-20230220-en
General
-
Target
31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe
-
Size
551KB
-
MD5
b3b97a9fbd6f570f8cd5d7eda6106d27
-
SHA1
0b348a8cbc510a18547e2889fa90e1cf1739dece
-
SHA256
31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f
-
SHA512
27699ad91621ccf772447e42ad216debe6bd558cffb0af71ff170aed1195bf596a9ee65e2c42245c1c40ce172ec92a9030e399821d805601cdb271ded3f9722c
-
SSDEEP
12288:2MrDy90RkGLr0toBW4gzLC4hoiVcv0GdeTQ/d/9w5CMqwO:pyd+xcLCahVcMTO9w5MwO
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
rotik
193.233.20.32:4125
-
auth_value
74863478ae154e921eb729354d2bb4bd
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h37mO95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h37mO95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h37mO95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h37mO95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h37mO95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h37mO95.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/1572-155-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-156-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-158-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-160-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-162-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-164-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-166-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-168-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-171-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-175-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-177-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-179-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-181-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-183-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-185-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-187-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-189-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-191-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-193-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-195-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-197-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-199-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-201-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-203-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-205-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-207-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-209-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-211-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-213-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-215-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-217-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-219-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-221-0x0000000007830000-0x000000000786F000-memory.dmp family_redline behavioral1/memory/1572-1076-0x0000000007260000-0x0000000007270000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1184 niba9230.exe 640 h37mO95.exe 1572 izwzU84.exe 5068 l95lN63.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h37mO95.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba9230.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce niba9230.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2540 1572 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 640 h37mO95.exe 640 h37mO95.exe 1572 izwzU84.exe 1572 izwzU84.exe 5068 l95lN63.exe 5068 l95lN63.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 640 h37mO95.exe Token: SeDebugPrivilege 1572 izwzU84.exe Token: SeDebugPrivilege 5068 l95lN63.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3772 wrote to memory of 1184 3772 31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe 86 PID 3772 wrote to memory of 1184 3772 31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe 86 PID 3772 wrote to memory of 1184 3772 31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe 86 PID 1184 wrote to memory of 640 1184 niba9230.exe 87 PID 1184 wrote to memory of 640 1184 niba9230.exe 87 PID 1184 wrote to memory of 1572 1184 niba9230.exe 88 PID 1184 wrote to memory of 1572 1184 niba9230.exe 88 PID 1184 wrote to memory of 1572 1184 niba9230.exe 88 PID 3772 wrote to memory of 5068 3772 31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe 91 PID 3772 wrote to memory of 5068 3772 31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe 91 PID 3772 wrote to memory of 5068 3772 31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe"C:\Users\Admin\AppData\Local\Temp\31bbabb67a9e0edf41eb5625b820ee165bc3dc60774acf41e96a5340b8f3c65f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba9230.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba9230.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h37mO95.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h37mO95.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izwzU84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izwzU84.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 13284⤵
- Program crash
PID:2540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l95lN63.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l95lN63.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1572 -ip 15721⤵PID:4416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5efc3b1703bec9a0e79d4a9fdcedf4a20
SHA1d019bfe5fbf05fde5cae0029f9580dca9677a3b2
SHA2561d9b391ee239469206cf31022b982e66c2ab463d3106a38526103e1c1b8be855
SHA512f36bbf81fe3bb68c8c8a1fc19dd7c79b386cfdb13b1e5d5e617c4a5ef8a38ed4c4c717f466c9293e2e1067d0f94c9d1ebc1814919e5c572dc66365fdd6009b8a
-
Filesize
175KB
MD5efc3b1703bec9a0e79d4a9fdcedf4a20
SHA1d019bfe5fbf05fde5cae0029f9580dca9677a3b2
SHA2561d9b391ee239469206cf31022b982e66c2ab463d3106a38526103e1c1b8be855
SHA512f36bbf81fe3bb68c8c8a1fc19dd7c79b386cfdb13b1e5d5e617c4a5ef8a38ed4c4c717f466c9293e2e1067d0f94c9d1ebc1814919e5c572dc66365fdd6009b8a
-
Filesize
410KB
MD5490a0c0211af614e45deb749645cee98
SHA1a63f370535f07012f2ae6c96f89f27d97498cfcd
SHA25689b755c548dc3e2008266eb974deb4afd9ccfb27afea6e231a298dfd7c3050a2
SHA512888928c768ff1fb358d50fc9183d5ed86814c07bc1fa434bdbe6fbf6e6d02fbad22e4afa725298c602cf08801c51720ecfe405690b5d8e3c8bedfb5b49a64c73
-
Filesize
410KB
MD5490a0c0211af614e45deb749645cee98
SHA1a63f370535f07012f2ae6c96f89f27d97498cfcd
SHA25689b755c548dc3e2008266eb974deb4afd9ccfb27afea6e231a298dfd7c3050a2
SHA512888928c768ff1fb358d50fc9183d5ed86814c07bc1fa434bdbe6fbf6e6d02fbad22e4afa725298c602cf08801c51720ecfe405690b5d8e3c8bedfb5b49a64c73
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
382KB
MD5970f8ed9fecb29acc65cc79ea2fd62b4
SHA18d4a58387510b6424dd9ba08fc41c0163da637ab
SHA256ca2fca4093a23672e0441e2f81fc14927ea1b7c8075a36c15749a7d611db8898
SHA51286938550d6ddc1a24f1fccf2c7491d1573c19ecd0938874bc23947d8dacc559df7874fdd66a567ec8bd9ac75ed454c44899ee41454ffd2f40895c3c898fe0645
-
Filesize
382KB
MD5970f8ed9fecb29acc65cc79ea2fd62b4
SHA18d4a58387510b6424dd9ba08fc41c0163da637ab
SHA256ca2fca4093a23672e0441e2f81fc14927ea1b7c8075a36c15749a7d611db8898
SHA51286938550d6ddc1a24f1fccf2c7491d1573c19ecd0938874bc23947d8dacc559df7874fdd66a567ec8bd9ac75ed454c44899ee41454ffd2f40895c3c898fe0645