Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26/03/2023, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe
Resource
win10-20230220-en
General
-
Target
29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe
-
Size
686KB
-
MD5
4615b944298d2196a74af4a3c9bb64ba
-
SHA1
67f96a57b78ba50cbf2241bcd13e3c204543cb55
-
SHA256
29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8
-
SHA512
6cedb084cb1f43b72a6f4b15e05ec58e464bdbb818264877706f37fd8300df068ae78ea8741147a978ec99d2456c940025ada85c6f4d1ce42360feb79ebafd05
-
SSDEEP
12288:IMrKy90Ie00QXKMcHcMJmwim+FXOSyMK496PuSjaAxKCbFv:iywEKMcHLcwim+FXOie/jz
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
dogma
193.233.20.32:4125
-
auth_value
1b692976ca991040f2e8890409c35142
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8687.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4428-180-0x00000000070C0000-0x0000000007106000-memory.dmp family_redline behavioral1/memory/4428-181-0x0000000007140000-0x0000000007184000-memory.dmp family_redline behavioral1/memory/4428-182-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-183-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-185-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-189-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-197-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-195-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-193-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-191-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-187-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-200-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-204-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-207-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-209-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-219-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-217-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-215-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-213-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/4428-211-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2496 un880772.exe 2800 pro8687.exe 4428 qu5986.exe 5100 si044994.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8687.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un880772.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un880772.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2800 pro8687.exe 2800 pro8687.exe 4428 qu5986.exe 4428 qu5986.exe 5100 si044994.exe 5100 si044994.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2800 pro8687.exe Token: SeDebugPrivilege 4428 qu5986.exe Token: SeDebugPrivilege 5100 si044994.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2496 2392 29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe 66 PID 2392 wrote to memory of 2496 2392 29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe 66 PID 2392 wrote to memory of 2496 2392 29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe 66 PID 2496 wrote to memory of 2800 2496 un880772.exe 67 PID 2496 wrote to memory of 2800 2496 un880772.exe 67 PID 2496 wrote to memory of 2800 2496 un880772.exe 67 PID 2496 wrote to memory of 4428 2496 un880772.exe 68 PID 2496 wrote to memory of 4428 2496 un880772.exe 68 PID 2496 wrote to memory of 4428 2496 un880772.exe 68 PID 2392 wrote to memory of 5100 2392 29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe 70 PID 2392 wrote to memory of 5100 2392 29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe 70 PID 2392 wrote to memory of 5100 2392 29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe"C:\Users\Admin\AppData\Local\Temp\29727414c24b6376906ffecc95c2ec543ebc0609a6010b18c69590fb742d73f8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un880772.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un880772.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8687.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8687.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5986.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si044994.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si044994.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b5fa188104a5c46a03c30d62995ad646
SHA10ed123ce7c6fcd71d29d7e4108bb46ccb8483ec6
SHA256ca7b9d933b9201c09b367dfc7ec4e5075b01e6f42fa18857a4a883a1b86b16cf
SHA5124689247d1f4d98fcfe840b4fe1b5ca4794b67cb34141d9cd8573c0fefb66f66bf1f887fa080cfce5cf904966f8361beaeca57b26282be6ea97f5287296d73117
-
Filesize
175KB
MD5b5fa188104a5c46a03c30d62995ad646
SHA10ed123ce7c6fcd71d29d7e4108bb46ccb8483ec6
SHA256ca7b9d933b9201c09b367dfc7ec4e5075b01e6f42fa18857a4a883a1b86b16cf
SHA5124689247d1f4d98fcfe840b4fe1b5ca4794b67cb34141d9cd8573c0fefb66f66bf1f887fa080cfce5cf904966f8361beaeca57b26282be6ea97f5287296d73117
-
Filesize
544KB
MD559d44a9b17c3bcf525e76610d6f822fb
SHA1c27081b69492876901f9d0f4f36f74405ab8d336
SHA256c4ffe4357c282ec07b7855127195ba33af6ae1add0cd108cb3b136183e012e4a
SHA51200ffce1f3fb4860c9403d1ef08dad77ab36adda59c585297240b26fa78411ed552a8421d92fa32616648f94238a265b796c6cf58ac0669f56d69c8ae2bbc92bb
-
Filesize
544KB
MD559d44a9b17c3bcf525e76610d6f822fb
SHA1c27081b69492876901f9d0f4f36f74405ab8d336
SHA256c4ffe4357c282ec07b7855127195ba33af6ae1add0cd108cb3b136183e012e4a
SHA51200ffce1f3fb4860c9403d1ef08dad77ab36adda59c585297240b26fa78411ed552a8421d92fa32616648f94238a265b796c6cf58ac0669f56d69c8ae2bbc92bb
-
Filesize
326KB
MD558ec779d49c5d8c8751d997500f1511f
SHA1ccd3aca0aee1d83a4460aee92a9a9b3e305be343
SHA2564e7fb8a5c06cf1f6d5a887ca19dcef625712566a55c02f196ffa291a13fff0ec
SHA512325cbad1d7757fbe44396812173a7829976e63d26302a88ebc0c94eb6499e29d28a7a3fff42b5a8a68b41b5a791ffdc4a2f6a0ac30e0372023c31724088e463b
-
Filesize
326KB
MD558ec779d49c5d8c8751d997500f1511f
SHA1ccd3aca0aee1d83a4460aee92a9a9b3e305be343
SHA2564e7fb8a5c06cf1f6d5a887ca19dcef625712566a55c02f196ffa291a13fff0ec
SHA512325cbad1d7757fbe44396812173a7829976e63d26302a88ebc0c94eb6499e29d28a7a3fff42b5a8a68b41b5a791ffdc4a2f6a0ac30e0372023c31724088e463b
-
Filesize
384KB
MD517882143beedb39f876e7647a7793280
SHA11cfa2b1c218044aac3db48bb861d8bd5ad03457b
SHA25649f8f2b63c427ddb5189d38883cacefa2d4f0033e2a7af5f56a36e8dc1a47ce6
SHA51267af88eab2767222f947e9fbbe4614809fcc7c4b2f8aff0258d21f74981ec54503b912c00c688e229feaa3fb926eb9f7b3d3e29564be016cefab3e290cc4e051
-
Filesize
384KB
MD517882143beedb39f876e7647a7793280
SHA11cfa2b1c218044aac3db48bb861d8bd5ad03457b
SHA25649f8f2b63c427ddb5189d38883cacefa2d4f0033e2a7af5f56a36e8dc1a47ce6
SHA51267af88eab2767222f947e9fbbe4614809fcc7c4b2f8aff0258d21f74981ec54503b912c00c688e229feaa3fb926eb9f7b3d3e29564be016cefab3e290cc4e051