Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27/03/2023, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe
Resource
win10-20230220-en
General
-
Target
ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe
-
Size
700KB
-
MD5
a949f037cb29e0b2d934dbd6b1f380ac
-
SHA1
77b2f3d3d8f4557020dbfe5446aa211e8c4ad243
-
SHA256
ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf
-
SHA512
1673e51bcf020887c47572e9655ce9e5106bdc34507fac082176a35731c937f85f41f66ef20cd9aeac7ffb7a63e9318891dc8d74f91857039cc7aa647d1cf96b
-
SSDEEP
12288:XMrly9073lIrvuRHMUo9D7FcAfDdiWYs/qWofjyLDRs/NT+KGYU:OyGATxhH/gOPRs/Nw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2181.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3480-177-0x0000000002600000-0x0000000002646000-memory.dmp family_redline behavioral1/memory/3480-178-0x00000000051D0000-0x0000000005214000-memory.dmp family_redline behavioral1/memory/3480-179-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-180-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-182-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-184-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-186-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-188-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-190-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-192-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-194-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-196-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-198-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-200-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-202-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-204-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-206-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-208-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-210-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/3480-212-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3584 un384265.exe 4136 pro2181.exe 3480 qu4017.exe 4848 si366662.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2181.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un384265.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un384265.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4136 pro2181.exe 4136 pro2181.exe 3480 qu4017.exe 3480 qu4017.exe 4848 si366662.exe 4848 si366662.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4136 pro2181.exe Token: SeDebugPrivilege 3480 qu4017.exe Token: SeDebugPrivilege 4848 si366662.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3200 wrote to memory of 3584 3200 ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe 66 PID 3200 wrote to memory of 3584 3200 ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe 66 PID 3200 wrote to memory of 3584 3200 ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe 66 PID 3584 wrote to memory of 4136 3584 un384265.exe 67 PID 3584 wrote to memory of 4136 3584 un384265.exe 67 PID 3584 wrote to memory of 4136 3584 un384265.exe 67 PID 3584 wrote to memory of 3480 3584 un384265.exe 68 PID 3584 wrote to memory of 3480 3584 un384265.exe 68 PID 3584 wrote to memory of 3480 3584 un384265.exe 68 PID 3200 wrote to memory of 4848 3200 ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe 70 PID 3200 wrote to memory of 4848 3200 ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe 70 PID 3200 wrote to memory of 4848 3200 ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe"C:\Users\Admin\AppData\Local\Temp\ba6132446bdfe2a26078cd58e985726c46344be9a8d8f9faeb4d1f07572660bf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384265.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384265.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2181.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2181.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4017.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4017.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si366662.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si366662.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5d04ef6d9765653b790fa59b2a4ba43dc
SHA1bd87e68e7a075869eed99097c822119499510a33
SHA2563896fd0d5cd6fe5d7556b8afb399c68436bf9e02fcb82ab19e2a67ce0548fa4f
SHA5122b4f209628231f610df4579d4dc491ffe6918e4c83cd63b0b1d37c2c8d60bb4309114c2844c0901e86665bd754fdfc5904945b5089ee8cabc0cd2752423e622a
-
Filesize
175KB
MD5d04ef6d9765653b790fa59b2a4ba43dc
SHA1bd87e68e7a075869eed99097c822119499510a33
SHA2563896fd0d5cd6fe5d7556b8afb399c68436bf9e02fcb82ab19e2a67ce0548fa4f
SHA5122b4f209628231f610df4579d4dc491ffe6918e4c83cd63b0b1d37c2c8d60bb4309114c2844c0901e86665bd754fdfc5904945b5089ee8cabc0cd2752423e622a
-
Filesize
558KB
MD5140291d5c33afaced365080fcb3fd8b4
SHA1ee1406fa91ac72c7284004904c71f560f13ee436
SHA2566db6d72ddf31d948982de4872f4e07fd4949b66ad518b720a6ef99003613c33d
SHA512d82487c4e7bd32da600a54fd1fd6316c1fdd06359ed66d4e0537334fbeb3b718b9e1b917715c658d4a1cfb937ea53f2a0c75eeb0939ad174df7d62f71b6d943e
-
Filesize
558KB
MD5140291d5c33afaced365080fcb3fd8b4
SHA1ee1406fa91ac72c7284004904c71f560f13ee436
SHA2566db6d72ddf31d948982de4872f4e07fd4949b66ad518b720a6ef99003613c33d
SHA512d82487c4e7bd32da600a54fd1fd6316c1fdd06359ed66d4e0537334fbeb3b718b9e1b917715c658d4a1cfb937ea53f2a0c75eeb0939ad174df7d62f71b6d943e
-
Filesize
307KB
MD5a47121bc3791d827c0fecc5473639b4c
SHA16960349e99dbd445feebfb36fc1cf989a74e3bf1
SHA256a535d7e96d86edd081ac37dc759e541e60a13d14b17dcc995065e6bda48eb03f
SHA51281de82433bc23e2b8c4b7d6d224adece713ef68ff148b0fcdfeeae301d0ec86355a57d751edc27a39ef45f1f07365cee8fda3218430bac0df475c9c75e3e9f81
-
Filesize
307KB
MD5a47121bc3791d827c0fecc5473639b4c
SHA16960349e99dbd445feebfb36fc1cf989a74e3bf1
SHA256a535d7e96d86edd081ac37dc759e541e60a13d14b17dcc995065e6bda48eb03f
SHA51281de82433bc23e2b8c4b7d6d224adece713ef68ff148b0fcdfeeae301d0ec86355a57d751edc27a39ef45f1f07365cee8fda3218430bac0df475c9c75e3e9f81
-
Filesize
365KB
MD56b516fe1627cc0f4bdcd429bcf26c573
SHA19a49c9c2baf04d71f15067c83d02f09de69bca1a
SHA2566f5a70744563cb37e9ceda36fc7c0d2f4fb3b13fd692931ef6327b71cc292006
SHA5124265e85c97888689afa3eb90a9325f387c2c4df8cb20f63f1bedfcd7b3ec88e781b6d368972c53bd6a201c73a1967071608e4203766df8e344a2fe784731be2a
-
Filesize
365KB
MD56b516fe1627cc0f4bdcd429bcf26c573
SHA19a49c9c2baf04d71f15067c83d02f09de69bca1a
SHA2566f5a70744563cb37e9ceda36fc7c0d2f4fb3b13fd692931ef6327b71cc292006
SHA5124265e85c97888689afa3eb90a9325f387c2c4df8cb20f63f1bedfcd7b3ec88e781b6d368972c53bd6a201c73a1967071608e4203766df8e344a2fe784731be2a