Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27/03/2023, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe
Resource
win10-20230220-en
General
-
Target
7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe
-
Size
685KB
-
MD5
a8ee9a1502b7e2288c59d86a5d9d4680
-
SHA1
84802cbc0e660db6a199359876fcafe5f12e46a4
-
SHA256
7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816
-
SHA512
1beeb40af2cd15b53958b9fe1258b8b2ef126303211b760772071647e7718a49768c033b71125b7c2998ae643bd1215dd0c9471e46aaceea0c1ed78f50fcea69
-
SSDEEP
12288:qMrMy90eRis6wMJwnRbrO6SJnkyHiNF/jUHGsG/75mB6WtE15k01mfdbDb0:KyIs1MJiSNwzR/7goWtE15kT1X4
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9485.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2708-179-0x0000000004C10000-0x0000000004C56000-memory.dmp family_redline behavioral1/memory/2708-180-0x0000000004C90000-0x0000000004CD4000-memory.dmp family_redline behavioral1/memory/2708-181-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-182-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-184-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-186-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-188-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-190-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-192-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-194-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-196-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-198-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-200-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-202-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-204-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-206-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-208-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-212-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-216-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/2708-218-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3200 un468341.exe 4924 pro9485.exe 2708 qu5630.exe 4804 si372508.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9485.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9485.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un468341.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un468341.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4924 pro9485.exe 4924 pro9485.exe 2708 qu5630.exe 2708 qu5630.exe 4804 si372508.exe 4804 si372508.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4924 pro9485.exe Token: SeDebugPrivilege 2708 qu5630.exe Token: SeDebugPrivilege 4804 si372508.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4340 wrote to memory of 3200 4340 7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe 66 PID 4340 wrote to memory of 3200 4340 7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe 66 PID 4340 wrote to memory of 3200 4340 7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe 66 PID 3200 wrote to memory of 4924 3200 un468341.exe 67 PID 3200 wrote to memory of 4924 3200 un468341.exe 67 PID 3200 wrote to memory of 4924 3200 un468341.exe 67 PID 3200 wrote to memory of 2708 3200 un468341.exe 68 PID 3200 wrote to memory of 2708 3200 un468341.exe 68 PID 3200 wrote to memory of 2708 3200 un468341.exe 68 PID 4340 wrote to memory of 4804 4340 7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe 70 PID 4340 wrote to memory of 4804 4340 7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe 70 PID 4340 wrote to memory of 4804 4340 7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe"C:\Users\Admin\AppData\Local\Temp\7be4862fd2540d732f0c00085659c784dcfb37ba1bc6f0de03bd63cdc5486816.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468341.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468341.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9485.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9485.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372508.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372508.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD57ac46aa5052e8db30c09aa0c8e63f76b
SHA179b9d9398c4f3fd8c3b0a3ff1a2f61cfb4ca033c
SHA2569dedb882a9ebef66568455cf0d9a94f8d4ec0ef51f6aea805abfc4c7406e9fd9
SHA512e09a42448ea0c2d834eff15619109b84127f66ea62ef2c5bb30c6e8024e584c5382d6b8550bf6da5f62a93173ba018b39cbf0fa260c67e046832275c62281cbf
-
Filesize
175KB
MD57ac46aa5052e8db30c09aa0c8e63f76b
SHA179b9d9398c4f3fd8c3b0a3ff1a2f61cfb4ca033c
SHA2569dedb882a9ebef66568455cf0d9a94f8d4ec0ef51f6aea805abfc4c7406e9fd9
SHA512e09a42448ea0c2d834eff15619109b84127f66ea62ef2c5bb30c6e8024e584c5382d6b8550bf6da5f62a93173ba018b39cbf0fa260c67e046832275c62281cbf
-
Filesize
543KB
MD5ac6a45ae2a6298a5f7c0b74594a1582e
SHA1c22664accbc376c606560bdd4fd989c9170db6d9
SHA25638b59bcb47771fbaed4c3e6ae784707cc4f1390147fcc47dd10e4b638bbccfa1
SHA51288f827fe8b20e5dc81ffe3a310654eda3d0da6affa14087741b6d6b6379d450ba5ab3c6d14e1143fee69735e0bede771ae1711410dae247a113d6d00c08dcced
-
Filesize
543KB
MD5ac6a45ae2a6298a5f7c0b74594a1582e
SHA1c22664accbc376c606560bdd4fd989c9170db6d9
SHA25638b59bcb47771fbaed4c3e6ae784707cc4f1390147fcc47dd10e4b638bbccfa1
SHA51288f827fe8b20e5dc81ffe3a310654eda3d0da6affa14087741b6d6b6379d450ba5ab3c6d14e1143fee69735e0bede771ae1711410dae247a113d6d00c08dcced
-
Filesize
292KB
MD5b34b385e19e8b82d9857aec4cc3c5b79
SHA1ce0fa8a16032fdd132ea9387e3c27a0407ad3aef
SHA256faaadd95814ff2ddc3bf489daef955413a4bf69dc6ee166b7ac2b751c448edb1
SHA512f6dfa12123b102ad928d8eaac2ed7f39b3533fc022e6c1c2adf3b263d065f2fa0a0740606626b9ba1a9e1e7431d2b0a6776c5f609a155d7d5335edf464223291
-
Filesize
292KB
MD5b34b385e19e8b82d9857aec4cc3c5b79
SHA1ce0fa8a16032fdd132ea9387e3c27a0407ad3aef
SHA256faaadd95814ff2ddc3bf489daef955413a4bf69dc6ee166b7ac2b751c448edb1
SHA512f6dfa12123b102ad928d8eaac2ed7f39b3533fc022e6c1c2adf3b263d065f2fa0a0740606626b9ba1a9e1e7431d2b0a6776c5f609a155d7d5335edf464223291
-
Filesize
350KB
MD583998dc38017cb848666499b36f69a1b
SHA15446a2ad1a653e690d3a99864a37c7859a7ac9b8
SHA2569d413804fd90e334663b1f66cd3343f234e6a3af3fd180ac975132e0d6013d07
SHA512cee559961dbae8c7c60ba998ab355c2b121a4696286a09ba2d8dd3cd609109162963b7ff42e227d1a30a6dccfd1f312757c98f53e6660909d033eb3994e7cf8d
-
Filesize
350KB
MD583998dc38017cb848666499b36f69a1b
SHA15446a2ad1a653e690d3a99864a37c7859a7ac9b8
SHA2569d413804fd90e334663b1f66cd3343f234e6a3af3fd180ac975132e0d6013d07
SHA512cee559961dbae8c7c60ba998ab355c2b121a4696286a09ba2d8dd3cd609109162963b7ff42e227d1a30a6dccfd1f312757c98f53e6660909d033eb3994e7cf8d