Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27/03/2023, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe
Resource
win10-20230220-en
General
-
Target
da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe
-
Size
685KB
-
MD5
7170710f160f0080d02b94779a53f277
-
SHA1
378638fbb9579bd46f635058e11001cb7e4f676a
-
SHA256
da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02
-
SHA512
2d4499789d8912ec79b18e6881155cc7ccb65b3827a08a9da7d63979f24e5737870c0c565e8bdd0c535b924b6984b332d352480e364223811856b77495af170e
-
SSDEEP
12288:rMrmy90iIeroQM2rTLszDLjGD7M9XjRBIBrRwEJo44zWlfA5q:FyoNt2rMzDHGY9TQhRwEJobYA5q
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5117.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/2252-174-0x0000000002450000-0x0000000002496000-memory.dmp family_redline behavioral1/memory/2252-175-0x0000000002620000-0x0000000002664000-memory.dmp family_redline behavioral1/memory/2252-176-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-177-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-179-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-181-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-183-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-185-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-187-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-189-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-191-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-193-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-195-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-197-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-199-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-201-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-203-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-205-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-207-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-209-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/2252-503-0x0000000004F10000-0x0000000004F20000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4048 un218721.exe 4116 pro5117.exe 2252 qu0515.exe 4520 si294742.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5117.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un218721.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un218721.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4116 pro5117.exe 4116 pro5117.exe 2252 qu0515.exe 2252 qu0515.exe 4520 si294742.exe 4520 si294742.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4116 pro5117.exe Token: SeDebugPrivilege 2252 qu0515.exe Token: SeDebugPrivilege 4520 si294742.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3476 wrote to memory of 4048 3476 da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe 66 PID 3476 wrote to memory of 4048 3476 da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe 66 PID 3476 wrote to memory of 4048 3476 da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe 66 PID 4048 wrote to memory of 4116 4048 un218721.exe 67 PID 4048 wrote to memory of 4116 4048 un218721.exe 67 PID 4048 wrote to memory of 4116 4048 un218721.exe 67 PID 4048 wrote to memory of 2252 4048 un218721.exe 68 PID 4048 wrote to memory of 2252 4048 un218721.exe 68 PID 4048 wrote to memory of 2252 4048 un218721.exe 68 PID 3476 wrote to memory of 4520 3476 da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe 70 PID 3476 wrote to memory of 4520 3476 da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe 70 PID 3476 wrote to memory of 4520 3476 da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe"C:\Users\Admin\AppData\Local\Temp\da3866412b6a1bd2804ed799ec23dfc31f573dcfc9f4ad3fea1481ebb5023e02.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un218721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un218721.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5117.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5117.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0515.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si294742.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si294742.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5da5b23e7498c4b200a0fbf4679f05989
SHA13afcdaaa40db40ca098fcfd2a645fa0f89e2d1a7
SHA25690d6b56ec18ace6c2fb36785fb49e32c41786feac8d4dbae1744b1e692a8a476
SHA5128f78ef03de02fdee3bf9ebed6a5c6ad22948f111774d5d8eafb947db242859050be1419072665b504c047f0ca5fbb89af4eaed61bcf7b7e8e3905bf2e368fd5d
-
Filesize
175KB
MD5da5b23e7498c4b200a0fbf4679f05989
SHA13afcdaaa40db40ca098fcfd2a645fa0f89e2d1a7
SHA25690d6b56ec18ace6c2fb36785fb49e32c41786feac8d4dbae1744b1e692a8a476
SHA5128f78ef03de02fdee3bf9ebed6a5c6ad22948f111774d5d8eafb947db242859050be1419072665b504c047f0ca5fbb89af4eaed61bcf7b7e8e3905bf2e368fd5d
-
Filesize
543KB
MD56664cc6e85579782686b9fd9355bcaf9
SHA1904af2e783e998ba7c1e099beb88143b8200a81e
SHA256f6967dbd944c68eb43fa559117e7ac032f8e82c3f98237b6a1a55c19f7339481
SHA512ad149859057e78b44f06d97d432b318f7211a89afeee31bc1469d5e123e7317cb0ad9ecbcb86e7c3ad429c2f0ad64617a96541204934ad6165d564b854b41f5b
-
Filesize
543KB
MD56664cc6e85579782686b9fd9355bcaf9
SHA1904af2e783e998ba7c1e099beb88143b8200a81e
SHA256f6967dbd944c68eb43fa559117e7ac032f8e82c3f98237b6a1a55c19f7339481
SHA512ad149859057e78b44f06d97d432b318f7211a89afeee31bc1469d5e123e7317cb0ad9ecbcb86e7c3ad429c2f0ad64617a96541204934ad6165d564b854b41f5b
-
Filesize
292KB
MD584b380b921d80ac66ba528e01b0993cf
SHA1115df9271278cacf4d4b448c8cf245eea9eee0a4
SHA256d0251391171a173fcab1643e613b689895212cada022a920f2c81973abecb8fb
SHA512fd990011dc8a6e4d61c179361a7361bfac7aecb997c7c4e5e720c8b6f74e356dbf145884ecb0df1e5973a40845a215de339ab8cc24bc87ddc8c9ea8e23d7287f
-
Filesize
292KB
MD584b380b921d80ac66ba528e01b0993cf
SHA1115df9271278cacf4d4b448c8cf245eea9eee0a4
SHA256d0251391171a173fcab1643e613b689895212cada022a920f2c81973abecb8fb
SHA512fd990011dc8a6e4d61c179361a7361bfac7aecb997c7c4e5e720c8b6f74e356dbf145884ecb0df1e5973a40845a215de339ab8cc24bc87ddc8c9ea8e23d7287f
-
Filesize
350KB
MD5ce5af866ae9e169e5a87381daaf86b65
SHA17f7fae1eb4192ff8a1b1173b24366ae8c3b47f1f
SHA2569127aa7c607a089361ba587e47d256025b26bff9b8521342fac7806a63daf6ce
SHA51222fae1ac6db8a854ab49f2b8d79d8877e54521c182561af576ce8d3e0b0c0580120ce07d178ef36f814916487655a581e8e2991a5af4248c05da2fd24439f7a2
-
Filesize
350KB
MD5ce5af866ae9e169e5a87381daaf86b65
SHA17f7fae1eb4192ff8a1b1173b24366ae8c3b47f1f
SHA2569127aa7c607a089361ba587e47d256025b26bff9b8521342fac7806a63daf6ce
SHA51222fae1ac6db8a854ab49f2b8d79d8877e54521c182561af576ce8d3e0b0c0580120ce07d178ef36f814916487655a581e8e2991a5af4248c05da2fd24439f7a2