Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe
Resource
win10v2004-20230221-en
General
-
Target
ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe
-
Size
695KB
-
MD5
bfb893eee9a49fa0ab9efa40102233bc
-
SHA1
75ed95c500c55f245f9abd8bcb9e2cc6f18bfbbe
-
SHA256
ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253
-
SHA512
a69d362e1ac2e60c85d8969950899c21dcba5d781a6efb8f4a69b30eacfe979382f5bc391beb3c4a0f61c7879ad9b72ec6b05dc61124ce9e10c1ae32e02aa13d
-
SSDEEP
12288:9Mrly90+3xtSFmRNBTi9rXBJGKJRvApuPlDstw1j/vPSpzAt7JT9t/1zL1:0yN7Ti9rX+KMpelDsQj/y5A9nttF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2291.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2291.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2291.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2291.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2291.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2291.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/3496-191-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-192-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-194-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-196-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-198-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-200-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-202-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-204-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-208-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-206-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-210-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-212-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-216-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-220-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-217-0x0000000004D40000-0x0000000004D50000-memory.dmp family_redline behavioral1/memory/3496-222-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-224-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-226-0x0000000005300000-0x000000000533F000-memory.dmp family_redline behavioral1/memory/3496-228-0x0000000005300000-0x000000000533F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 908 un515138.exe 1152 pro2291.exe 3496 qu5425.exe 2012 si266401.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2291.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2291.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un515138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un515138.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1152 pro2291.exe 1152 pro2291.exe 3496 qu5425.exe 3496 qu5425.exe 2012 si266401.exe 2012 si266401.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1152 pro2291.exe Token: SeDebugPrivilege 3496 qu5425.exe Token: SeDebugPrivilege 2012 si266401.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2932 wrote to memory of 908 2932 ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe 84 PID 2932 wrote to memory of 908 2932 ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe 84 PID 2932 wrote to memory of 908 2932 ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe 84 PID 908 wrote to memory of 1152 908 un515138.exe 85 PID 908 wrote to memory of 1152 908 un515138.exe 85 PID 908 wrote to memory of 1152 908 un515138.exe 85 PID 908 wrote to memory of 3496 908 un515138.exe 89 PID 908 wrote to memory of 3496 908 un515138.exe 89 PID 908 wrote to memory of 3496 908 un515138.exe 89 PID 2932 wrote to memory of 2012 2932 ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe 90 PID 2932 wrote to memory of 2012 2932 ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe 90 PID 2932 wrote to memory of 2012 2932 ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe"C:\Users\Admin\AppData\Local\Temp\ab18ed15e7cecf8cd14f36e3caa15ddee4518554aae310c31fa6862b110fe253.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515138.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515138.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2291.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2291.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5425.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5425.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si266401.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si266401.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD579f59598a91236c810563e1bab965f06
SHA1f4de8e6e487104775c15b7e30c2d1730b16a8fd7
SHA2560ca8d92aa268f7c716ecee90c48766c92ea7d848e2cb5804076b783e13567594
SHA512a7d4975606ed2b33a77aa7275e2cd5f07a1467c19d430b62793513a9c683e9091453b0a022c1cec1d901bcbc4b9a22728551988341c61166abc155a6a10918db
-
Filesize
175KB
MD579f59598a91236c810563e1bab965f06
SHA1f4de8e6e487104775c15b7e30c2d1730b16a8fd7
SHA2560ca8d92aa268f7c716ecee90c48766c92ea7d848e2cb5804076b783e13567594
SHA512a7d4975606ed2b33a77aa7275e2cd5f07a1467c19d430b62793513a9c683e9091453b0a022c1cec1d901bcbc4b9a22728551988341c61166abc155a6a10918db
-
Filesize
553KB
MD54889986e97277455c3f388cc1eb9bba3
SHA136745ce953fe858a64c4b5b962fd312cb7da9f02
SHA256555bc828add4a4013837aa7d4b7ba52ab46d807dab1992fa0d4d39736f1a10f5
SHA5129b6a22f2243134e77d595a0f472d312f328a915bc748532c92587fe58ca494611d7c1553d490669b309171672d1862acc3ef889fbbe2f25a1644754aad9c4bfa
-
Filesize
553KB
MD54889986e97277455c3f388cc1eb9bba3
SHA136745ce953fe858a64c4b5b962fd312cb7da9f02
SHA256555bc828add4a4013837aa7d4b7ba52ab46d807dab1992fa0d4d39736f1a10f5
SHA5129b6a22f2243134e77d595a0f472d312f328a915bc748532c92587fe58ca494611d7c1553d490669b309171672d1862acc3ef889fbbe2f25a1644754aad9c4bfa
-
Filesize
308KB
MD5627893938485b27983f8e03a5e045daa
SHA189b2506a22d6caddac982b6fcbb154722c3340e2
SHA256d7142b94b44e17dd841fb8aa19dfaf21e18501c756e6fd06892b255fa8f1adf9
SHA5120c12832c8795d6f8114e7cf784e57e75c08513e623e29b87eed0da67b6cce167e5ad41d66c2b49730f35d8f18ced651c25952e0659e00198ac14773a77648ba8
-
Filesize
308KB
MD5627893938485b27983f8e03a5e045daa
SHA189b2506a22d6caddac982b6fcbb154722c3340e2
SHA256d7142b94b44e17dd841fb8aa19dfaf21e18501c756e6fd06892b255fa8f1adf9
SHA5120c12832c8795d6f8114e7cf784e57e75c08513e623e29b87eed0da67b6cce167e5ad41d66c2b49730f35d8f18ced651c25952e0659e00198ac14773a77648ba8
-
Filesize
366KB
MD5b7a8bfda155d68e7d2ca9fd8a1367223
SHA1df8dfbe6266b7cd7032437d66c3046d7793bf1e0
SHA256a5014f398055b91817f0fa6e2b5a359649406264a28903c514809450f223bfd9
SHA512e5e9fce760bf129fd9722bff6eecb64677762cb002d2406151865ff74ffa4fe773ad6528a2e1754c2c4bbb627558d1749042ef7c800276402a92a0a8933c2390
-
Filesize
366KB
MD5b7a8bfda155d68e7d2ca9fd8a1367223
SHA1df8dfbe6266b7cd7032437d66c3046d7793bf1e0
SHA256a5014f398055b91817f0fa6e2b5a359649406264a28903c514809450f223bfd9
SHA512e5e9fce760bf129fd9722bff6eecb64677762cb002d2406151865ff74ffa4fe773ad6528a2e1754c2c4bbb627558d1749042ef7c800276402a92a0a8933c2390