Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
90s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
27/03/2023, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe
Resource
win10-20230220-en
General
-
Target
d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe
-
Size
695KB
-
MD5
834ae0339567c8e0bc57d356480e5ac5
-
SHA1
f3f0cb75291bd459f0edb6fe54c7aa461b53171f
-
SHA256
d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939
-
SHA512
e3ebbf2155fdcc853d375afd661b5c338c2df8dd22f16dc0e35eb156e18dcbce2660e1f485873a0a829e702338f2660a9988931e6f09bb651ae8664faeecf2cf
-
SSDEEP
12288:/Mrqy90reOTNoYD/W7ULq/fDtU+AXumlJDQ4BJ/TfLZ0q8n8zmNjJepKwQ5Lf5xT:RyepNoYLW7UmxQXHlBQ43/F80mlg45DL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1081.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1081.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4708-178-0x00000000027A0000-0x00000000027E6000-memory.dmp family_redline behavioral1/memory/4708-179-0x0000000004C90000-0x0000000004CD4000-memory.dmp family_redline behavioral1/memory/4708-181-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-180-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-183-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-185-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-187-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-189-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-191-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-193-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-195-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-197-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-199-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-201-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-203-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-205-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-207-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-210-0x0000000004D50000-0x0000000004D60000-memory.dmp family_redline behavioral1/memory/4708-212-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-215-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline behavioral1/memory/4708-217-0x0000000004C90000-0x0000000004CCF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2804 un221267.exe 2592 pro1081.exe 4708 qu9604.exe 1588 si941493.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1081.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1081.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un221267.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un221267.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2592 pro1081.exe 2592 pro1081.exe 4708 qu9604.exe 4708 qu9604.exe 1588 si941493.exe 1588 si941493.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2592 pro1081.exe Token: SeDebugPrivilege 4708 qu9604.exe Token: SeDebugPrivilege 1588 si941493.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2804 2456 d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe 66 PID 2456 wrote to memory of 2804 2456 d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe 66 PID 2456 wrote to memory of 2804 2456 d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe 66 PID 2804 wrote to memory of 2592 2804 un221267.exe 67 PID 2804 wrote to memory of 2592 2804 un221267.exe 67 PID 2804 wrote to memory of 2592 2804 un221267.exe 67 PID 2804 wrote to memory of 4708 2804 un221267.exe 68 PID 2804 wrote to memory of 4708 2804 un221267.exe 68 PID 2804 wrote to memory of 4708 2804 un221267.exe 68 PID 2456 wrote to memory of 1588 2456 d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe 70 PID 2456 wrote to memory of 1588 2456 d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe 70 PID 2456 wrote to memory of 1588 2456 d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe"C:\Users\Admin\AppData\Local\Temp\d3a0472b8ae378c5948292cae5c612e21718755c667322853af45cbd50c95939.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221267.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221267.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1081.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1081.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9604.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si941493.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si941493.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5227426d584c5e1f57214e7f12bb219ec
SHA18c1f4c83cf022fd3a23fd09f266ae0425f51d695
SHA25698dc8c1e1e161cba434a05d20aaef7624d2a7c51351a5c5159c9c281555c97c2
SHA512a4590ccdad4e832ddcf979ad3c13120387153fde6c0b34a180421c70a7fee3b5983a2027d252bf4df53768044d3453ef76b6596416b10e51f487ba3118fe12b5
-
Filesize
175KB
MD5227426d584c5e1f57214e7f12bb219ec
SHA18c1f4c83cf022fd3a23fd09f266ae0425f51d695
SHA25698dc8c1e1e161cba434a05d20aaef7624d2a7c51351a5c5159c9c281555c97c2
SHA512a4590ccdad4e832ddcf979ad3c13120387153fde6c0b34a180421c70a7fee3b5983a2027d252bf4df53768044d3453ef76b6596416b10e51f487ba3118fe12b5
-
Filesize
553KB
MD5e44e899851ba7ae3d903f74b971fca48
SHA14668cb5091a8b6d564cef2325365cc24f4ddf42b
SHA256703bf15ff8e9f20d392b8ad7d7d5fc832acd0227983a793163d945c8a35df2b2
SHA51291cc5cbe6a46c3d714b419d19bb34b8c5c62619c2c22fdecd80ab3e01016f4a106cfe60cb8d25750d5c6775ecd6c69f17fd5bce3fe4557984624bc131476b91d
-
Filesize
553KB
MD5e44e899851ba7ae3d903f74b971fca48
SHA14668cb5091a8b6d564cef2325365cc24f4ddf42b
SHA256703bf15ff8e9f20d392b8ad7d7d5fc832acd0227983a793163d945c8a35df2b2
SHA51291cc5cbe6a46c3d714b419d19bb34b8c5c62619c2c22fdecd80ab3e01016f4a106cfe60cb8d25750d5c6775ecd6c69f17fd5bce3fe4557984624bc131476b91d
-
Filesize
308KB
MD57c0f074b27e62dee65be5e18fb336e00
SHA1a553c93218f0a3b9e22fa8e0162003427040d92d
SHA256222ccd6021db3de6155b674eb0f37ecb072b79846e4c7f484ca3c5adb14d718e
SHA512f66ce84f46fda01b1aff05277ed7c8ab4a2e083a5459f7e227c7071365566995616ecb55bec7c4d8a13ed169897c83bf1271fd537477c2f6a903082ba0c6b8aa
-
Filesize
308KB
MD57c0f074b27e62dee65be5e18fb336e00
SHA1a553c93218f0a3b9e22fa8e0162003427040d92d
SHA256222ccd6021db3de6155b674eb0f37ecb072b79846e4c7f484ca3c5adb14d718e
SHA512f66ce84f46fda01b1aff05277ed7c8ab4a2e083a5459f7e227c7071365566995616ecb55bec7c4d8a13ed169897c83bf1271fd537477c2f6a903082ba0c6b8aa
-
Filesize
366KB
MD51ea306c617a0177c9372308c040b89dd
SHA1a0a0383cb327e91dadd841350609d3c33ff6c86f
SHA256936b356f35d2a15bda05ef0fca312ec48e0434e51d1a192ea2a2516a5f5c7811
SHA512edba6742c7e9ea2881f293883630d6e8028aab75431beda46235e4a4703af6c92a5882c8cc452bc898266f150b28d1c8bc81213ae2a35595bf2447a963c6e0ae
-
Filesize
366KB
MD51ea306c617a0177c9372308c040b89dd
SHA1a0a0383cb327e91dadd841350609d3c33ff6c86f
SHA256936b356f35d2a15bda05ef0fca312ec48e0434e51d1a192ea2a2516a5f5c7811
SHA512edba6742c7e9ea2881f293883630d6e8028aab75431beda46235e4a4703af6c92a5882c8cc452bc898266f150b28d1c8bc81213ae2a35595bf2447a963c6e0ae