Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
87s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe
Resource
win10v2004-20230220-en
General
-
Target
c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe
-
Size
695KB
-
MD5
9949a89ddfe8e005beac43bb66cfd65b
-
SHA1
b870a218401ca88b004a2c99e38642c9727168c3
-
SHA256
c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92
-
SHA512
323f6fa07917b8002b3956da26eb8f45ee203c2b0306e0f098e212bcc5403062ecc45d0c7cb6d3929868712b5c29e01c639f361ffe4826c13aab12cf20ffa25f
-
SSDEEP
12288:yMrNy90Qc7kJ278CKoY9940BFFxMylsQ2lWYbEzVhtJ0aEDnJlHI:PyA7kaPKT2OFxMylsQezsVjylTJ9I
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7944.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4884-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-205-0x0000000004D40000-0x0000000004D50000-memory.dmp family_redline behavioral1/memory/4884-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-226-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/4884-228-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4416 un556306.exe 1160 pro7944.exe 4884 qu8276.exe 5068 si938803.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7944.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7944.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un556306.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un556306.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1160 pro7944.exe 1160 pro7944.exe 4884 qu8276.exe 4884 qu8276.exe 5068 si938803.exe 5068 si938803.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1160 pro7944.exe Token: SeDebugPrivilege 4884 qu8276.exe Token: SeDebugPrivilege 5068 si938803.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1836 wrote to memory of 4416 1836 c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe 83 PID 1836 wrote to memory of 4416 1836 c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe 83 PID 1836 wrote to memory of 4416 1836 c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe 83 PID 4416 wrote to memory of 1160 4416 un556306.exe 84 PID 4416 wrote to memory of 1160 4416 un556306.exe 84 PID 4416 wrote to memory of 1160 4416 un556306.exe 84 PID 4416 wrote to memory of 4884 4416 un556306.exe 90 PID 4416 wrote to memory of 4884 4416 un556306.exe 90 PID 4416 wrote to memory of 4884 4416 un556306.exe 90 PID 1836 wrote to memory of 5068 1836 c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe 91 PID 1836 wrote to memory of 5068 1836 c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe 91 PID 1836 wrote to memory of 5068 1836 c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe"C:\Users\Admin\AppData\Local\Temp\c15291b484a401b37976559f7c8a1320e725f2371bd0dd8b2b08928e55799b92.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556306.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556306.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7944.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7944.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8276.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8276.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si938803.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si938803.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bb6bf2ef1156251e259c430e3da214bc
SHA1c9ce12fc65fdc02b3410d8a8e7247b114de827ed
SHA2563917a5a2ec754696b113fe13a8ab5b5763de80f6449b387de9715ffd36e37717
SHA51220652d4f746d5baefe256987cb45a799fbdebc47045b4e04dbde0bec329af320b89fc367c00e6865fb067a8632cd764cca684286635ea41f9e6f3ce4a827dfd5
-
Filesize
175KB
MD5bb6bf2ef1156251e259c430e3da214bc
SHA1c9ce12fc65fdc02b3410d8a8e7247b114de827ed
SHA2563917a5a2ec754696b113fe13a8ab5b5763de80f6449b387de9715ffd36e37717
SHA51220652d4f746d5baefe256987cb45a799fbdebc47045b4e04dbde0bec329af320b89fc367c00e6865fb067a8632cd764cca684286635ea41f9e6f3ce4a827dfd5
-
Filesize
553KB
MD51cdd574ebc2cf93ba666b1420ea9c4eb
SHA1a032d7da956630cc00567708057e9b09cf5727d6
SHA25606e27269782081deca25eba84d4355caa26eac5ea9ff0d17500750a1285dba0a
SHA512a1c8577db58be3aed9ec650d639c4cc99327387340978ce03462ef94d6ccde7d6899af168648fcb22ebbebf6092dec919ac271e9b42a5260c69d80589e34430a
-
Filesize
553KB
MD51cdd574ebc2cf93ba666b1420ea9c4eb
SHA1a032d7da956630cc00567708057e9b09cf5727d6
SHA25606e27269782081deca25eba84d4355caa26eac5ea9ff0d17500750a1285dba0a
SHA512a1c8577db58be3aed9ec650d639c4cc99327387340978ce03462ef94d6ccde7d6899af168648fcb22ebbebf6092dec919ac271e9b42a5260c69d80589e34430a
-
Filesize
308KB
MD5a5a480e1c1847fa93c2715a1572e6818
SHA15a11891c20fc5832ac9a1aeeb76f6bfa620a01fe
SHA25662e80581c29ab96ac52dbeb83c6202e350134fc7eb959075a644e52ebb782566
SHA512624d1d00e08443c3392e025ced46139b779592744636b53c9e5fda6822779669acf7f8181d4b404b47f08da3286d607c59e821dc601b1833adfc8c38bc897af6
-
Filesize
308KB
MD5a5a480e1c1847fa93c2715a1572e6818
SHA15a11891c20fc5832ac9a1aeeb76f6bfa620a01fe
SHA25662e80581c29ab96ac52dbeb83c6202e350134fc7eb959075a644e52ebb782566
SHA512624d1d00e08443c3392e025ced46139b779592744636b53c9e5fda6822779669acf7f8181d4b404b47f08da3286d607c59e821dc601b1833adfc8c38bc897af6
-
Filesize
366KB
MD5d7c4787271a65e7615ad256cfd174484
SHA1f1d5a5a4e8eb63d0553aa9a778df4e97695cdf53
SHA25649a9c705524f85bc61bd3d8e065623f94a48d643589613c36c3b0a49dfbe5051
SHA512b8ebb63b50c4fb3758752cceaf43c0d2eec8a325f3d755d810e7227e615139dd0ba7c664f84614c15dab5a10e94563e33315d98945bc1a90243331b3f829339d
-
Filesize
366KB
MD5d7c4787271a65e7615ad256cfd174484
SHA1f1d5a5a4e8eb63d0553aa9a778df4e97695cdf53
SHA25649a9c705524f85bc61bd3d8e065623f94a48d643589613c36c3b0a49dfbe5051
SHA512b8ebb63b50c4fb3758752cceaf43c0d2eec8a325f3d755d810e7227e615139dd0ba7c664f84614c15dab5a10e94563e33315d98945bc1a90243331b3f829339d