Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe
Resource
win10v2004-20230221-en
General
-
Target
a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe
-
Size
695KB
-
MD5
e21d0e8c88fae74f5b5fc80f4fda8940
-
SHA1
1d7da6e4aa8a97927edadf1e9bb044b97c6b3411
-
SHA256
a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496
-
SHA512
b490c7cf06dc277399e447091effe642cb68f88c9538977e5069e71f031b989993dbf9ab6d63477b4c7fd7a43614f37b3bcc0c8614b80e2fbd48678fd7618c09
-
SSDEEP
12288:6Mrly90f6SXboEADMZQMai9Q7gnGh7wRudlbfnG2xWYozw+aJlknY8j+qZ:Xyi8EAIZQth7gnQwRclbvG2xOwxUJjxZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6366.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6366.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/440-190-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-191-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-193-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-197-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-195-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-199-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-201-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-203-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-205-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-207-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-209-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-211-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-213-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-215-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-217-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-219-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-221-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/440-223-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3684 un319684.exe 4376 pro6366.exe 440 qu5497.exe 4160 si078024.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6366.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un319684.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un319684.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4376 pro6366.exe 4376 pro6366.exe 440 qu5497.exe 440 qu5497.exe 4160 si078024.exe 4160 si078024.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4376 pro6366.exe Token: SeDebugPrivilege 440 qu5497.exe Token: SeDebugPrivilege 4160 si078024.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3680 wrote to memory of 3684 3680 a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe 82 PID 3680 wrote to memory of 3684 3680 a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe 82 PID 3680 wrote to memory of 3684 3680 a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe 82 PID 3684 wrote to memory of 4376 3684 un319684.exe 83 PID 3684 wrote to memory of 4376 3684 un319684.exe 83 PID 3684 wrote to memory of 4376 3684 un319684.exe 83 PID 3684 wrote to memory of 440 3684 un319684.exe 87 PID 3684 wrote to memory of 440 3684 un319684.exe 87 PID 3684 wrote to memory of 440 3684 un319684.exe 87 PID 3680 wrote to memory of 4160 3680 a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe 88 PID 3680 wrote to memory of 4160 3680 a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe 88 PID 3680 wrote to memory of 4160 3680 a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe"C:\Users\Admin\AppData\Local\Temp\a38d1ee425afcc20eb70b8fec701b63fea6f54f3b592516df86c4ae2042dc496.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un319684.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un319684.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6366.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5497.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5497.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078024.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078024.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5811a7ba48d4a4c775babfcd42aa46f04
SHA1b93905c1a7f70a96eb15f7ff878ffff38d213554
SHA256ae37e932c04fde26073c9dc1a014c2069161a128f167a157cecb3e8ce4ec5587
SHA51225849a696b3625bcf2b79c5efca38ba7aef3a6f0e264acab43298f76bfb41f81bd8f1a097aea423d16b22422fd8f3e676c966c39b387bc5f4ee49ea8ccf72195
-
Filesize
175KB
MD5811a7ba48d4a4c775babfcd42aa46f04
SHA1b93905c1a7f70a96eb15f7ff878ffff38d213554
SHA256ae37e932c04fde26073c9dc1a014c2069161a128f167a157cecb3e8ce4ec5587
SHA51225849a696b3625bcf2b79c5efca38ba7aef3a6f0e264acab43298f76bfb41f81bd8f1a097aea423d16b22422fd8f3e676c966c39b387bc5f4ee49ea8ccf72195
-
Filesize
553KB
MD5d066c48d1c13f7d59719e588e000c2bc
SHA181b44d964c81015a1b573c761dac77cf96eb91d3
SHA2560f6b78271b222f59bc6bfa544554cb84c77bae7dbcd11ea424231ee33146b09e
SHA51297b05dfcc728912c83ca07bbe2492836b231aa1cf71644153e756dbe05e84c5cbaa681bc1c270266c6eb74335f7c0d72603f879b79dca5b54d6ffdf499f010f1
-
Filesize
553KB
MD5d066c48d1c13f7d59719e588e000c2bc
SHA181b44d964c81015a1b573c761dac77cf96eb91d3
SHA2560f6b78271b222f59bc6bfa544554cb84c77bae7dbcd11ea424231ee33146b09e
SHA51297b05dfcc728912c83ca07bbe2492836b231aa1cf71644153e756dbe05e84c5cbaa681bc1c270266c6eb74335f7c0d72603f879b79dca5b54d6ffdf499f010f1
-
Filesize
308KB
MD5c071447e7ae643e423af101186ad48d0
SHA102f8b7ef7f3516d55008a48d836223b8a5fc9616
SHA2566558cc02b3d41081faea657a5f2765565572dbe1b4a1f184290c97a08e3f1285
SHA512c0521c648be56536426c034a70e00b857cf67fb2486d417709eb76a03edf0b95004fc2385b3820240d95dacc77d584119e705a670e20a2dc9f502a3289b4ef21
-
Filesize
308KB
MD5c071447e7ae643e423af101186ad48d0
SHA102f8b7ef7f3516d55008a48d836223b8a5fc9616
SHA2566558cc02b3d41081faea657a5f2765565572dbe1b4a1f184290c97a08e3f1285
SHA512c0521c648be56536426c034a70e00b857cf67fb2486d417709eb76a03edf0b95004fc2385b3820240d95dacc77d584119e705a670e20a2dc9f502a3289b4ef21
-
Filesize
366KB
MD53cbd0dc98c2302c0382b536c9028aded
SHA106f9e897112d8bb24faf87ffd18aa5a03af95def
SHA2567c7531bac21d0d529102907f24af48132c80a49f78931987dc1a6c9420344e5b
SHA512e35d8dd5234a38937a74c5b0af5adc0ae0dbe614098b46ef43d1dc413345e640a354c7bcaf258e85a275bc6b36498770b067700f9945f1d803101cbfdab7aa3a
-
Filesize
366KB
MD53cbd0dc98c2302c0382b536c9028aded
SHA106f9e897112d8bb24faf87ffd18aa5a03af95def
SHA2567c7531bac21d0d529102907f24af48132c80a49f78931987dc1a6c9420344e5b
SHA512e35d8dd5234a38937a74c5b0af5adc0ae0dbe614098b46ef43d1dc413345e640a354c7bcaf258e85a275bc6b36498770b067700f9945f1d803101cbfdab7aa3a