Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/04/2023, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe
Resource
win10-20230220-en
General
-
Target
f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe
-
Size
658KB
-
MD5
fb2b21384faf7980a9e565cd7d025ef4
-
SHA1
406ebac6eb5fa1b90e9a44806b8288793a7d043b
-
SHA256
f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb
-
SHA512
d09901a59c7d02033431f81e139beab90b03b9fedd4eeb9f5817c1a5c27377692c0b5b65e0f92ca1f8be170292b4302a2d7a21bfa74dc95736a3477865c2fd34
-
SSDEEP
12288:BMrKy90sicL5IWNqNF/+9MwBdDrUCWnR4IcuJ4MLZqueW:nyKjWNqb+9TDrUCWnyNumy
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2054.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3916-178-0x0000000004C70000-0x0000000004CB6000-memory.dmp family_redline behavioral1/memory/3916-179-0x0000000007140000-0x0000000007184000-memory.dmp family_redline behavioral1/memory/3916-181-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-180-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-189-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-187-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-199-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-197-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-201-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-195-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-193-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-210-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-217-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-215-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-213-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-207-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-203-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-191-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-185-0x0000000007140000-0x000000000717F000-memory.dmp family_redline behavioral1/memory/3916-183-0x0000000007140000-0x000000000717F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2252 un852806.exe 2516 pro2054.exe 3916 qu2886.exe 3912 si505249.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2054.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un852806.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un852806.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2516 pro2054.exe 2516 pro2054.exe 3916 qu2886.exe 3916 qu2886.exe 3912 si505249.exe 3912 si505249.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2516 pro2054.exe Token: SeDebugPrivilege 3916 qu2886.exe Token: SeDebugPrivilege 3912 si505249.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2252 1688 f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe 66 PID 1688 wrote to memory of 2252 1688 f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe 66 PID 1688 wrote to memory of 2252 1688 f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe 66 PID 2252 wrote to memory of 2516 2252 un852806.exe 67 PID 2252 wrote to memory of 2516 2252 un852806.exe 67 PID 2252 wrote to memory of 2516 2252 un852806.exe 67 PID 2252 wrote to memory of 3916 2252 un852806.exe 68 PID 2252 wrote to memory of 3916 2252 un852806.exe 68 PID 2252 wrote to memory of 3916 2252 un852806.exe 68 PID 1688 wrote to memory of 3912 1688 f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe 70 PID 1688 wrote to memory of 3912 1688 f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe 70 PID 1688 wrote to memory of 3912 1688 f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe"C:\Users\Admin\AppData\Local\Temp\f8bd7747c3668750ccaaa0a98766df8b094f3d07c9b1e9c3a30eace58fa4ebcb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un852806.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un852806.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2054.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si505249.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si505249.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD519875be0dffb21ccb2555ebe154640a6
SHA181b01ffc072f24a57aa4839e81e2860b968d4d31
SHA2566fc8bbbbfb4ffea103a8c41c7f6eaff73dbe626c2945df13206cbe6f55422b2b
SHA51262797bfc7580d66ff34789c4023eb980841c52e7192b0e2e1197a4baa9c861ab829009dd0cb371ca94d0cb0f3ee584312dc11b553b5ae2b6cf25e9d38f8b0fcc
-
Filesize
176KB
MD519875be0dffb21ccb2555ebe154640a6
SHA181b01ffc072f24a57aa4839e81e2860b968d4d31
SHA2566fc8bbbbfb4ffea103a8c41c7f6eaff73dbe626c2945df13206cbe6f55422b2b
SHA51262797bfc7580d66ff34789c4023eb980841c52e7192b0e2e1197a4baa9c861ab829009dd0cb371ca94d0cb0f3ee584312dc11b553b5ae2b6cf25e9d38f8b0fcc
-
Filesize
516KB
MD56493c72af47fb56034c5062b675888af
SHA141819556c413be3125e95b4c934f4b034668914f
SHA2564f6bbf69e294098c095a82b70e4baf76026589d8d30fbcd2b18803fb2f99ab98
SHA512762c61d6e7f8b0830974124d14258b308e499f37fa0cbf456ac9435b912b729434639cc90fdade8e0507138daed3ec9c2e1aa5814d4b3748920db9fc13b48fc0
-
Filesize
516KB
MD56493c72af47fb56034c5062b675888af
SHA141819556c413be3125e95b4c934f4b034668914f
SHA2564f6bbf69e294098c095a82b70e4baf76026589d8d30fbcd2b18803fb2f99ab98
SHA512762c61d6e7f8b0830974124d14258b308e499f37fa0cbf456ac9435b912b729434639cc90fdade8e0507138daed3ec9c2e1aa5814d4b3748920db9fc13b48fc0
-
Filesize
284KB
MD5a6701553ed9ab22b7259dccdeeaa9255
SHA17c8320190f4b1e181ac3f4f46fe1460e224b176d
SHA256f1dbb178517653cdcb19dfbba63628bb99d7130d20f840708eac4a849206b7f3
SHA512d8b9e9801e47e9e0cbf31b91973a434e54881527f593108370ae2b0c138a701073bb06085154a8820fb822c3deacbe03e86398e047cdf4aaafcbb51aa9030646
-
Filesize
284KB
MD5a6701553ed9ab22b7259dccdeeaa9255
SHA17c8320190f4b1e181ac3f4f46fe1460e224b176d
SHA256f1dbb178517653cdcb19dfbba63628bb99d7130d20f840708eac4a849206b7f3
SHA512d8b9e9801e47e9e0cbf31b91973a434e54881527f593108370ae2b0c138a701073bb06085154a8820fb822c3deacbe03e86398e047cdf4aaafcbb51aa9030646
-
Filesize
342KB
MD554e8ebab38449b304323bb4adb1e9d66
SHA1ea341980b2a1205b94162d52d36bc19b2e97b36a
SHA256b8812553faa6e18d0f00b4b8a826d3be2484dcda90da46c4bbf090931137948d
SHA512f350b74b68c4551c99accf215d232096addc8ba2c168e75b6e233efd83a35cd7032fc55e11402f4f097557444dc344d486b62bc374446e057db0b1c4ab1e8d03
-
Filesize
342KB
MD554e8ebab38449b304323bb4adb1e9d66
SHA1ea341980b2a1205b94162d52d36bc19b2e97b36a
SHA256b8812553faa6e18d0f00b4b8a826d3be2484dcda90da46c4bbf090931137948d
SHA512f350b74b68c4551c99accf215d232096addc8ba2c168e75b6e233efd83a35cd7032fc55e11402f4f097557444dc344d486b62bc374446e057db0b1c4ab1e8d03