Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/04/2023, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe
Resource
win10-20230220-en
General
-
Target
ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe
-
Size
658KB
-
MD5
483bb6e412a1a6bd1ba41f527edfc2aa
-
SHA1
fed429fb658ded6c011e90589a6794029c517141
-
SHA256
ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8
-
SHA512
f767ef8a32d97010c6720a5f65d661ada72be6af0169f64f2b49892ac460545ad1d4ba2a1746cbfdfb8c541fa37f9bafaf2b064271b8f1bd067aae5deeb71f45
-
SSDEEP
12288:8Mrwy90mK2lbGpI06XEz/KgqvjBWP2rgF8cki+EvZx9vrdjbkH230:8yn3lbG78ZRZi+Evz9vrVGS0
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9723.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/3736-180-0x00000000047F0000-0x0000000004836000-memory.dmp family_redline behavioral1/memory/3736-181-0x0000000007010000-0x0000000007054000-memory.dmp family_redline behavioral1/memory/3736-182-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-183-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-185-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-187-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-191-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-189-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-193-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-195-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-197-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-199-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-201-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-203-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-205-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-207-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-209-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-211-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-213-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-215-0x0000000007010000-0x000000000704F000-memory.dmp family_redline behavioral1/memory/3736-1103-0x0000000007070000-0x0000000007080000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1684 un285558.exe 4256 pro9723.exe 3736 qu1471.exe 5072 si235985.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9723.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9723.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un285558.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un285558.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4256 pro9723.exe 4256 pro9723.exe 3736 qu1471.exe 3736 qu1471.exe 5072 si235985.exe 5072 si235985.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4256 pro9723.exe Token: SeDebugPrivilege 3736 qu1471.exe Token: SeDebugPrivilege 5072 si235985.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1684 1480 ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe 66 PID 1480 wrote to memory of 1684 1480 ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe 66 PID 1480 wrote to memory of 1684 1480 ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe 66 PID 1684 wrote to memory of 4256 1684 un285558.exe 67 PID 1684 wrote to memory of 4256 1684 un285558.exe 67 PID 1684 wrote to memory of 4256 1684 un285558.exe 67 PID 1684 wrote to memory of 3736 1684 un285558.exe 68 PID 1684 wrote to memory of 3736 1684 un285558.exe 68 PID 1684 wrote to memory of 3736 1684 un285558.exe 68 PID 1480 wrote to memory of 5072 1480 ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe 70 PID 1480 wrote to memory of 5072 1480 ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe 70 PID 1480 wrote to memory of 5072 1480 ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe"C:\Users\Admin\AppData\Local\Temp\ab9c07d8ed2775cb26f7eeb7a5d337d489cdb4d462baefdd9bee58c6f95a27b8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285558.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285558.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9723.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9723.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1471.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1471.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si235985.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si235985.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD58ef4c666bfd761a945adf2d673543588
SHA1182976a90feeeb42a2855df1eae7724d8c64c498
SHA25639d9a6f1dea3a3b41b5c7db47851110ba9bd64332d477f1e3380eb64910b5cb7
SHA512a30a82ba892f431a1bbeda7d6607cbe13c35763c8174fc78c2a8b0a006452d7c85471c5fc44c7440dd4e641f1709d8bbb102c00936a8d0e89cb8a402fe2e03b3
-
Filesize
175KB
MD58ef4c666bfd761a945adf2d673543588
SHA1182976a90feeeb42a2855df1eae7724d8c64c498
SHA25639d9a6f1dea3a3b41b5c7db47851110ba9bd64332d477f1e3380eb64910b5cb7
SHA512a30a82ba892f431a1bbeda7d6607cbe13c35763c8174fc78c2a8b0a006452d7c85471c5fc44c7440dd4e641f1709d8bbb102c00936a8d0e89cb8a402fe2e03b3
-
Filesize
516KB
MD5c0c3620611ce52aea3588ac716e94650
SHA172ba8f5ba4f891015e942714d99ea3007fdc290f
SHA2565da0254ab9f656049ef55940bf4ab5b934c77ad12e4953efb7c5430e457a09d6
SHA512ad8aadfe3d020a9896b53f1bcfe87cbdde004f04d336de32d8c61fdec23fb535c7c1d938c196235cfb7bb0b379a4655143acb7e30362b30c864e699194b9b35b
-
Filesize
516KB
MD5c0c3620611ce52aea3588ac716e94650
SHA172ba8f5ba4f891015e942714d99ea3007fdc290f
SHA2565da0254ab9f656049ef55940bf4ab5b934c77ad12e4953efb7c5430e457a09d6
SHA512ad8aadfe3d020a9896b53f1bcfe87cbdde004f04d336de32d8c61fdec23fb535c7c1d938c196235cfb7bb0b379a4655143acb7e30362b30c864e699194b9b35b
-
Filesize
295KB
MD564259891ec4b65da75367a987ca963ce
SHA1bb4f84e2c295c9004f269b0f29f9035573d4b926
SHA256a2d84ec1b045eac77066313792bb26a70067a03a69b1954d70494e67c38c4604
SHA5122d609fbe073771130b236cfa8f4192ebf7a1066422898f7bf547eb6cf5213f7a44cc3409de20ac90aad672e12f748298f60347c913ae5ec61cc975d8c1d63fa7
-
Filesize
295KB
MD564259891ec4b65da75367a987ca963ce
SHA1bb4f84e2c295c9004f269b0f29f9035573d4b926
SHA256a2d84ec1b045eac77066313792bb26a70067a03a69b1954d70494e67c38c4604
SHA5122d609fbe073771130b236cfa8f4192ebf7a1066422898f7bf547eb6cf5213f7a44cc3409de20ac90aad672e12f748298f60347c913ae5ec61cc975d8c1d63fa7
-
Filesize
354KB
MD5486ac47f1fc876fed537d896b0d9d48d
SHA11302c37fff24a0f5c4c84d7ae562c534a0dfbd37
SHA2560a2fc121de460c7119c6989eecaba1d9ded5a31a023e59f5799e8a866584f6a9
SHA512124c7dc8f6066772e3e4849ec344585ef986284e306324b8aa51c415d4a5191f764066c80544a6824becf83ac50f03b346e40edcf1e01174a7ae81e3159a98b2
-
Filesize
354KB
MD5486ac47f1fc876fed537d896b0d9d48d
SHA11302c37fff24a0f5c4c84d7ae562c534a0dfbd37
SHA2560a2fc121de460c7119c6989eecaba1d9ded5a31a023e59f5799e8a866584f6a9
SHA512124c7dc8f6066772e3e4849ec344585ef986284e306324b8aa51c415d4a5191f764066c80544a6824becf83ac50f03b346e40edcf1e01174a7ae81e3159a98b2