Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/04/2023, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe
Resource
win10-20230220-en
General
-
Target
0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe
-
Size
530KB
-
MD5
f3650ff883fb71e9f8941f7d938691b9
-
SHA1
f67dcfa8a53e57cec16acb1675bd45637503dfbe
-
SHA256
0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119
-
SHA512
a248c1b3cfc4ea31da1baa3ff62ddff91e0ddd10f72ec20debbc76af9dac7e8881843cf3f20068e033dcb33600619113940e0b5d2c465c6352391077b07757e5
-
SSDEEP
12288:kMrcy90ncyT9jNgFadvAUJUXwZE8excy12OA3luSd8Cz:Ayfy9pgIxnJUXwZE80Hi8oN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr388446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr388446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr388446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr388446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr388446.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/5036-141-0x0000000004A80000-0x0000000004AC6000-memory.dmp family_redline behavioral1/memory/5036-143-0x0000000007660000-0x00000000076A4000-memory.dmp family_redline behavioral1/memory/5036-144-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-145-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-147-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-149-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-153-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-155-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-157-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-159-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-161-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-163-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-165-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-167-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-169-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-171-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-175-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-173-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-177-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-181-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-185-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-183-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-179-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-187-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-191-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-189-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-193-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-195-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-199-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-201-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-207-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-205-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-203-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/5036-197-0x0000000007660000-0x000000000769F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 3584 ziLh3923.exe 4136 jr388446.exe 5036 ku447253.exe 2768 lr562481.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr388446.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziLh3923.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLh3923.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4136 jr388446.exe 4136 jr388446.exe 5036 ku447253.exe 5036 ku447253.exe 2768 lr562481.exe 2768 lr562481.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4136 jr388446.exe Token: SeDebugPrivilege 5036 ku447253.exe Token: SeDebugPrivilege 2768 lr562481.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3192 wrote to memory of 3584 3192 0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe 66 PID 3192 wrote to memory of 3584 3192 0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe 66 PID 3192 wrote to memory of 3584 3192 0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe 66 PID 3584 wrote to memory of 4136 3584 ziLh3923.exe 67 PID 3584 wrote to memory of 4136 3584 ziLh3923.exe 67 PID 3584 wrote to memory of 5036 3584 ziLh3923.exe 68 PID 3584 wrote to memory of 5036 3584 ziLh3923.exe 68 PID 3584 wrote to memory of 5036 3584 ziLh3923.exe 68 PID 3192 wrote to memory of 2768 3192 0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe 70 PID 3192 wrote to memory of 2768 3192 0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe 70 PID 3192 wrote to memory of 2768 3192 0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe"C:\Users\Admin\AppData\Local\Temp\0fa5c5e82e4555d9aa8b497b1798ddd504f877afceaaed6fad0236d0c266c119.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLh3923.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLh3923.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr388446.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr388446.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku447253.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku447253.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr562481.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr562481.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD514b2b8adbc052eb564208aab5cb245be
SHA1af57047c8a190c6464945d68ee8316ecf778e258
SHA25602cda8a7fd6a92b0414e99b58ca4e57fc3ff7ba690a8fc057d6bc08e1d8a0e12
SHA51286aa07db1e7453a5b29fc66350ab3b212d2b46283380a59ae80cb732ebdd64e9d7c9854cd3ad99cb4a95ce8944ba6533bf66096547f445fe67f043b83a1545bb
-
Filesize
175KB
MD514b2b8adbc052eb564208aab5cb245be
SHA1af57047c8a190c6464945d68ee8316ecf778e258
SHA25602cda8a7fd6a92b0414e99b58ca4e57fc3ff7ba690a8fc057d6bc08e1d8a0e12
SHA51286aa07db1e7453a5b29fc66350ab3b212d2b46283380a59ae80cb732ebdd64e9d7c9854cd3ad99cb4a95ce8944ba6533bf66096547f445fe67f043b83a1545bb
-
Filesize
388KB
MD5d185f1417ebb45d990d66546439031e5
SHA16078ff9188d8203bafff5ff4a6ac4a909871e0b8
SHA25696c9004adc7a1f7c45d5ac7327578c22ccb6a7825b5b002d0bc37b4d4f534d20
SHA51236d7b8e686cbbe5cb8a4ef27ce556d174f862e5e8f1c3fd7748bcc69e81572ea49419c2d7a2dd1d71605ee60eb7fa7d51bc8b82fe2477e2d7fe2ff8581149f69
-
Filesize
388KB
MD5d185f1417ebb45d990d66546439031e5
SHA16078ff9188d8203bafff5ff4a6ac4a909871e0b8
SHA25696c9004adc7a1f7c45d5ac7327578c22ccb6a7825b5b002d0bc37b4d4f534d20
SHA51236d7b8e686cbbe5cb8a4ef27ce556d174f862e5e8f1c3fd7748bcc69e81572ea49419c2d7a2dd1d71605ee60eb7fa7d51bc8b82fe2477e2d7fe2ff8581149f69
-
Filesize
11KB
MD5b01c973d25fb6f06a62fbe4989e2dfe9
SHA1eb73051d6a04748343539bd3811315df479e834e
SHA256bbe6cc4d34e1d829f1858ed8f247b915c979b51adf891b306c7530d752898e6b
SHA5124060be8dc1e9e890fcf7fa99a4a2a3aeee76b65e06acd29313dfb5e3659dd3ae05dd685403d333ba196b12379b8618f5cd5f57b3d4e73edaa54baa6a297f22cb
-
Filesize
11KB
MD5b01c973d25fb6f06a62fbe4989e2dfe9
SHA1eb73051d6a04748343539bd3811315df479e834e
SHA256bbe6cc4d34e1d829f1858ed8f247b915c979b51adf891b306c7530d752898e6b
SHA5124060be8dc1e9e890fcf7fa99a4a2a3aeee76b65e06acd29313dfb5e3659dd3ae05dd685403d333ba196b12379b8618f5cd5f57b3d4e73edaa54baa6a297f22cb
-
Filesize
354KB
MD540426c5223f772ce366283e5910ad243
SHA19b22b2dd973254e0ac69e91b30cf7707f0f129d3
SHA2561c0a4c682a22ea875213b9484e1b0f0b65a54557b7db07f017b925d2320d2618
SHA51271642bda15691dba72f733e3b794fda7084972b091c847c8f686371233aca3dd430f00539808debf8f00b08cd0e8d6d889266886ea120708c7f46fcb6e75abab
-
Filesize
354KB
MD540426c5223f772ce366283e5910ad243
SHA19b22b2dd973254e0ac69e91b30cf7707f0f129d3
SHA2561c0a4c682a22ea875213b9484e1b0f0b65a54557b7db07f017b925d2320d2618
SHA51271642bda15691dba72f733e3b794fda7084972b091c847c8f686371233aca3dd430f00539808debf8f00b08cd0e8d6d889266886ea120708c7f46fcb6e75abab