Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
52s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe
Resource
win10-20230220-en
General
-
Target
20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe
-
Size
537KB
-
MD5
f33ab5631c92a2074f1e1717f4a6cac1
-
SHA1
5803472698b721660bdbf45a84fb752bef3e5a33
-
SHA256
20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65
-
SHA512
f8e3fc7cec7c4531540514ccdb8bc1ac1136f342d5b8f8bee9ffb5e995a341cc78bf7f1a730c27b0de6d100a8d7015340c43a163af06bde768caa46f006673b3
-
SSDEEP
12288:bMrIy90qRlgyhIs0fygnVszSy8GUN65HLwxsbArI5hJoU:7ynZ9gK2y8G1rw3kL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr192249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr192249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr192249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr192249.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr192249.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/5100-143-0x0000000004D00000-0x0000000004D46000-memory.dmp family_redline behavioral1/memory/5100-145-0x0000000004D80000-0x0000000004DC4000-memory.dmp family_redline behavioral1/memory/5100-148-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-149-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-151-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-153-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-155-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-157-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-159-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-161-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-163-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-165-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-167-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-169-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-171-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-173-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-175-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-177-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-179-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-181-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-183-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-185-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-187-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-189-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-191-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-193-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-195-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-197-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-199-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-201-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-203-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-205-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-207-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-209-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline behavioral1/memory/5100-211-0x0000000004D80000-0x0000000004DBF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 5084 zimJ7207.exe 3840 jr192249.exe 5100 ku918631.exe 3444 lr912131.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr192249.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zimJ7207.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zimJ7207.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3840 jr192249.exe 3840 jr192249.exe 5100 ku918631.exe 5100 ku918631.exe 3444 lr912131.exe 3444 lr912131.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3840 jr192249.exe Token: SeDebugPrivilege 5100 ku918631.exe Token: SeDebugPrivilege 3444 lr912131.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4128 wrote to memory of 5084 4128 20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe 66 PID 4128 wrote to memory of 5084 4128 20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe 66 PID 4128 wrote to memory of 5084 4128 20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe 66 PID 5084 wrote to memory of 3840 5084 zimJ7207.exe 67 PID 5084 wrote to memory of 3840 5084 zimJ7207.exe 67 PID 5084 wrote to memory of 5100 5084 zimJ7207.exe 68 PID 5084 wrote to memory of 5100 5084 zimJ7207.exe 68 PID 5084 wrote to memory of 5100 5084 zimJ7207.exe 68 PID 4128 wrote to memory of 3444 4128 20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe 70 PID 4128 wrote to memory of 3444 4128 20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe 70 PID 4128 wrote to memory of 3444 4128 20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe"C:\Users\Admin\AppData\Local\Temp\20c46efa630e2457a05c13a66de27730b27dfb2811375116791cdc679fc86a65.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimJ7207.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimJ7207.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr192249.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr192249.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918631.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918631.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr912131.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr912131.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD57dea0a7e19c8a2bfae59653e87b3bef4
SHA15986d669f33997e360a85694c68ad0df0f4f0a08
SHA25693fd214bad0d6c2955d050d94bcca02c225941fb2a41790a477d50fc87c1ccde
SHA512e63543796cbc635174f9a9d26139f5c2dfaf9378c60d41edd22503dedab34243be5cf3bfb910595fb1e1fb93b55c411f5389826aced666fa8f49251ffaa8a39e
-
Filesize
176KB
MD57dea0a7e19c8a2bfae59653e87b3bef4
SHA15986d669f33997e360a85694c68ad0df0f4f0a08
SHA25693fd214bad0d6c2955d050d94bcca02c225941fb2a41790a477d50fc87c1ccde
SHA512e63543796cbc635174f9a9d26139f5c2dfaf9378c60d41edd22503dedab34243be5cf3bfb910595fb1e1fb93b55c411f5389826aced666fa8f49251ffaa8a39e
-
Filesize
395KB
MD5c018c86a498f30c34eeea6ab8c979dd1
SHA1f80ccba8b0126fcebf72fec341c83ed1258147e6
SHA256ec369cd5c8825ff93ab4d3457ca182d740d81958f85c75396dd8c7f5092e4183
SHA51223672ff7edf1529e78d970fe30b3f9b82ab0d628f829873ad1306dbf19d74fba4fe0f535fbba39b289e9c33f0c90cb1a2ef99442d3f8e97cf9d57f01af689fc5
-
Filesize
395KB
MD5c018c86a498f30c34eeea6ab8c979dd1
SHA1f80ccba8b0126fcebf72fec341c83ed1258147e6
SHA256ec369cd5c8825ff93ab4d3457ca182d740d81958f85c75396dd8c7f5092e4183
SHA51223672ff7edf1529e78d970fe30b3f9b82ab0d628f829873ad1306dbf19d74fba4fe0f535fbba39b289e9c33f0c90cb1a2ef99442d3f8e97cf9d57f01af689fc5
-
Filesize
13KB
MD5399fd287617926ea11494000d081b5f6
SHA15f5778e65478bdbbaa808dabfd8893521a8bb006
SHA256045e48d5b262b22faf61d6d996ba113f2fe587b2416b91778ce1b36f4f77f505
SHA512ef11967bc741e9e9b614213575a110eb167f8a8834c177f8afb2771a06c3c76014188b7461666b23bea45ea5e2f9ba3e1f5107067460f4c4451bcf1570c404ef
-
Filesize
13KB
MD5399fd287617926ea11494000d081b5f6
SHA15f5778e65478bdbbaa808dabfd8893521a8bb006
SHA256045e48d5b262b22faf61d6d996ba113f2fe587b2416b91778ce1b36f4f77f505
SHA512ef11967bc741e9e9b614213575a110eb167f8a8834c177f8afb2771a06c3c76014188b7461666b23bea45ea5e2f9ba3e1f5107067460f4c4451bcf1570c404ef
-
Filesize
352KB
MD581b591b699fc2742e29809f6c670dd16
SHA13a9cdba3e9e1eab58ee0d75908af9be199d55e24
SHA2569522097f2186946843f42778e7a3c1a5f579baf39855e9907dcc648ac26d5af0
SHA512be4d4f53e82913832a8088178f1d4ce5f642cf88b5ff6fc341a39328bb4d7a3a87991b6045a7d77f057cf2b1936af055fd1b8a7cd8fbf083a0c708130692cd7f
-
Filesize
352KB
MD581b591b699fc2742e29809f6c670dd16
SHA13a9cdba3e9e1eab58ee0d75908af9be199d55e24
SHA2569522097f2186946843f42778e7a3c1a5f579baf39855e9907dcc648ac26d5af0
SHA512be4d4f53e82913832a8088178f1d4ce5f642cf88b5ff6fc341a39328bb4d7a3a87991b6045a7d77f057cf2b1936af055fd1b8a7cd8fbf083a0c708130692cd7f