Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
55s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe
Resource
win10-20230220-en
General
-
Target
52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe
-
Size
537KB
-
MD5
76e1cca7e9eabbdd918eb6cb3c28f8fe
-
SHA1
4d2cb82298403016d15a729f69fe694445c260f6
-
SHA256
52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c
-
SHA512
67218bfafaef44f527b141ef439644c705867e5cc9012df768f8ac4028a60df84395a84b6ef82a6479cf04d0e58fecd4babdacb41e228216846611939eb7644b
-
SSDEEP
12288:PMr2y90fVz/WdjW6FX7xy44vGVUvVH0wDckNcShNT:Zy5ZW6Z7bYGVcUw4kaShh
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr378382.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr378382.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr378382.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr378382.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr378382.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/60-140-0x00000000023C0000-0x0000000002406000-memory.dmp family_redline behavioral1/memory/60-142-0x0000000002690000-0x00000000026D4000-memory.dmp family_redline behavioral1/memory/60-143-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-144-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-146-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-148-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-150-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-157-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-155-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-159-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-161-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-163-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-165-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-167-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-169-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-171-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-173-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-175-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-177-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-179-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-181-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-183-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-185-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-187-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-189-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-193-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-191-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-195-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-197-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-199-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-201-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-203-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-205-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-207-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-209-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/60-1061-0x0000000004EC0000-0x0000000004ED0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2588 zitr6516.exe 4648 jr378382.exe 60 ku251778.exe 4696 lr270454.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr378382.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zitr6516.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zitr6516.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4648 jr378382.exe 4648 jr378382.exe 60 ku251778.exe 60 ku251778.exe 4696 lr270454.exe 4696 lr270454.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4648 jr378382.exe Token: SeDebugPrivilege 60 ku251778.exe Token: SeDebugPrivilege 4696 lr270454.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4080 wrote to memory of 2588 4080 52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe 66 PID 4080 wrote to memory of 2588 4080 52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe 66 PID 4080 wrote to memory of 2588 4080 52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe 66 PID 2588 wrote to memory of 4648 2588 zitr6516.exe 67 PID 2588 wrote to memory of 4648 2588 zitr6516.exe 67 PID 2588 wrote to memory of 60 2588 zitr6516.exe 68 PID 2588 wrote to memory of 60 2588 zitr6516.exe 68 PID 2588 wrote to memory of 60 2588 zitr6516.exe 68 PID 4080 wrote to memory of 4696 4080 52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe 70 PID 4080 wrote to memory of 4696 4080 52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe 70 PID 4080 wrote to memory of 4696 4080 52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe"C:\Users\Admin\AppData\Local\Temp\52dcdc9b8e4e8090e8ad9a23b7936964da71efff1e3a5fa591298e15d047c35c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitr6516.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitr6516.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378382.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378382.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251778.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251778.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:60
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr270454.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr270454.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5b32fe3a83193acd2ef57cd6395b38482
SHA170773bd523572e939c1c4ad034a716030513aa95
SHA2565d6bee7d8fda77287c594efdfe728d7d0cdfa0d8cb71bb5c262604dc1e4ea68b
SHA51227ff5c42c6e625532674020f7e5df6e0b3ac9cea94d5e387ca221b072458e5da67bc8360e608458e05eb5e8ead42341217cce29050c2db64c1a9a18df8542410
-
Filesize
176KB
MD5b32fe3a83193acd2ef57cd6395b38482
SHA170773bd523572e939c1c4ad034a716030513aa95
SHA2565d6bee7d8fda77287c594efdfe728d7d0cdfa0d8cb71bb5c262604dc1e4ea68b
SHA51227ff5c42c6e625532674020f7e5df6e0b3ac9cea94d5e387ca221b072458e5da67bc8360e608458e05eb5e8ead42341217cce29050c2db64c1a9a18df8542410
-
Filesize
395KB
MD52ed2879b402a2dc92c43e65aac13f29e
SHA1cff90284638889dc683ad255b08dc25d3ffcd8b0
SHA256c950d5e8e296e77b5952c5dbd8576324446e59cb5bd3b11e94b8036c09b94a2c
SHA512bd8dfe516811fad30f979e2926616dd7f1c0081d4a90bc68b23b927876af28e3cf0b7b7e3802b4737c1f97fb56c03b909e30cd7f06838facc99d43898f06ed74
-
Filesize
395KB
MD52ed2879b402a2dc92c43e65aac13f29e
SHA1cff90284638889dc683ad255b08dc25d3ffcd8b0
SHA256c950d5e8e296e77b5952c5dbd8576324446e59cb5bd3b11e94b8036c09b94a2c
SHA512bd8dfe516811fad30f979e2926616dd7f1c0081d4a90bc68b23b927876af28e3cf0b7b7e3802b4737c1f97fb56c03b909e30cd7f06838facc99d43898f06ed74
-
Filesize
13KB
MD5432a706186e8c46642b5198b9512f2b8
SHA14c2084166c6592bc494d0f971d75ebe0740d72f6
SHA25604d391158a5e3c7e6310617271af2203b39a8780e838fda6b6555108ff43f713
SHA512b3d843722be6262ccb63f37aabfc1281a84b5732ef28bd4747563150021949bd23c67d14dd0ee893beb682506132d128872cb84e7d5e1393a0ad87b6c1821f69
-
Filesize
13KB
MD5432a706186e8c46642b5198b9512f2b8
SHA14c2084166c6592bc494d0f971d75ebe0740d72f6
SHA25604d391158a5e3c7e6310617271af2203b39a8780e838fda6b6555108ff43f713
SHA512b3d843722be6262ccb63f37aabfc1281a84b5732ef28bd4747563150021949bd23c67d14dd0ee893beb682506132d128872cb84e7d5e1393a0ad87b6c1821f69
-
Filesize
352KB
MD524a37ace9ef9e987499bf145321ce2c6
SHA1027c1d2645fe470215bbe4a514337b7d727149dc
SHA2564ebf2fb539fd207be48127c60b3bd00e21c23aee8237b815e6962b7bf65f7572
SHA512eddda41f24f3e7663636f50d70b514d2731dae0e61c418c8ad9843bb6a1226bc027ecba693932d11484f3af97e8dc173984b210bcdb8fee62d6b1ca5cd63c07c
-
Filesize
352KB
MD524a37ace9ef9e987499bf145321ce2c6
SHA1027c1d2645fe470215bbe4a514337b7d727149dc
SHA2564ebf2fb539fd207be48127c60b3bd00e21c23aee8237b815e6962b7bf65f7572
SHA512eddda41f24f3e7663636f50d70b514d2731dae0e61c418c8ad9843bb6a1226bc027ecba693932d11484f3af97e8dc173984b210bcdb8fee62d6b1ca5cd63c07c