Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
58s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe
Resource
win10-20230220-en
General
-
Target
81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe
-
Size
530KB
-
MD5
b21ee12bb2800285eb44f06de826b189
-
SHA1
b986029c9d0e36e618db5098f18a53e777d21cd0
-
SHA256
81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e
-
SHA512
5fc0c96af432d4a0be2b8a1bb3221412a510afbb897add8f0467df19ebe78f11e93ce2e6a3ff62565176e6c7b60c50702d44983233b21b7668aa949c1df08439
-
SSDEEP
12288:5MrEy90ywZPaex1wuWsP53nEf5KXa/iYXq+cFSjMt8:lyYf3hOAd85QHt8
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr915467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr915467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr915467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr915467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr915467.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1756-137-0x0000000002210000-0x0000000002256000-memory.dmp family_redline behavioral1/memory/1756-139-0x0000000002610000-0x0000000002654000-memory.dmp family_redline behavioral1/memory/1756-140-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-141-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-143-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-145-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-147-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-149-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-151-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-154-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-157-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-160-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-162-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-164-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-166-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-168-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-170-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-172-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-174-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-176-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-178-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-180-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-182-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-184-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-186-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-188-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-190-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-192-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-194-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-196-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-198-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-200-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-202-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-204-0x0000000002610000-0x000000000264F000-memory.dmp family_redline behavioral1/memory/1756-206-0x0000000002610000-0x000000000264F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4968 zicc9228.exe 2068 jr915467.exe 1756 ku666966.exe 4592 lr104218.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr915467.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zicc9228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zicc9228.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2068 jr915467.exe 2068 jr915467.exe 1756 ku666966.exe 1756 ku666966.exe 4592 lr104218.exe 4592 lr104218.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2068 jr915467.exe Token: SeDebugPrivilege 1756 ku666966.exe Token: SeDebugPrivilege 4592 lr104218.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4968 4668 81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe 66 PID 4668 wrote to memory of 4968 4668 81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe 66 PID 4668 wrote to memory of 4968 4668 81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe 66 PID 4968 wrote to memory of 2068 4968 zicc9228.exe 67 PID 4968 wrote to memory of 2068 4968 zicc9228.exe 67 PID 4968 wrote to memory of 1756 4968 zicc9228.exe 68 PID 4968 wrote to memory of 1756 4968 zicc9228.exe 68 PID 4968 wrote to memory of 1756 4968 zicc9228.exe 68 PID 4668 wrote to memory of 4592 4668 81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe 70 PID 4668 wrote to memory of 4592 4668 81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe 70 PID 4668 wrote to memory of 4592 4668 81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe"C:\Users\Admin\AppData\Local\Temp\81281d6d84d74bcac90d2f27b89b93cbff88691dfe50520df493178717fcea6e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicc9228.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicc9228.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr915467.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr915467.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku666966.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku666966.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr104218.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr104218.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5c05ba058461365ff3fe08c71cf63a7f5
SHA1841d0904018084348293106d1ef6f3759ee86801
SHA256fc9a8a9e1910de71f7d2dcbef389c2de03ccf17d089c3112ca650ad9483ba6ae
SHA5128293b1e191b70689083b80eaec8127c3d303e80d17c497e8a7f71ef9eb1efddbf5317d8dc91514b74c41b2136722aaf1bae20ea7cd99f9f51c136888000e6d9d
-
Filesize
176KB
MD5c05ba058461365ff3fe08c71cf63a7f5
SHA1841d0904018084348293106d1ef6f3759ee86801
SHA256fc9a8a9e1910de71f7d2dcbef389c2de03ccf17d089c3112ca650ad9483ba6ae
SHA5128293b1e191b70689083b80eaec8127c3d303e80d17c497e8a7f71ef9eb1efddbf5317d8dc91514b74c41b2136722aaf1bae20ea7cd99f9f51c136888000e6d9d
-
Filesize
388KB
MD56ec9fd523ce8ec798bd44c8f36876d8b
SHA155340ff4763983ee68a654e4135568bedfe9d43b
SHA2564b8669a4209a7209a00d0e12592e156c464e7b3500b4bd5227a8b1ea4fc492a0
SHA5121200df49e8591e3bcdad9f953ce018eb06ab7f51253d5c21e135b1c5e4778f22149bf08b13addeb4bdb75d2cc15ab2e9fc8551e165cae1f73bff7617e40a25c4
-
Filesize
388KB
MD56ec9fd523ce8ec798bd44c8f36876d8b
SHA155340ff4763983ee68a654e4135568bedfe9d43b
SHA2564b8669a4209a7209a00d0e12592e156c464e7b3500b4bd5227a8b1ea4fc492a0
SHA5121200df49e8591e3bcdad9f953ce018eb06ab7f51253d5c21e135b1c5e4778f22149bf08b13addeb4bdb75d2cc15ab2e9fc8551e165cae1f73bff7617e40a25c4
-
Filesize
11KB
MD598d9c461a70cb5acc16ae75961d0772b
SHA1f394f68605824023ad32202edbc52f48d53722b3
SHA2565648925fdaf06007f0bb809d4f1d75156f13931af1ec48f5bf7b61b3b39b1a22
SHA5120536e0526ead22e4165bc93efaecc714652fca896daf418df644b1dc242cf4e71122193c4ee3ac1860982dc841808c2a81fc948db29b8369761e9c4544e94be9
-
Filesize
11KB
MD598d9c461a70cb5acc16ae75961d0772b
SHA1f394f68605824023ad32202edbc52f48d53722b3
SHA2565648925fdaf06007f0bb809d4f1d75156f13931af1ec48f5bf7b61b3b39b1a22
SHA5120536e0526ead22e4165bc93efaecc714652fca896daf418df644b1dc242cf4e71122193c4ee3ac1860982dc841808c2a81fc948db29b8369761e9c4544e94be9
-
Filesize
434KB
MD5d560497acc42373f4a55afe7f0b41592
SHA1d958cd411e998d3b5a70fa1f569fdd20eb889ce9
SHA256d65468b8814511dfbb744bf2fd0333eff811c5b03ecb0d60701a81691b95401a
SHA51207667961c31b0cd9f4f1b6634752b14d1ac6a5e27c7cc49434fbebf6c8f6bfc04fe82df8a6fa84138b13514a107d015dba324137a6ef57bcd5b4d3051f19e072
-
Filesize
434KB
MD5d560497acc42373f4a55afe7f0b41592
SHA1d958cd411e998d3b5a70fa1f569fdd20eb889ce9
SHA256d65468b8814511dfbb744bf2fd0333eff811c5b03ecb0d60701a81691b95401a
SHA51207667961c31b0cd9f4f1b6634752b14d1ac6a5e27c7cc49434fbebf6c8f6bfc04fe82df8a6fa84138b13514a107d015dba324137a6ef57bcd5b4d3051f19e072