Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe
Resource
win10-20230220-en
General
-
Target
b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe
-
Size
659KB
-
MD5
ee5037f917d5384c50daa9533cf10116
-
SHA1
3c8c6f8375adb392069c57f682570a86064b548c
-
SHA256
b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab
-
SHA512
5369fd447777be4ce897cc415eb3edb8899d12bb8bab9982aaec7c69c5ac765c90ffa3cc5300eee73e6ffe9d166133c6dd30e2a7152f02b60b6933f54866a5ef
-
SSDEEP
12288:NMrCy902IYepz6wj4KkwyPhUMPVi1Yof5KMa/rem9wzFHhfU:PymdR4hwyVPVi1pAcm9cFHhs
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9817.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4920-181-0x00000000021E0000-0x0000000002226000-memory.dmp family_redline behavioral1/memory/4920-182-0x00000000023B0000-0x00000000023F4000-memory.dmp family_redline behavioral1/memory/4920-183-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-186-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-184-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-188-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-190-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-198-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-200-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-195-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-202-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-204-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-206-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-208-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-210-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-212-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-214-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-216-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-218-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline behavioral1/memory/4920-220-0x00000000023B0000-0x00000000023EF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2444 un963106.exe 2524 pro9817.exe 4920 qu1667.exe 5084 si142651.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9817.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un963106.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un963106.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2524 pro9817.exe 2524 pro9817.exe 4920 qu1667.exe 4920 qu1667.exe 5084 si142651.exe 5084 si142651.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2524 pro9817.exe Token: SeDebugPrivilege 4920 qu1667.exe Token: SeDebugPrivilege 5084 si142651.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2444 2200 b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe 66 PID 2200 wrote to memory of 2444 2200 b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe 66 PID 2200 wrote to memory of 2444 2200 b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe 66 PID 2444 wrote to memory of 2524 2444 un963106.exe 67 PID 2444 wrote to memory of 2524 2444 un963106.exe 67 PID 2444 wrote to memory of 2524 2444 un963106.exe 67 PID 2444 wrote to memory of 4920 2444 un963106.exe 68 PID 2444 wrote to memory of 4920 2444 un963106.exe 68 PID 2444 wrote to memory of 4920 2444 un963106.exe 68 PID 2200 wrote to memory of 5084 2200 b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe 70 PID 2200 wrote to memory of 5084 2200 b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe 70 PID 2200 wrote to memory of 5084 2200 b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe"C:\Users\Admin\AppData\Local\Temp\b8f49b13abaa11917801ab4dd1020192c435beaf15c744a68969eba68e7fc8ab.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963106.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963106.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9817.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9817.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1667.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1667.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si142651.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si142651.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD538f1ded08b30e44c7b17f83fc78b9354
SHA1628f8a4ee7975a685a7b9d6829b253e5c5fa9814
SHA256855972b3935023b595b8f55fd8fee82b83ff72df2b41d2d5b714ec905743e118
SHA512140bcb2150d128742e5d4442d342dde1a8d7be7e2c27350c23214f0c78897997fbb8a69413006867e5db704466b991271174252ff38ced6b43bdfde54d12533d
-
Filesize
176KB
MD538f1ded08b30e44c7b17f83fc78b9354
SHA1628f8a4ee7975a685a7b9d6829b253e5c5fa9814
SHA256855972b3935023b595b8f55fd8fee82b83ff72df2b41d2d5b714ec905743e118
SHA512140bcb2150d128742e5d4442d342dde1a8d7be7e2c27350c23214f0c78897997fbb8a69413006867e5db704466b991271174252ff38ced6b43bdfde54d12533d
-
Filesize
518KB
MD58ffaa2ae0e17e7163c1226df165b5bee
SHA1a0dda4d6fc3abb7917baa7060a15b7b0ea7d281f
SHA25601e9b68adce60c28650bd45c4d452a3671fa1d055da89801034868f61434da3b
SHA512b080a62ff352e407626e4242ff6f4ff1eabb44161efaba6c1e4b2cb59dbf29829e4f08db58d439909f85246fcb3e428a5801d95a7b0b7305d53296958ac144a7
-
Filesize
518KB
MD58ffaa2ae0e17e7163c1226df165b5bee
SHA1a0dda4d6fc3abb7917baa7060a15b7b0ea7d281f
SHA25601e9b68adce60c28650bd45c4d452a3671fa1d055da89801034868f61434da3b
SHA512b080a62ff352e407626e4242ff6f4ff1eabb44161efaba6c1e4b2cb59dbf29829e4f08db58d439909f85246fcb3e428a5801d95a7b0b7305d53296958ac144a7
-
Filesize
376KB
MD5037d77b71a670b75f77748ce4ec6c610
SHA19ee87bc10aa335bb9ad0328c800ee4b7add625c8
SHA256e03f718c032c6585b788d5015f5426db6652c2f34120865420f364e2451ac10f
SHA5120b05cd418a2e61848cf2eaa74dec6f0eda19b8e51d2f74cfc1d8fa0140afa38132b80b631644e281f15ee14f037b6b7cacacbc3e2299b0e28b2e11a86e2f05b3
-
Filesize
376KB
MD5037d77b71a670b75f77748ce4ec6c610
SHA19ee87bc10aa335bb9ad0328c800ee4b7add625c8
SHA256e03f718c032c6585b788d5015f5426db6652c2f34120865420f364e2451ac10f
SHA5120b05cd418a2e61848cf2eaa74dec6f0eda19b8e51d2f74cfc1d8fa0140afa38132b80b631644e281f15ee14f037b6b7cacacbc3e2299b0e28b2e11a86e2f05b3
-
Filesize
434KB
MD5a5efcafde2fad578870bfcfbe17ef967
SHA1b1810d240849611dbe1af2eb8f25160e4edcfa9d
SHA256c7af7f9e1f5300dfdbe0c6596dc77e22b85fd4cfdfe5207c9115f441c6198711
SHA5124a336195ae76b802f3807aa7e8a44a0193def0418c596592c5dcdf91b7f8ae4d38134290da16715bed93672a598d3d95f1c9779f1abce6d830eb6ce9cab9a5a2
-
Filesize
434KB
MD5a5efcafde2fad578870bfcfbe17ef967
SHA1b1810d240849611dbe1af2eb8f25160e4edcfa9d
SHA256c7af7f9e1f5300dfdbe0c6596dc77e22b85fd4cfdfe5207c9115f441c6198711
SHA5124a336195ae76b802f3807aa7e8a44a0193def0418c596592c5dcdf91b7f8ae4d38134290da16715bed93672a598d3d95f1c9779f1abce6d830eb6ce9cab9a5a2