Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe
Resource
win10-20230220-en
General
-
Target
ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe
-
Size
674KB
-
MD5
d6f7bafa4f2740e6f2be92ce02805ce0
-
SHA1
c084741df0bb3a677e05d19981f7b87a0834fa24
-
SHA256
ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe
-
SHA512
6adf0a26bc018ee4aa430da87cff79242c1296f89e0010a9a103f09eb6df682d3668a969cd03520c05ab81e0ac0c373b0dbc34908d8fd14819e4d853d0c6aa21
-
SSDEEP
12288:UMrEy90FnNSufKVh173uzGhN1rvRPIaxfeuUuXe42aljC6gBD:QyMn4wKVhBoGhrjRcn/42p6uD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4618.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4744-179-0x0000000004060000-0x00000000040A6000-memory.dmp family_redline behavioral1/memory/4744-180-0x0000000004280000-0x00000000042C4000-memory.dmp family_redline behavioral1/memory/4744-181-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-182-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-188-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-186-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-184-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-190-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-192-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-194-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-196-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-198-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-200-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-202-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-204-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-206-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-208-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-210-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-212-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-214-0x0000000004280000-0x00000000042BF000-memory.dmp family_redline behavioral1/memory/4744-395-0x0000000006840000-0x0000000006850000-memory.dmp family_redline behavioral1/memory/4744-399-0x0000000006840000-0x0000000006850000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4376 un477119.exe 4460 pro4618.exe 4744 qu6715.exe 4752 si379893.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4618.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un477119.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un477119.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4460 pro4618.exe 4460 pro4618.exe 4744 qu6715.exe 4744 qu6715.exe 4752 si379893.exe 4752 si379893.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4460 pro4618.exe Token: SeDebugPrivilege 4744 qu6715.exe Token: SeDebugPrivilege 4752 si379893.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4376 4104 ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe 66 PID 4104 wrote to memory of 4376 4104 ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe 66 PID 4104 wrote to memory of 4376 4104 ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe 66 PID 4376 wrote to memory of 4460 4376 un477119.exe 67 PID 4376 wrote to memory of 4460 4376 un477119.exe 67 PID 4376 wrote to memory of 4460 4376 un477119.exe 67 PID 4376 wrote to memory of 4744 4376 un477119.exe 68 PID 4376 wrote to memory of 4744 4376 un477119.exe 68 PID 4376 wrote to memory of 4744 4376 un477119.exe 68 PID 4104 wrote to memory of 4752 4104 ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe 70 PID 4104 wrote to memory of 4752 4104 ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe 70 PID 4104 wrote to memory of 4752 4104 ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe"C:\Users\Admin\AppData\Local\Temp\ddb5f56d072774f64543441e53c018554b97355145d75f37026f9fb00b8557fe.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477119.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477119.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4618.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4618.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6715.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6715.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si379893.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si379893.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD5cc158400595da2253853c340d4a6777c
SHA1005b478b20ecaf04162b5f2807ff87ebfb4244a2
SHA25672d59d952b9e6aa2f5578f2745965b405fca5edde6354a4e619d71dfabb57fbc
SHA5120dc2ca487643274db8480d475734f305372a75c590dee5155221ef0526fca8bab8f12df0d0def9a159b0dcccb1edaf6216338f6adb157e2cf872892cb92bacef
-
Filesize
176KB
MD5cc158400595da2253853c340d4a6777c
SHA1005b478b20ecaf04162b5f2807ff87ebfb4244a2
SHA25672d59d952b9e6aa2f5578f2745965b405fca5edde6354a4e619d71dfabb57fbc
SHA5120dc2ca487643274db8480d475734f305372a75c590dee5155221ef0526fca8bab8f12df0d0def9a159b0dcccb1edaf6216338f6adb157e2cf872892cb92bacef
-
Filesize
533KB
MD5f36c895dc40e44652ea1e210bdc00030
SHA1e4c66e51a5b2041ece3be9ce5800038d9ec61576
SHA2561d8db4919296110af2fd1d22e03d0f2891000b50d38af0746659442dfc97462a
SHA512ede75117705a08e2045b0e3bc38b842f7f4f10ce135f0a7365656e262aede46c2f9913278b8b962bc8c265eddc8ae0574a26f926f361a51ed10efbd254fc3786
-
Filesize
533KB
MD5f36c895dc40e44652ea1e210bdc00030
SHA1e4c66e51a5b2041ece3be9ce5800038d9ec61576
SHA2561d8db4919296110af2fd1d22e03d0f2891000b50d38af0746659442dfc97462a
SHA512ede75117705a08e2045b0e3bc38b842f7f4f10ce135f0a7365656e262aede46c2f9913278b8b962bc8c265eddc8ae0574a26f926f361a51ed10efbd254fc3786
-
Filesize
376KB
MD57aa1902df392aebe8e51edf0593c59f5
SHA19ea4a83b9d83f05938218aa6aa63cf16c08e642a
SHA256e31f8bd007197c2e94a3d87e02ee93c230167cb140e9a66fca53ef385aa3554e
SHA512dbc1c0bf9d584d98bede9eaaec866b7ae3f946bde70810344b773a5fe36a07feadc11a60432411255fd375de1c1fc787a3eab73a0345d7c83f13f569b299986d
-
Filesize
376KB
MD57aa1902df392aebe8e51edf0593c59f5
SHA19ea4a83b9d83f05938218aa6aa63cf16c08e642a
SHA256e31f8bd007197c2e94a3d87e02ee93c230167cb140e9a66fca53ef385aa3554e
SHA512dbc1c0bf9d584d98bede9eaaec866b7ae3f946bde70810344b773a5fe36a07feadc11a60432411255fd375de1c1fc787a3eab73a0345d7c83f13f569b299986d
-
Filesize
435KB
MD5a985a8e5ee5a4a3bd48be785c606c137
SHA19c9e73e2ac001a956e3a03aa25610e04842a4d3b
SHA256819d0a45a873bf6aa67c8df2f1a8e260c5ea2e13349b5495e47f6a482569fdfb
SHA5120f4bc5caa774c30738e1c4c9cecf3cb7942774c146ece0ad7c688f1caed4ef62400898e60d663ddaae6167f840446079e6f818649e02199d364207bdc518f6a6
-
Filesize
435KB
MD5a985a8e5ee5a4a3bd48be785c606c137
SHA19c9e73e2ac001a956e3a03aa25610e04842a4d3b
SHA256819d0a45a873bf6aa67c8df2f1a8e260c5ea2e13349b5495e47f6a482569fdfb
SHA5120f4bc5caa774c30738e1c4c9cecf3cb7942774c146ece0ad7c688f1caed4ef62400898e60d663ddaae6167f840446079e6f818649e02199d364207bdc518f6a6