Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
53s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe
Resource
win10-20230220-en
General
-
Target
33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe
-
Size
659KB
-
MD5
8378509045125fe4ce652e2f968d90ba
-
SHA1
4830f1658b997e2707370ef8d80080d4f68c70a8
-
SHA256
33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802
-
SHA512
3ba861f7973b7fa53c61178783a392e2966621c7b1e49827e97fd89d6ecc23bd814641536cf6f3182e68c6511a2e01fe66957018e2c39296114858910d10da2c
-
SSDEEP
12288:6MrKy90Uee7dP4wMrEqoPBPpXqbUmdo67ZF2CjhDPoTGZ:ky3VggqoPBPEUk7b2CjBwTC
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4836.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3880-178-0x00000000026C0000-0x0000000002706000-memory.dmp family_redline behavioral1/memory/3880-179-0x0000000002770000-0x00000000027B4000-memory.dmp family_redline behavioral1/memory/3880-180-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-181-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-183-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-191-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-189-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-203-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-201-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-207-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-209-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-213-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-211-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-205-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-199-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-197-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-195-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-193-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-187-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline behavioral1/memory/3880-185-0x0000000002770000-0x00000000027AF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2544 un942114.exe 2604 pro4836.exe 3880 qu7585.exe 5072 si346809.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4836.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4836.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un942114.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un942114.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2604 pro4836.exe 2604 pro4836.exe 3880 qu7585.exe 3880 qu7585.exe 5072 si346809.exe 5072 si346809.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2604 pro4836.exe Token: SeDebugPrivilege 3880 qu7585.exe Token: SeDebugPrivilege 5072 si346809.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2544 2504 33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe 66 PID 2504 wrote to memory of 2544 2504 33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe 66 PID 2504 wrote to memory of 2544 2504 33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe 66 PID 2544 wrote to memory of 2604 2544 un942114.exe 67 PID 2544 wrote to memory of 2604 2544 un942114.exe 67 PID 2544 wrote to memory of 2604 2544 un942114.exe 67 PID 2544 wrote to memory of 3880 2544 un942114.exe 68 PID 2544 wrote to memory of 3880 2544 un942114.exe 68 PID 2544 wrote to memory of 3880 2544 un942114.exe 68 PID 2504 wrote to memory of 5072 2504 33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe 70 PID 2504 wrote to memory of 5072 2504 33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe 70 PID 2504 wrote to memory of 5072 2504 33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe"C:\Users\Admin\AppData\Local\Temp\33ae1db3a8ec1eae06b9a4ab5d5fa9efa34b3bcfd2764f4dacdc34ce7fd90802.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942114.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942114.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4836.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4836.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7585.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si346809.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si346809.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD56387e59506c22ac1093722924868442a
SHA1e0a3f56b0eecb98624ead3b484015cc0964cfbf2
SHA256b54be89db50f7478c6f2bce008c4835315473b2a3281f5f0307cbea8467208b8
SHA512bf8cad79e47bb957d66ce36e3985c5b09ae2c457a25292f2128c3cdfda406cce7155023e1b6941b5414a600d2b3be8de9160fa66d18b2b5730276c8222102379
-
Filesize
176KB
MD56387e59506c22ac1093722924868442a
SHA1e0a3f56b0eecb98624ead3b484015cc0964cfbf2
SHA256b54be89db50f7478c6f2bce008c4835315473b2a3281f5f0307cbea8467208b8
SHA512bf8cad79e47bb957d66ce36e3985c5b09ae2c457a25292f2128c3cdfda406cce7155023e1b6941b5414a600d2b3be8de9160fa66d18b2b5730276c8222102379
-
Filesize
518KB
MD5b430de0c94d729a17be29e2cd2e725b6
SHA15a0e91cb4b8d96a43080a31fd4a36c9eb22a4de2
SHA256ef9d7e5b50f7512df3b3d3c703e6f5ecb8e7bdab151a58ed8154c99261a08e4e
SHA5128905137d188a2ec551fe2a8abe806a819a34743cf65c0239b43b45f42bccbf5aaa2a6d8be9b0604de50b90cd691dea05c69ba9190bce34781a2403dcd9d1d878
-
Filesize
518KB
MD5b430de0c94d729a17be29e2cd2e725b6
SHA15a0e91cb4b8d96a43080a31fd4a36c9eb22a4de2
SHA256ef9d7e5b50f7512df3b3d3c703e6f5ecb8e7bdab151a58ed8154c99261a08e4e
SHA5128905137d188a2ec551fe2a8abe806a819a34743cf65c0239b43b45f42bccbf5aaa2a6d8be9b0604de50b90cd691dea05c69ba9190bce34781a2403dcd9d1d878
-
Filesize
376KB
MD59505af85c9e898757d6645f8326fd221
SHA13558d144169f6e5d68e52923d9dc8b8417bb38a3
SHA256d76b860912fb446f0c6b0865d5da856f08a67b068fb81c0d1552bc45d52a8d20
SHA512d01211790cf7c113affb8ffc527ea9ed1a35db656da203781f65ba6fdb7cf2da13a02e08b9875d8732222517bb2a47cbf70ab561cc18122932e9d1f16e68b021
-
Filesize
376KB
MD59505af85c9e898757d6645f8326fd221
SHA13558d144169f6e5d68e52923d9dc8b8417bb38a3
SHA256d76b860912fb446f0c6b0865d5da856f08a67b068fb81c0d1552bc45d52a8d20
SHA512d01211790cf7c113affb8ffc527ea9ed1a35db656da203781f65ba6fdb7cf2da13a02e08b9875d8732222517bb2a47cbf70ab561cc18122932e9d1f16e68b021
-
Filesize
434KB
MD5e18e4b0d5582272981e1f448d765d8fc
SHA10139f65e7709135c892a3a6215a116d936287f6e
SHA256ea72d4a7a8be7ca39922af4d4e8fd87ca704162f8015e698f52d5bd52e6af456
SHA5122697e4d5ad38786ebd58283e2db3702f4e2927b168fc9a8df0a264bf89b75dd9ecd981a0447f9be43c64c7644240df64d7e7fc0b14e1a1157f8aad049113ab54
-
Filesize
434KB
MD5e18e4b0d5582272981e1f448d765d8fc
SHA10139f65e7709135c892a3a6215a116d936287f6e
SHA256ea72d4a7a8be7ca39922af4d4e8fd87ca704162f8015e698f52d5bd52e6af456
SHA5122697e4d5ad38786ebd58283e2db3702f4e2927b168fc9a8df0a264bf89b75dd9ecd981a0447f9be43c64c7644240df64d7e7fc0b14e1a1157f8aad049113ab54