Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02/04/2023, 18:09 UTC
Static task
static1
Behavioral task
behavioral1
Sample
1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe
Resource
win10-20230220-en
General
-
Target
1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe
-
Size
666KB
-
MD5
26b08dab33665b217dfa3648816c11c9
-
SHA1
c4673b78bda3eed856228cd7c9cbb7a3e0fc947d
-
SHA256
1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7
-
SHA512
ed25070b1f386c5ab43ca41c8ce34e8e1c055cb8f25f5205636e6b58b3d3e4e70ffe0c6a8bad2fa4e3baf006610cefe3749cdc897ab9f2929e507e04d2fbd3a4
-
SSDEEP
12288:7Mr7y90x/cDr+phlUh8FC0rlXbif+hAsMy6N2b9I6+517aqG0:sy80DrKlUf0rle2hAst6N2t+1n
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8949.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/3828-177-0x0000000002610000-0x0000000002656000-memory.dmp family_redline behavioral1/memory/3828-178-0x00000000028B0000-0x00000000028F4000-memory.dmp family_redline behavioral1/memory/3828-179-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-180-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-182-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-184-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-186-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-190-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-192-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-188-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-194-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-196-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-200-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-202-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-204-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-198-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-206-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-208-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-210-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-212-0x00000000028B0000-0x00000000028EF000-memory.dmp family_redline behavioral1/memory/3828-397-0x0000000004FD0000-0x0000000004FE0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4108 un992785.exe 4124 pro8949.exe 3828 qu6710.exe 1480 si820838.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8949.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8949.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un992785.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un992785.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4124 pro8949.exe 4124 pro8949.exe 3828 qu6710.exe 3828 qu6710.exe 1480 si820838.exe 1480 si820838.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4124 pro8949.exe Token: SeDebugPrivilege 3828 qu6710.exe Token: SeDebugPrivilege 1480 si820838.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5096 wrote to memory of 4108 5096 1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe 66 PID 5096 wrote to memory of 4108 5096 1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe 66 PID 5096 wrote to memory of 4108 5096 1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe 66 PID 4108 wrote to memory of 4124 4108 un992785.exe 67 PID 4108 wrote to memory of 4124 4108 un992785.exe 67 PID 4108 wrote to memory of 4124 4108 un992785.exe 67 PID 4108 wrote to memory of 3828 4108 un992785.exe 68 PID 4108 wrote to memory of 3828 4108 un992785.exe 68 PID 4108 wrote to memory of 3828 4108 un992785.exe 68 PID 5096 wrote to memory of 1480 5096 1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe 70 PID 5096 wrote to memory of 1480 5096 1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe 70 PID 5096 wrote to memory of 1480 5096 1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe"C:\Users\Admin\AppData\Local\Temp\1702a400c26189508de265762d746dd5b5585738d9239ee51b062a37d58f07d7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992785.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992785.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8949.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8949.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6710.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6710.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820838.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si820838.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
Network
-
Remote address:8.8.8.8:53Request145.115.113.176.in-addr.arpaIN PTRResponse
-
3.9MB 47.1kB 2850 1023
-
3.9MB 52.2kB 2836 1152
-
322 B 7
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD53c585e68728b474d4117287610658fb0
SHA16eaa3c0b1fc21182094876640fa4724738c8a259
SHA256adc14652878d37a8dd428fb3e63364113b14211d0be62658a050eb21621ac746
SHA512a936b70ef0c11416956188df45de36573a32e2040cfd1788b5e8cb6d13fd773086ddf21e97beb5cef7ac1ba30b891a09c4e137ec25a56179be1026f7aa64ea21
-
Filesize
175KB
MD53c585e68728b474d4117287610658fb0
SHA16eaa3c0b1fc21182094876640fa4724738c8a259
SHA256adc14652878d37a8dd428fb3e63364113b14211d0be62658a050eb21621ac746
SHA512a936b70ef0c11416956188df45de36573a32e2040cfd1788b5e8cb6d13fd773086ddf21e97beb5cef7ac1ba30b891a09c4e137ec25a56179be1026f7aa64ea21
-
Filesize
523KB
MD5b14adc1b64294eecc75988ae4ec38026
SHA1e3f593874191bb58803146b6bc306f63c7c29bee
SHA2560888395aecc646d9470a43e03b965cff8d896e5c3a498d69ad3ca9ca4c138b92
SHA5123cfa9cb69bec7283b4e4ac58d94dd8cad0eab22f7673ae6fe64943f2839ec8f33268525ab6ab4cf69b2b72c63d0ebb5ab89dcb92bce58616ab59ef3ad06c78ed
-
Filesize
523KB
MD5b14adc1b64294eecc75988ae4ec38026
SHA1e3f593874191bb58803146b6bc306f63c7c29bee
SHA2560888395aecc646d9470a43e03b965cff8d896e5c3a498d69ad3ca9ca4c138b92
SHA5123cfa9cb69bec7283b4e4ac58d94dd8cad0eab22f7673ae6fe64943f2839ec8f33268525ab6ab4cf69b2b72c63d0ebb5ab89dcb92bce58616ab59ef3ad06c78ed
-
Filesize
294KB
MD53f140e96e2ca6481273ac6141c5071a2
SHA1f2471046446c5ba197f8373805de9c9e602af157
SHA256dde2498dcb9c6b8b263d71a7036dc7228c8c658af133b8e778a2d74423d66fab
SHA512fa1668ae0c09d16f528cd228711334fe007833d01ee84aaa897742f14c4d2aa058edc21719e5a0c99f574d2e12a4264d2b72f94f7a2c1417cff9147e0359fb0e
-
Filesize
294KB
MD53f140e96e2ca6481273ac6141c5071a2
SHA1f2471046446c5ba197f8373805de9c9e602af157
SHA256dde2498dcb9c6b8b263d71a7036dc7228c8c658af133b8e778a2d74423d66fab
SHA512fa1668ae0c09d16f528cd228711334fe007833d01ee84aaa897742f14c4d2aa058edc21719e5a0c99f574d2e12a4264d2b72f94f7a2c1417cff9147e0359fb0e
-
Filesize
353KB
MD57b46e26e4ddd3517ad298bd0f0a67da9
SHA1c287a02a2d49bf3dc460b3c7d88209711d9a3548
SHA25696a2c636dabf871607fec4948a169bdc4291049ce256e3a01330475b88b31823
SHA512629864ae5202176cc82783d98250867cc53bb96c3711340a9b4f2e215641a34defa12de7ca671aeb13bbed826859a07f8053ab31605938b2878913e4bb347a65
-
Filesize
353KB
MD57b46e26e4ddd3517ad298bd0f0a67da9
SHA1c287a02a2d49bf3dc460b3c7d88209711d9a3548
SHA25696a2c636dabf871607fec4948a169bdc4291049ce256e3a01330475b88b31823
SHA512629864ae5202176cc82783d98250867cc53bb96c3711340a9b4f2e215641a34defa12de7ca671aeb13bbed826859a07f8053ab31605938b2878913e4bb347a65