Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03/04/2023, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe
Resource
win10-20230220-en
General
-
Target
2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe
-
Size
660KB
-
MD5
f92a37902c78dce66c8db2f962f7b629
-
SHA1
6b38b87b06acd207b638f36075bb168896900099
-
SHA256
2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9
-
SHA512
8fd6c6c96c8a8f116660e867e33815016d5d6a374300b2fd3e198f603d0fb6b975629b939ac17b1f50963be71e52f5a7ffe377be0cd80136659e70bb21455085
-
SSDEEP
12288:fMrgy90D6h/OFpM4+qBlOyfkjn63jftNhmE9IikY0jsSrLiSihaWPWMlT4Ix1:/yL/OFx+BQkjn4ft3mE9WYysS6Sih5Hz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4769.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4764-179-0x0000000004980000-0x00000000049C6000-memory.dmp family_redline behavioral1/memory/4764-180-0x0000000004F30000-0x0000000004F74000-memory.dmp family_redline behavioral1/memory/4764-182-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-181-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-184-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-186-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-188-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-190-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-192-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-194-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-196-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-198-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-200-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-202-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-204-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-206-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-208-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-210-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-212-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4764-214-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4076 un717400.exe 4276 pro4769.exe 4764 qu0827.exe 1304 si628845.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4769.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4769.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un717400.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un717400.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4276 pro4769.exe 4276 pro4769.exe 4764 qu0827.exe 4764 qu0827.exe 1304 si628845.exe 1304 si628845.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4276 pro4769.exe Token: SeDebugPrivilege 4764 qu0827.exe Token: SeDebugPrivilege 1304 si628845.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3668 wrote to memory of 4076 3668 2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe 66 PID 3668 wrote to memory of 4076 3668 2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe 66 PID 3668 wrote to memory of 4076 3668 2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe 66 PID 4076 wrote to memory of 4276 4076 un717400.exe 67 PID 4076 wrote to memory of 4276 4076 un717400.exe 67 PID 4076 wrote to memory of 4276 4076 un717400.exe 67 PID 4076 wrote to memory of 4764 4076 un717400.exe 68 PID 4076 wrote to memory of 4764 4076 un717400.exe 68 PID 4076 wrote to memory of 4764 4076 un717400.exe 68 PID 3668 wrote to memory of 1304 3668 2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe 70 PID 3668 wrote to memory of 1304 3668 2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe 70 PID 3668 wrote to memory of 1304 3668 2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe"C:\Users\Admin\AppData\Local\Temp\2884368dc2711805b3b3951d26f7d93eabc67077e598511a7826581b6259b2d9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un717400.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un717400.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4769.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4769.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0827.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0827.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628845.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628845.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
Filesize
175KB
MD5bb6d43fa4ebafe62b98ec4dea4ff49d9
SHA1d8188e664ac977f59d3ec26589e3cf67b1fab23b
SHA2561d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89
SHA512679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644
-
Filesize
518KB
MD541dbe37d0dcd559f4f3086fae0210ab7
SHA1f2f4f79ad225ee57ea645370f491496d5b33d49e
SHA2560e6443a26d57cadc87a3aa1a5457545d5f4de249db1595ac940c227295abafed
SHA5121f35e7ef20aef8d57cbe58a36432a8e09a5d6d60516909195b44044f97b5370c55bf5778650c018a997e6821d0c026140cd77faf311ec6b78a0b54422f9f4bce
-
Filesize
518KB
MD541dbe37d0dcd559f4f3086fae0210ab7
SHA1f2f4f79ad225ee57ea645370f491496d5b33d49e
SHA2560e6443a26d57cadc87a3aa1a5457545d5f4de249db1595ac940c227295abafed
SHA5121f35e7ef20aef8d57cbe58a36432a8e09a5d6d60516909195b44044f97b5370c55bf5778650c018a997e6821d0c026140cd77faf311ec6b78a0b54422f9f4bce
-
Filesize
236KB
MD569477ba3b18a4c06031b7ef0a0c83067
SHA155e6ebe692ddd4c423c2e93b7b3dd9064ec5d0aa
SHA2560c686c7c91d9a017fba0257b7c613239bd8f8ce959dbd3ee71162ad7a54f1e48
SHA5128cb28bfd728be372d7d19b20989787739ed27691f95d268183e2bfac5feb60ffa57419e44b640cfa1aa5b324d43bf18a4587d4e79f2dbb83f3a6fd3fde203522
-
Filesize
236KB
MD569477ba3b18a4c06031b7ef0a0c83067
SHA155e6ebe692ddd4c423c2e93b7b3dd9064ec5d0aa
SHA2560c686c7c91d9a017fba0257b7c613239bd8f8ce959dbd3ee71162ad7a54f1e48
SHA5128cb28bfd728be372d7d19b20989787739ed27691f95d268183e2bfac5feb60ffa57419e44b640cfa1aa5b324d43bf18a4587d4e79f2dbb83f3a6fd3fde203522
-
Filesize
295KB
MD5c90b0f73d144c9d10cc221e4be42e582
SHA1da471a6ffb77f564a6381ba4b0168ae740ca40d7
SHA256fc8cf8d879e1ba9005f6d138d455b9af1cfcd0c98edca37f9f5603524e52146b
SHA51251fd94f43caea4a46fddc20dbd4d9ea03ddc6e1fdbefd387bd28bbf7d23f396fd71f26e5b36fc9498262ab00ab2fa6c2d08f7a157d8af9fc4b544cfd5fdb9098
-
Filesize
295KB
MD5c90b0f73d144c9d10cc221e4be42e582
SHA1da471a6ffb77f564a6381ba4b0168ae740ca40d7
SHA256fc8cf8d879e1ba9005f6d138d455b9af1cfcd0c98edca37f9f5603524e52146b
SHA51251fd94f43caea4a46fddc20dbd4d9ea03ddc6e1fdbefd387bd28bbf7d23f396fd71f26e5b36fc9498262ab00ab2fa6c2d08f7a157d8af9fc4b544cfd5fdb9098