Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
20/08/2023, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9.exe
Resource
win10-20230703-en
General
-
Target
c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9.exe
-
Size
1012KB
-
MD5
ddd682d5a3cef873b9cf95ec21b13e85
-
SHA1
85a50e0f8d951bf09200cad7f0412c98b5898749
-
SHA256
c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9
-
SHA512
d14cb17eb9ffe06ccefa0f9e24dfe9b2b9a27e4d27fa2f6014bc98351de566631176398f32a8f6be7caad52fef351b2b136c7808277837ad2bcdb0677eb14051
-
SSDEEP
12288:1MrUy90tP38ikjoOYfyNdq2NPStzDLmVKvSUO7wOzQvZbTn05YVUi+okJI+CXiyM:pywcvYsdqEPuzDK8M7DzQlROe+CQeE
Malware Config
Extracted
redline
chang
77.91.124.73:19071
-
auth_value
92b880db64e691d6bb290d1536ce7688
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4742745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4742745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4742745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4742745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4742745.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 768 v2503561.exe 776 v2443669.exe 1896 v9636310.exe 4824 v5403072.exe 60 a4742745.exe 3296 b3337770.exe 3256 c9589161.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4742745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4742745.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2503561.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2443669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9636310.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v5403072.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 60 a4742745.exe 60 a4742745.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 60 a4742745.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2444 wrote to memory of 768 2444 c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9.exe 70 PID 2444 wrote to memory of 768 2444 c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9.exe 70 PID 2444 wrote to memory of 768 2444 c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9.exe 70 PID 768 wrote to memory of 776 768 v2503561.exe 71 PID 768 wrote to memory of 776 768 v2503561.exe 71 PID 768 wrote to memory of 776 768 v2503561.exe 71 PID 776 wrote to memory of 1896 776 v2443669.exe 72 PID 776 wrote to memory of 1896 776 v2443669.exe 72 PID 776 wrote to memory of 1896 776 v2443669.exe 72 PID 1896 wrote to memory of 4824 1896 v9636310.exe 73 PID 1896 wrote to memory of 4824 1896 v9636310.exe 73 PID 1896 wrote to memory of 4824 1896 v9636310.exe 73 PID 4824 wrote to memory of 60 4824 v5403072.exe 74 PID 4824 wrote to memory of 60 4824 v5403072.exe 74 PID 4824 wrote to memory of 60 4824 v5403072.exe 74 PID 4824 wrote to memory of 3296 4824 v5403072.exe 75 PID 4824 wrote to memory of 3296 4824 v5403072.exe 75 PID 4824 wrote to memory of 3296 4824 v5403072.exe 75 PID 1896 wrote to memory of 3256 1896 v9636310.exe 76 PID 1896 wrote to memory of 3256 1896 v9636310.exe 76 PID 1896 wrote to memory of 3256 1896 v9636310.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9.exe"C:\Users\Admin\AppData\Local\Temp\c8bedbff4bcfd3b957fe59850effbff156241785b86e41f621798a90dbaeaaf9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2503561.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2503561.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2443669.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2443669.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9636310.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9636310.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5403072.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5403072.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4742745.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4742745.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:60
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3337770.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3337770.exe6⤵
- Executes dropped EXE
PID:3296
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9589161.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9589161.exe5⤵
- Executes dropped EXE
PID:3256
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
899KB
MD5f4b0363b089e34b5f49c4eaa32b12cd1
SHA11e5a9b8089213c94836ed5e2c7f19264d711b9e7
SHA25605e8d0751b2e67c585fad82685e839aaeffbeb82491515ad2cc098bc986feb9f
SHA5123dcfde6e2729e19a96c5e67f0ea50501fc95a50701eac344f8fc97a113c68e208d708f4ada0ab69bfe018a03051cceb4c45fbf02dac807b705b8d591d1fcb0bd
-
Filesize
899KB
MD5f4b0363b089e34b5f49c4eaa32b12cd1
SHA11e5a9b8089213c94836ed5e2c7f19264d711b9e7
SHA25605e8d0751b2e67c585fad82685e839aaeffbeb82491515ad2cc098bc986feb9f
SHA5123dcfde6e2729e19a96c5e67f0ea50501fc95a50701eac344f8fc97a113c68e208d708f4ada0ab69bfe018a03051cceb4c45fbf02dac807b705b8d591d1fcb0bd
-
Filesize
673KB
MD5660998c9534c2bb8b528ddc35de37b44
SHA19b7ca6a7f2d58d43b5fd4dc4f8d7f3c6a7c29c5c
SHA2568a0a4c09b414daf270ba66ff444f5fe294f8d2bb9b81ea706a72c39c30157c04
SHA512519332ac0bb1d15082a9d62cf7b01fde3d2fa918938d5a8672bec132e183f18183e81b00e46adaed72df58d19e63359493e4b8d1f17485654f001b8b76f0c251
-
Filesize
673KB
MD5660998c9534c2bb8b528ddc35de37b44
SHA19b7ca6a7f2d58d43b5fd4dc4f8d7f3c6a7c29c5c
SHA2568a0a4c09b414daf270ba66ff444f5fe294f8d2bb9b81ea706a72c39c30157c04
SHA512519332ac0bb1d15082a9d62cf7b01fde3d2fa918938d5a8672bec132e183f18183e81b00e46adaed72df58d19e63359493e4b8d1f17485654f001b8b76f0c251
-
Filesize
548KB
MD5e8acfd29f2bbfebb76797dd6e98f89e4
SHA1fd8cc6c190ea053ddd0affbb08c23822b824fa3e
SHA256ebac0a82679402c31e71eb0c7a9bb84b9c40aa4af8d64d44e84caf52cb5ca67d
SHA51240041a445bb4afefe0f4f6f064888b94978372d3fe86cf9067833798f0e2c0edb22c2139e269f3a8709615e1afb620e592499de7a0fdf3ee4274068650c133b8
-
Filesize
548KB
MD5e8acfd29f2bbfebb76797dd6e98f89e4
SHA1fd8cc6c190ea053ddd0affbb08c23822b824fa3e
SHA256ebac0a82679402c31e71eb0c7a9bb84b9c40aa4af8d64d44e84caf52cb5ca67d
SHA51240041a445bb4afefe0f4f6f064888b94978372d3fe86cf9067833798f0e2c0edb22c2139e269f3a8709615e1afb620e592499de7a0fdf3ee4274068650c133b8
-
Filesize
174KB
MD5ba7ccc72aa67637e5edb5af9bbe211ac
SHA1929978860f7dd30263c428a305f532e3c3a5f2c6
SHA256ea177be5cced9b3bf25d2680785cf51cfa6c53262082011af489d95128380638
SHA51208bc55fb78a0e291a3af4d1dda50841e8c64869816a86c5c7db277d3057e5d3bf75aff829e4f6065ba3b10beab40d225a3950fcda531f2869ffde41559bac9e6
-
Filesize
174KB
MD5ba7ccc72aa67637e5edb5af9bbe211ac
SHA1929978860f7dd30263c428a305f532e3c3a5f2c6
SHA256ea177be5cced9b3bf25d2680785cf51cfa6c53262082011af489d95128380638
SHA51208bc55fb78a0e291a3af4d1dda50841e8c64869816a86c5c7db277d3057e5d3bf75aff829e4f6065ba3b10beab40d225a3950fcda531f2869ffde41559bac9e6
-
Filesize
392KB
MD52bbfdcaf650e184dd53bb0cc713840b6
SHA14fe33fa0d0f005d1e40fe1d24c45c26480958f03
SHA25600302bb74e683696123f55f3bdca3c734e673982c5769fd3891de09ad380b2d2
SHA5128da20c7235416e3fb92860ea45dc440f568b0bf5735cc1da6c7b8c0cf32393a315a082624d4a68840b49485c28676b828864c71d860a86fd20082761628e1b00
-
Filesize
392KB
MD52bbfdcaf650e184dd53bb0cc713840b6
SHA14fe33fa0d0f005d1e40fe1d24c45c26480958f03
SHA25600302bb74e683696123f55f3bdca3c734e673982c5769fd3891de09ad380b2d2
SHA5128da20c7235416e3fb92860ea45dc440f568b0bf5735cc1da6c7b8c0cf32393a315a082624d4a68840b49485c28676b828864c71d860a86fd20082761628e1b00
-
Filesize
273KB
MD53e8ad8e952127fb536700565cf01da31
SHA1f053284396d23dff21e8015ac2f0e220dac74b74
SHA25638c9cb75782fdd6e57f221d32af32518e82e099d9380c6ff3b25e5ee3a65ee24
SHA512dc462ca91a704aa61d0c1a7a8d01e984c1950dbbea1fdbe3594100af9cda9dda969bedcb836e7e483e2bc50b31552a9a48e76455a9387e2fcc1ab61c035b5aa9
-
Filesize
273KB
MD53e8ad8e952127fb536700565cf01da31
SHA1f053284396d23dff21e8015ac2f0e220dac74b74
SHA25638c9cb75782fdd6e57f221d32af32518e82e099d9380c6ff3b25e5ee3a65ee24
SHA512dc462ca91a704aa61d0c1a7a8d01e984c1950dbbea1fdbe3594100af9cda9dda969bedcb836e7e483e2bc50b31552a9a48e76455a9387e2fcc1ab61c035b5aa9
-
Filesize
140KB
MD504e54b20f2288875f129b2aa2852d11a
SHA155bab3e9fb5c2915e2800bdc677ea3faf4a2995d
SHA256634cf5cf315542200f5fcd6b81a90eb67904fd7c45d8398efc5041ee60537270
SHA512dadb03f8142d0d32f44254d74d772efa189b721c19e85792bc07bc64fc505cd54135805b8a90ec9caab63954bae6bc517d2b069e826a460d1ff71017d8f6b66e
-
Filesize
140KB
MD504e54b20f2288875f129b2aa2852d11a
SHA155bab3e9fb5c2915e2800bdc677ea3faf4a2995d
SHA256634cf5cf315542200f5fcd6b81a90eb67904fd7c45d8398efc5041ee60537270
SHA512dadb03f8142d0d32f44254d74d772efa189b721c19e85792bc07bc64fc505cd54135805b8a90ec9caab63954bae6bc517d2b069e826a460d1ff71017d8f6b66e