Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
d57a010abd3f6cd47dbfead94353e9df405dc025a4c49da5a31fb56cf3b7b0c5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d57a010abd3f6cd47dbfead94353e9df405dc025a4c49da5a31fb56cf3b7b0c5.exe
Resource
win10v2004-20230220-en
General
-
Target
d57a010abd3f6cd47dbfead94353e9df405dc025a4c49da5a31fb56cf3b7b0c5.exe
-
Size
612KB
-
MD5
aa6ed2477a1dc1747b14831bc7ff5cf0
-
SHA1
a0018b80e6ec5c5e087e083e482e67ea01cce8fd
-
SHA256
d57a010abd3f6cd47dbfead94353e9df405dc025a4c49da5a31fb56cf3b7b0c5
-
SHA512
76bb5539798386d965b1eb517c3f0f9e6cae95ed43173e99e60bbbafb38155f65bea2acb930b96a40fbf8edafdec044a8c4e7253bef0aa2f708b0efa33373b3e
-
SSDEEP
12288:Uy90DPpWi/Zqw81rhMhhDNqwYKKQ/aCy3TqmQY6q510/oklQev3:UyiPpWihqwDXDNMKdVUTqmFZvkF3
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4976-950-0x0000000007A30000-0x0000000008048000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 43022133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 43022133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 43022133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 43022133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 43022133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 43022133.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1420 st882372.exe 1936 43022133.exe 4976 kp169535.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 43022133.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d57a010abd3f6cd47dbfead94353e9df405dc025a4c49da5a31fb56cf3b7b0c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d57a010abd3f6cd47dbfead94353e9df405dc025a4c49da5a31fb56cf3b7b0c5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st882372.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st882372.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1936 43022133.exe 1936 43022133.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1936 43022133.exe Token: SeDebugPrivilege 4976 kp169535.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1420 1300 d57a010abd3f6cd47dbfead94353e9df405dc025a4c49da5a31fb56cf3b7b0c5.exe 84 PID 1300 wrote to memory of 1420 1300 d57a010abd3f6cd47dbfead94353e9df405dc025a4c49da5a31fb56cf3b7b0c5.exe 84 PID 1300 wrote to memory of 1420 1300 d57a010abd3f6cd47dbfead94353e9df405dc025a4c49da5a31fb56cf3b7b0c5.exe 84 PID 1420 wrote to memory of 1936 1420 st882372.exe 85 PID 1420 wrote to memory of 1936 1420 st882372.exe 85 PID 1420 wrote to memory of 4976 1420 st882372.exe 90 PID 1420 wrote to memory of 4976 1420 st882372.exe 90 PID 1420 wrote to memory of 4976 1420 st882372.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d57a010abd3f6cd47dbfead94353e9df405dc025a4c49da5a31fb56cf3b7b0c5.exe"C:\Users\Admin\AppData\Local\Temp\d57a010abd3f6cd47dbfead94353e9df405dc025a4c49da5a31fb56cf3b7b0c5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st882372.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st882372.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43022133.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43022133.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp169535.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp169535.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD5b0f4910740e32d95e5cbb137f7b4b12e
SHA1932039d0d1e1193a1a12da2062d028e162056ad0
SHA25682b012cb82e592a9e926fbc65ff995cc6ec2e7ac40e364afafe8e967c9f4e91f
SHA5124f62ce7147c94df61653ef8c9f0e2beef880d77a7fdeb32d2311769338fff9e1eb7d5bf7312392f662734c682e0c4084f1d87b9f3408c552c0867e47e575ebe7
-
Filesize
458KB
MD5b0f4910740e32d95e5cbb137f7b4b12e
SHA1932039d0d1e1193a1a12da2062d028e162056ad0
SHA25682b012cb82e592a9e926fbc65ff995cc6ec2e7ac40e364afafe8e967c9f4e91f
SHA5124f62ce7147c94df61653ef8c9f0e2beef880d77a7fdeb32d2311769338fff9e1eb7d5bf7312392f662734c682e0c4084f1d87b9f3408c552c0867e47e575ebe7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD529086a62a3a97647ce8acfbf17ef9866
SHA19d7505e46e57606b3b94e9e7356b42a685059aa5
SHA256ee379a85be5469c8b249e179ac827935bb61f864396eac29fa9bc275153052fb
SHA51232dc2c66cf05b7677ab53658e9e277fa36702273afb764e65f42c8ae8ca35b027b03f4b59d930aa41a52b1c9157c3425808436845a59e7e0f5b06ee925116ca3
-
Filesize
459KB
MD529086a62a3a97647ce8acfbf17ef9866
SHA19d7505e46e57606b3b94e9e7356b42a685059aa5
SHA256ee379a85be5469c8b249e179ac827935bb61f864396eac29fa9bc275153052fb
SHA51232dc2c66cf05b7677ab53658e9e277fa36702273afb764e65f42c8ae8ca35b027b03f4b59d930aa41a52b1c9157c3425808436845a59e7e0f5b06ee925116ca3