Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 18:40

General

  • Target

    d83f99242928c54ff764a1bb94b9ba9032bea5f76a38ea516e236355bf6c3cfb.exe

  • Size

    694KB

  • MD5

    b19f781dfaa9f64ebb187344be2bce7b

  • SHA1

    c08c3ae52fb1ef75aaae42d1672738222e790915

  • SHA256

    d83f99242928c54ff764a1bb94b9ba9032bea5f76a38ea516e236355bf6c3cfb

  • SHA512

    2e8b1aa25aca3fdf66b3bbb293b8d59ce713fea62edc06844e9ef47e533d0263c8dce81e8da56b451dbe74422727449c6d7c293abfb9f7fead522a0c291c8a1e

  • SSDEEP

    12288:cy90oLDBMmoBr3key63QwpFT0++vrbG/FnXWR6Fj18bQKEA+s/VYis3j:cy7DPoBbyZoFb+vrbao6Fj18bQ7OWiA

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d83f99242928c54ff764a1bb94b9ba9032bea5f76a38ea516e236355bf6c3cfb.exe
    "C:\Users\Admin\AppData\Local\Temp\d83f99242928c54ff764a1bb94b9ba9032bea5f76a38ea516e236355bf6c3cfb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un522487.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un522487.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\06700384.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\06700384.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1808
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 1084
          4⤵
          • Program crash
          PID:4656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk347209.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk347209.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4008
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1808 -ip 1808
    1⤵
      PID:4028

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un522487.exe

      Filesize

      540KB

      MD5

      7758e72a5c3712d7cb4107c6b150b163

      SHA1

      653ee7dd57af0d4dfacd096ad19a842673e73439

      SHA256

      2d6a71cdcb47845d025ffff5744f123a9b289dd7aea7d0ab7600fc5eb6df021d

      SHA512

      5e110f90bb649ede9eaf0d05a43f60231dd2e0ed67221fc8e9cb306ac7dc1213f2e70442f5d04cf8e221fa1aa974273b105995d1af8c32bc0219b848a53d21ba

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un522487.exe

      Filesize

      540KB

      MD5

      7758e72a5c3712d7cb4107c6b150b163

      SHA1

      653ee7dd57af0d4dfacd096ad19a842673e73439

      SHA256

      2d6a71cdcb47845d025ffff5744f123a9b289dd7aea7d0ab7600fc5eb6df021d

      SHA512

      5e110f90bb649ede9eaf0d05a43f60231dd2e0ed67221fc8e9cb306ac7dc1213f2e70442f5d04cf8e221fa1aa974273b105995d1af8c32bc0219b848a53d21ba

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\06700384.exe

      Filesize

      258KB

      MD5

      2ae1b5f31c028dbcc7d3e95b0514173a

      SHA1

      e0206c33069c7f18b41621d35fc1ff8614cfa9a0

      SHA256

      c2ffa91559e65970b4b2cb6994f882c6a2b92b28887885f1625bc96f4ae60fa8

      SHA512

      59a5bd69f7ff7769208e81862ceb1493050a1337b5f700fc7f019f170520cb407331370842cd6284d94d52a1a7793a59540ae1945ff9f0e23e9bc27b7bde35aa

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\06700384.exe

      Filesize

      258KB

      MD5

      2ae1b5f31c028dbcc7d3e95b0514173a

      SHA1

      e0206c33069c7f18b41621d35fc1ff8614cfa9a0

      SHA256

      c2ffa91559e65970b4b2cb6994f882c6a2b92b28887885f1625bc96f4ae60fa8

      SHA512

      59a5bd69f7ff7769208e81862ceb1493050a1337b5f700fc7f019f170520cb407331370842cd6284d94d52a1a7793a59540ae1945ff9f0e23e9bc27b7bde35aa

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk347209.exe

      Filesize

      340KB

      MD5

      4aa90b33774b68f8dce830e667609def

      SHA1

      3d79028f8514130da256bfda8b284ed57bd9e5ed

      SHA256

      7933ede941a453351c41f6f56bf64105a410f6d3a0bfea6cf664c2543e3d2db4

      SHA512

      9e7fafd0407b80d8fb598bc35abba4ace11c1a5ece7dc475706c8099018a795b2b7d409a5f20ba047d690efaab0d6e139d70a80705448791b57aa5a892989486

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk347209.exe

      Filesize

      340KB

      MD5

      4aa90b33774b68f8dce830e667609def

      SHA1

      3d79028f8514130da256bfda8b284ed57bd9e5ed

      SHA256

      7933ede941a453351c41f6f56bf64105a410f6d3a0bfea6cf664c2543e3d2db4

      SHA512

      9e7fafd0407b80d8fb598bc35abba4ace11c1a5ece7dc475706c8099018a795b2b7d409a5f20ba047d690efaab0d6e139d70a80705448791b57aa5a892989486

    • memory/1808-184-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/1808-150-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-154-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-156-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-158-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-160-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-162-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-164-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-166-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-168-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-170-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-172-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-174-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-176-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-177-0x0000000002CF0000-0x0000000002D1D000-memory.dmp

      Filesize

      180KB

    • memory/1808-178-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/1808-179-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/1808-180-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/1808-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/1808-182-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/1808-183-0x0000000007300000-0x0000000007310000-memory.dmp

      Filesize

      64KB

    • memory/1808-152-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/1808-149-0x0000000007110000-0x0000000007123000-memory.dmp

      Filesize

      76KB

    • memory/1808-148-0x0000000007310000-0x00000000078B4000-memory.dmp

      Filesize

      5.6MB

    • memory/4008-466-0x0000000007220000-0x0000000007230000-memory.dmp

      Filesize

      64KB

    • memory/4008-993-0x0000000007220000-0x0000000007230000-memory.dmp

      Filesize

      64KB

    • memory/4008-992-0x00000000071D0000-0x000000000720C000-memory.dmp

      Filesize

      240KB

    • memory/4008-194-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-223-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-203-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-205-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-207-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-209-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-211-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-213-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-215-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-199-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-217-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-201-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-219-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-463-0x0000000002D10000-0x0000000002D56000-memory.dmp

      Filesize

      280KB

    • memory/4008-464-0x0000000007220000-0x0000000007230000-memory.dmp

      Filesize

      64KB

    • memory/4008-221-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-989-0x0000000009D60000-0x000000000A378000-memory.dmp

      Filesize

      6.1MB

    • memory/4008-990-0x00000000071A0000-0x00000000071B2000-memory.dmp

      Filesize

      72KB

    • memory/4008-991-0x000000000A380000-0x000000000A48A000-memory.dmp

      Filesize

      1.0MB

    • memory/4008-197-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-195-0x0000000004B50000-0x0000000004B85000-memory.dmp

      Filesize

      212KB

    • memory/4008-995-0x0000000007220000-0x0000000007230000-memory.dmp

      Filesize

      64KB

    • memory/4008-996-0x0000000007220000-0x0000000007230000-memory.dmp

      Filesize

      64KB

    • memory/4008-997-0x0000000007220000-0x0000000007230000-memory.dmp

      Filesize

      64KB

    • memory/4008-998-0x0000000007220000-0x0000000007230000-memory.dmp

      Filesize

      64KB