Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    185s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 18:43

General

  • Target

    db456aaad0aa05c1f3003ce81c31d3d4f78fdbed7c497328f661e2874377e524.exe

  • Size

    618KB

  • MD5

    acbd86cf2e13d98e8bc317f7a5b8bea9

  • SHA1

    b29c7228cdee3a641a124bbad05033341505eaee

  • SHA256

    db456aaad0aa05c1f3003ce81c31d3d4f78fdbed7c497328f661e2874377e524

  • SHA512

    09cb930b4e75c1f24c76040e051989d954a95963a4e8a2c29a760226b0425ec2aa742a48dfb942c4d9b1e598d7de573de988e36d171a4a0f427ca78769346301

  • SSDEEP

    12288:Vy90QZe3X1Bpzq/mfNv+ySUbrjHQhsVY5d2FO55MWf7dZg5:VysH1BAulGyPrjwhsVY5d2iLZY

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db456aaad0aa05c1f3003ce81c31d3d4f78fdbed7c497328f661e2874377e524.exe
    "C:\Users\Admin\AppData\Local\Temp\db456aaad0aa05c1f3003ce81c31d3d4f78fdbed7c497328f661e2874377e524.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st410223.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st410223.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65941907.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65941907.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st410223.exe

    Filesize

    464KB

    MD5

    011d83776f4ce14b9ce22a29a9c92b66

    SHA1

    34c519e4676299df6f813f857caa3fd150a8e4af

    SHA256

    1062295f0f4e56089390c940d36c64c9a947c61fd0b857f7d17726f8dc55f208

    SHA512

    104e5360f0952e5bf9053c47c5aa53610e91c066d863cc3c6ffde34240ea1c7a5e1d2d2670019184b7f1182068b36ec7de1fe1ee0c016b4bb11c8cbcef67969b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st410223.exe

    Filesize

    464KB

    MD5

    011d83776f4ce14b9ce22a29a9c92b66

    SHA1

    34c519e4676299df6f813f857caa3fd150a8e4af

    SHA256

    1062295f0f4e56089390c940d36c64c9a947c61fd0b857f7d17726f8dc55f208

    SHA512

    104e5360f0952e5bf9053c47c5aa53610e91c066d863cc3c6ffde34240ea1c7a5e1d2d2670019184b7f1182068b36ec7de1fe1ee0c016b4bb11c8cbcef67969b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65941907.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65941907.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe

    Filesize

    478KB

    MD5

    4d6c549d0fa47803ffb7a05850de5eb4

    SHA1

    21f7938d8ed065c5e61aa43dcc9f82d75ad75543

    SHA256

    656aa2370de70781f0bd917b0ca38372f3d686ece33b7731378badc09502984c

    SHA512

    4d0526032bb32364f802892d84ea69de73ba3fcae55a87a5774f48008750f303628a9a1093142732a8b1fab756155bf5f5e0186b29ebf225bd180e00178ca8f3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp455139.exe

    Filesize

    478KB

    MD5

    4d6c549d0fa47803ffb7a05850de5eb4

    SHA1

    21f7938d8ed065c5e61aa43dcc9f82d75ad75543

    SHA256

    656aa2370de70781f0bd917b0ca38372f3d686ece33b7731378badc09502984c

    SHA512

    4d0526032bb32364f802892d84ea69de73ba3fcae55a87a5774f48008750f303628a9a1093142732a8b1fab756155bf5f5e0186b29ebf225bd180e00178ca8f3

  • memory/4080-153-0x00000000009B0000-0x00000000009F6000-memory.dmp

    Filesize

    280KB

  • memory/4080-154-0x0000000000400000-0x000000000081C000-memory.dmp

    Filesize

    4.1MB

  • memory/4080-155-0x00000000009B0000-0x00000000009F6000-memory.dmp

    Filesize

    280KB

  • memory/4080-156-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4080-157-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4080-158-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4080-159-0x0000000004EC0000-0x0000000005464000-memory.dmp

    Filesize

    5.6MB

  • memory/4080-161-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-162-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-164-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-166-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-168-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-170-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-172-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-174-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-176-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-178-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-180-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-182-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-184-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-186-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-188-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-190-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-192-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-194-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-196-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-198-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-200-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-202-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-204-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-206-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-208-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-210-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-212-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-214-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-216-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-218-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-220-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-222-0x0000000002990000-0x00000000029C5000-memory.dmp

    Filesize

    212KB

  • memory/4080-816-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4080-820-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4080-817-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4080-956-0x00000000078F0000-0x0000000007F08000-memory.dmp

    Filesize

    6.1MB

  • memory/4080-957-0x0000000007F70000-0x0000000007F82000-memory.dmp

    Filesize

    72KB

  • memory/4080-958-0x0000000007F90000-0x000000000809A000-memory.dmp

    Filesize

    1.0MB

  • memory/4080-959-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/4080-960-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4080-962-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/5024-147-0x0000000000060000-0x000000000006A000-memory.dmp

    Filesize

    40KB