Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe
Resource
win10v2004-20230220-en
General
-
Target
e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe
-
Size
746KB
-
MD5
1fee0f7b533ee66bd71dd39e41ebbb8e
-
SHA1
17f13bf225bf3d4fdfb1958c7ef904bd5885f222
-
SHA256
e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976
-
SHA512
d8d838c06b1afb71ecf0fbf83298a2f168e0c712294f21893786c67725d3035cff77be98552402c264bdd28e3005b14decef20dc5300cdb1ed66b1b3c7f86a83
-
SSDEEP
12288:6y90kxDahz4bgBvOci1Jex6PCd5A9R2392gBtFlseS8iA3WJp58amgL:6yTDadCgVO1wEPCd4IgAFlVIA3aRL
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3248-990-0x0000000007AC0000-0x00000000080D8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 26296634.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 680 un689605.exe 1492 26296634.exe 3248 rk383194.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 26296634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 26296634.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un689605.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un689605.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3320 1492 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1492 26296634.exe 1492 26296634.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1492 26296634.exe Token: SeDebugPrivilege 3248 rk383194.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2600 wrote to memory of 680 2600 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 82 PID 2600 wrote to memory of 680 2600 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 82 PID 2600 wrote to memory of 680 2600 e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe 82 PID 680 wrote to memory of 1492 680 un689605.exe 83 PID 680 wrote to memory of 1492 680 un689605.exe 83 PID 680 wrote to memory of 1492 680 un689605.exe 83 PID 680 wrote to memory of 3248 680 un689605.exe 89 PID 680 wrote to memory of 3248 680 un689605.exe 89 PID 680 wrote to memory of 3248 680 un689605.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe"C:\Users\Admin\AppData\Local\Temp\e2845e26341a96672d8f47f3cbdd4bf9b0e2267d11b58af9d5f8e17028127976.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un689605.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un689605.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26296634.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26296634.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 10804⤵
- Program crash
PID:3320
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk383194.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk383194.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1492 -ip 14921⤵PID:1648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD5d79970db0c3ead814c186f25abfd1c07
SHA14fa7f2efc0109ed7494a3366ffb675204050d1f6
SHA256daf17cf944892b581ac40838256b97f5b4ab6660d0badfa9d506a9b9ec4bce7b
SHA512531baddcf8d5de35234457dba45894adea97b5eb6e512954c83d6f6e05f0e49bc5f44189d5bf5aa9e8f5f282c608b2f22b2e0f1b96d224ab523312cb0ac6133f
-
Filesize
592KB
MD5d79970db0c3ead814c186f25abfd1c07
SHA14fa7f2efc0109ed7494a3366ffb675204050d1f6
SHA256daf17cf944892b581ac40838256b97f5b4ab6660d0badfa9d506a9b9ec4bce7b
SHA512531baddcf8d5de35234457dba45894adea97b5eb6e512954c83d6f6e05f0e49bc5f44189d5bf5aa9e8f5f282c608b2f22b2e0f1b96d224ab523312cb0ac6133f
-
Filesize
376KB
MD57415a74e50bfc4d36c408a42fcaa547d
SHA16c95028306f28241aef49b50afc1a8a1e3aa0bfb
SHA256a172dfbcb6bb3667b4cdbb204ca8f62b14282ca303375f9d9b2a40553859b915
SHA5120954b333e97a272d526faf094d9d866cfc304e9c4c1428d4d657972ccf4b9f06bb6019ac6a4e98e1aff0ed1371fce34e6686592b308962bb138101397d726dbb
-
Filesize
376KB
MD57415a74e50bfc4d36c408a42fcaa547d
SHA16c95028306f28241aef49b50afc1a8a1e3aa0bfb
SHA256a172dfbcb6bb3667b4cdbb204ca8f62b14282ca303375f9d9b2a40553859b915
SHA5120954b333e97a272d526faf094d9d866cfc304e9c4c1428d4d657972ccf4b9f06bb6019ac6a4e98e1aff0ed1371fce34e6686592b308962bb138101397d726dbb
-
Filesize
459KB
MD5481ae74b82b66cb52dbf531b6adea9c7
SHA19518b1c74bee8e6ad5f148aeb5e2f84c72f14eac
SHA256fe99680b977dacc4288a31871875b91d0e7dc9f7868b56531932eef964085d39
SHA512a1351e8f66ea4781dae990bd0903242910acdd376908c572f1045eba82b7c19cbe97c19dc73aecc7905c4f25891688a1d6885802ce875e3698a6e1ef0d4217ad
-
Filesize
459KB
MD5481ae74b82b66cb52dbf531b6adea9c7
SHA19518b1c74bee8e6ad5f148aeb5e2f84c72f14eac
SHA256fe99680b977dacc4288a31871875b91d0e7dc9f7868b56531932eef964085d39
SHA512a1351e8f66ea4781dae990bd0903242910acdd376908c572f1045eba82b7c19cbe97c19dc73aecc7905c4f25891688a1d6885802ce875e3698a6e1ef0d4217ad