Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe
Resource
win10v2004-20230220-en
General
-
Target
e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe
-
Size
747KB
-
MD5
30e510cf8927bd6359adff1cf5745d8f
-
SHA1
1fef501bb23e0b88a375b0ef064c7d60acab0066
-
SHA256
e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a
-
SHA512
f92a6bd90c28edea7cf5916be6f47779b80f4609e13332ddf97d23862170f660c0657fda52cd2b0ccc3e998ada5f2b0176cbacd167f2cb4e1e3b237ef68220a0
-
SSDEEP
12288:oy90YU612b+HDoEr+UvxJzm5E4paUgzcaXClat7I5bE4w52vok+:oy+612bE8ErhINpMzcaXCsR2bEZn5
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4968-991-0x0000000007930000-0x0000000007F48000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 14404042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 14404042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 14404042.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 14404042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 14404042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 14404042.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4476 un904449.exe 4744 14404042.exe 4968 rk738920.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 14404042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 14404042.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un904449.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un904449.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4744 14404042.exe 4744 14404042.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4744 14404042.exe Token: SeDebugPrivilege 4968 rk738920.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1304 wrote to memory of 4476 1304 e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe 84 PID 1304 wrote to memory of 4476 1304 e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe 84 PID 1304 wrote to memory of 4476 1304 e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe 84 PID 4476 wrote to memory of 4744 4476 un904449.exe 86 PID 4476 wrote to memory of 4744 4476 un904449.exe 86 PID 4476 wrote to memory of 4744 4476 un904449.exe 86 PID 4476 wrote to memory of 4968 4476 un904449.exe 87 PID 4476 wrote to memory of 4968 4476 un904449.exe 87 PID 4476 wrote to memory of 4968 4476 un904449.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe"C:\Users\Admin\AppData\Local\Temp\e6a4e7f0d85c167f28c00084c100d394769cd40aba6ebb30a05cff5b19eea25a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904449.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904449.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404042.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk738920.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD55e65eb208a869264ff6c450331946dd9
SHA1c25c4fc2c5eb3eeafa9522d255b74a11324f817f
SHA256b32c081be707c35df1bca880e938e789b22f96ea893c5e9917fe09be44cfcffb
SHA5128cb87b3eb8c46412cfa35ee36543804e95c69e7f52e98b1c246d3aa12861721c1eb08d8a5d7f4011c84aeb8fce02f84e6073dec54f5d6605dcf8e9c019698cca
-
Filesize
593KB
MD55e65eb208a869264ff6c450331946dd9
SHA1c25c4fc2c5eb3eeafa9522d255b74a11324f817f
SHA256b32c081be707c35df1bca880e938e789b22f96ea893c5e9917fe09be44cfcffb
SHA5128cb87b3eb8c46412cfa35ee36543804e95c69e7f52e98b1c246d3aa12861721c1eb08d8a5d7f4011c84aeb8fce02f84e6073dec54f5d6605dcf8e9c019698cca
-
Filesize
377KB
MD5bf9d9d5ab84e0367272b452cde92a639
SHA1b0fdca54ad78ec4c0046a32e55f66be41f07e681
SHA2569e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f
SHA5124b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399
-
Filesize
377KB
MD5bf9d9d5ab84e0367272b452cde92a639
SHA1b0fdca54ad78ec4c0046a32e55f66be41f07e681
SHA2569e65d1274577e4aaa99fd17b1510a3482b6a77d90d4f7934343c948a4172d46f
SHA5124b0c40f8f61ef077a39a53deefbf3afd9752c4e7a8536a5665ef3f7370b9801bb36106bbbe51c3ca5e61c9e0f0e4d329d6e130651de5b1cc0f158d07da9df399
-
Filesize
459KB
MD5c0301cc062dac5f03f5aff4e542ee00d
SHA1af73de1bae14d9b41748eef302cab5aad749438b
SHA25676b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118
SHA512f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3
-
Filesize
459KB
MD5c0301cc062dac5f03f5aff4e542ee00d
SHA1af73de1bae14d9b41748eef302cab5aad749438b
SHA25676b237154e1a3bab0f42aef13539d3e94e41a2c8fa04ee8d11e3a5fbaeef4118
SHA512f2baecb1a094d2269b48b78540b07b0ca336f3247c59d0b9853e2956ad79f1b193f6922f67228da8614fa3235885b4b74b1cd08fc2d4993e9ab89a5f997599d3