Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
178s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe
Resource
win10v2004-20230220-en
General
-
Target
ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe
-
Size
610KB
-
MD5
7c5603106087dcc7cc3a368adc897c20
-
SHA1
9c920528dabef8f691c0d169b6a0b1447f339dde
-
SHA256
ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec
-
SHA512
ba3209ce52c721a412ac6bf04727f0563678c3d11cf31dd82366d8560984929e99811322e64732ba4d4af4651cd6cabd0a23be4694a4a5e30e5d288f18d64dce
-
SSDEEP
6144:emp0yN90QEzRMD7vd/frJe1Yq23hy/gKvXfSEnpVbZMGvGfs5iH9I5TJY2NV:Oy90nMfFrn3haXfSaNhGUid+q2D
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4476-956-0x00000000078B0000-0x0000000007EC8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 54220791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 54220791.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 54220791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 54220791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 54220791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 54220791.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2632 st072769.exe 1628 54220791.exe 4476 kp868639.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 54220791.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st072769.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st072769.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1628 54220791.exe 1628 54220791.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1628 54220791.exe Token: SeDebugPrivilege 4476 kp868639.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3680 wrote to memory of 2632 3680 ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe 83 PID 3680 wrote to memory of 2632 3680 ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe 83 PID 3680 wrote to memory of 2632 3680 ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe 83 PID 2632 wrote to memory of 1628 2632 st072769.exe 84 PID 2632 wrote to memory of 1628 2632 st072769.exe 84 PID 2632 wrote to memory of 4476 2632 st072769.exe 85 PID 2632 wrote to memory of 4476 2632 st072769.exe 85 PID 2632 wrote to memory of 4476 2632 st072769.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe"C:\Users\Admin\AppData\Local\Temp\ec71a5ccfa07bcfafc0ea42ba51247e72d23660929abf69f7f2fae789ac696ec.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st072769.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st072769.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\54220791.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\54220791.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp868639.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp868639.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD534706311479bb975b0c3abcb96cf0cbd
SHA1382a3a0cf72be87d860b3d10777eba0376e2ae9e
SHA2563492a8dc569691d340e4b373dee6797a4954c05d57ef2723a5b34bb217b4c49d
SHA512c133b97af694745abd08726d8210032c9bef3e85e25936b1e7c1fd37b791151ee15c21c9410180fdda2f65aab6304af8d889d5fcef4f4773a004c29ffa8b2bdf
-
Filesize
456KB
MD534706311479bb975b0c3abcb96cf0cbd
SHA1382a3a0cf72be87d860b3d10777eba0376e2ae9e
SHA2563492a8dc569691d340e4b373dee6797a4954c05d57ef2723a5b34bb217b4c49d
SHA512c133b97af694745abd08726d8210032c9bef3e85e25936b1e7c1fd37b791151ee15c21c9410180fdda2f65aab6304af8d889d5fcef4f4773a004c29ffa8b2bdf
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD577e9916cf8139c1761cf8155452dddf4
SHA1d69f9e4c1d9a4c9f1d7481a8735efc750c96b105
SHA256d9177fff8d55da7d67aa1f04016b36fbf2ca6cd7f76c14a3c8bd816b0b23039f
SHA51244e86f3d03d19f31c73688182c81f7ac09b23cc0180d56af8efea03de6eb96e0091cc597622c8ff75c93894f28be5d829fe752a17a6556c47cfb1db61262d570
-
Filesize
459KB
MD577e9916cf8139c1761cf8155452dddf4
SHA1d69f9e4c1d9a4c9f1d7481a8735efc750c96b105
SHA256d9177fff8d55da7d67aa1f04016b36fbf2ca6cd7f76c14a3c8bd816b0b23039f
SHA51244e86f3d03d19f31c73688182c81f7ac09b23cc0180d56af8efea03de6eb96e0091cc597622c8ff75c93894f28be5d829fe752a17a6556c47cfb1db61262d570