Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
189s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
ec7a686159e289f0f98ee03e0b7f49848db08c10b2d4e73cf49f167edd05bb55.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ec7a686159e289f0f98ee03e0b7f49848db08c10b2d4e73cf49f167edd05bb55.exe
Resource
win10v2004-20230221-en
General
-
Target
ec7a686159e289f0f98ee03e0b7f49848db08c10b2d4e73cf49f167edd05bb55.exe
-
Size
611KB
-
MD5
39665c91d56245f43c44b64788d3c57f
-
SHA1
40ee81a54cb9e8ae01d74b53057709034c74ffb4
-
SHA256
ec7a686159e289f0f98ee03e0b7f49848db08c10b2d4e73cf49f167edd05bb55
-
SHA512
02f518caac544593b28d92e06148e034c6ffe8a4f4e51fe8777959b230b5286197837264c3de7a1f32c30d2ae36ff58a55de40c489184b948f2aa19249348c61
-
SSDEEP
12288:5y90iSJLlM0i7GusQwOmDFwq2s059ZCRzlG:5yZStlDiKypmDCC059oZ0
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4996-950-0x00000000079A0000-0x0000000007FB8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 91141793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 91141793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 91141793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 91141793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 91141793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 91141793.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3688 st365479.exe 4868 91141793.exe 4996 kp522292.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 91141793.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st365479.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ec7a686159e289f0f98ee03e0b7f49848db08c10b2d4e73cf49f167edd05bb55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ec7a686159e289f0f98ee03e0b7f49848db08c10b2d4e73cf49f167edd05bb55.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st365479.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4868 91141793.exe 4868 91141793.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4868 91141793.exe Token: SeDebugPrivilege 4996 kp522292.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3296 wrote to memory of 3688 3296 ec7a686159e289f0f98ee03e0b7f49848db08c10b2d4e73cf49f167edd05bb55.exe 76 PID 3296 wrote to memory of 3688 3296 ec7a686159e289f0f98ee03e0b7f49848db08c10b2d4e73cf49f167edd05bb55.exe 76 PID 3296 wrote to memory of 3688 3296 ec7a686159e289f0f98ee03e0b7f49848db08c10b2d4e73cf49f167edd05bb55.exe 76 PID 3688 wrote to memory of 4868 3688 st365479.exe 77 PID 3688 wrote to memory of 4868 3688 st365479.exe 77 PID 3688 wrote to memory of 4996 3688 st365479.exe 79 PID 3688 wrote to memory of 4996 3688 st365479.exe 79 PID 3688 wrote to memory of 4996 3688 st365479.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec7a686159e289f0f98ee03e0b7f49848db08c10b2d4e73cf49f167edd05bb55.exe"C:\Users\Admin\AppData\Local\Temp\ec7a686159e289f0f98ee03e0b7f49848db08c10b2d4e73cf49f167edd05bb55.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st365479.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st365479.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91141793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91141793.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp522292.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp522292.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD5bc717f08fbc555bf42c877d7d81c7122
SHA19fa765f7dc13f2e5921ff6b9b97ab98244f4f2b4
SHA2563031d10bc3ef17b0c591b40861bc79752ed9c58727fe6a7a5602694cf9081fed
SHA512176cbd582a2943070a4832a7918097bdede24633594812c2d409c8e221583d57658d052698f7072aa85e477240c6451c6517eb36974628dca2af3179bd166e6b
-
Filesize
458KB
MD5bc717f08fbc555bf42c877d7d81c7122
SHA19fa765f7dc13f2e5921ff6b9b97ab98244f4f2b4
SHA2563031d10bc3ef17b0c591b40861bc79752ed9c58727fe6a7a5602694cf9081fed
SHA512176cbd582a2943070a4832a7918097bdede24633594812c2d409c8e221583d57658d052698f7072aa85e477240c6451c6517eb36974628dca2af3179bd166e6b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD5ea76b7034912043effaab1a8c78dbaaf
SHA1eea3818fdf6d5d21899e8f5f652a2195017888c0
SHA2569ed2b2c022c41376ace4c0b975695028271ab772b34bda1cfca7f972a1df8673
SHA5127869c9f54105ecc19ab4783e9cee56b66357cd0a78ecb16627bb0e9db684ffa7b6096711ee89a30a47601148de726e03a8331e083845d7f174fab134793bd555
-
Filesize
459KB
MD5ea76b7034912043effaab1a8c78dbaaf
SHA1eea3818fdf6d5d21899e8f5f652a2195017888c0
SHA2569ed2b2c022c41376ace4c0b975695028271ab772b34bda1cfca7f972a1df8673
SHA5127869c9f54105ecc19ab4783e9cee56b66357cd0a78ecb16627bb0e9db684ffa7b6096711ee89a30a47601148de726e03a8331e083845d7f174fab134793bd555