Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe
Resource
win10v2004-20230220-en
General
-
Target
f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe
-
Size
695KB
-
MD5
8980a9db3873b3dc19cb280771636d2c
-
SHA1
fe12c476cbac5048ee14d95fbbde435aa5cca59a
-
SHA256
f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc
-
SHA512
7c040129a03f22c0eff9b05aeab9368fa98c7fa6e11385cdb3d2a5ad64a678790c102faa7f78ef4d64ace54f5387659c799b164feae02d31af01a38b79ebb48a
-
SSDEEP
12288:ny90+3BuJmBGuO/sz/+tZ9COJq9Imxr8ZXLWT6rD18bAKdA+u3TCk:ny/uJRqz/+tXCVb6m6rD18bAuCCk
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2460-991-0x0000000009CD0000-0x000000000A2E8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 77251448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 77251448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 77251448.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 77251448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 77251448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 77251448.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4260 un982593.exe 3308 77251448.exe 2460 rk023796.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 77251448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 77251448.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un982593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un982593.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4708 3308 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3308 77251448.exe 3308 77251448.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3308 77251448.exe Token: SeDebugPrivilege 2460 rk023796.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1448 wrote to memory of 4260 1448 f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe 84 PID 1448 wrote to memory of 4260 1448 f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe 84 PID 1448 wrote to memory of 4260 1448 f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe 84 PID 4260 wrote to memory of 3308 4260 un982593.exe 85 PID 4260 wrote to memory of 3308 4260 un982593.exe 85 PID 4260 wrote to memory of 3308 4260 un982593.exe 85 PID 4260 wrote to memory of 2460 4260 un982593.exe 91 PID 4260 wrote to memory of 2460 4260 un982593.exe 91 PID 4260 wrote to memory of 2460 4260 un982593.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe"C:\Users\Admin\AppData\Local\Temp\f1b35a805ca57290655c7db8112f5ab9388eef8d2e7cfe8d4b9a5c6d411f63cc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un982593.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un982593.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77251448.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77251448.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 11044⤵
- Program crash
PID:4708
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk023796.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk023796.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3308 -ip 33081⤵PID:3492
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD5dc4e4d669ee667f9e50e7d383986e1b1
SHA16399d21ad94d2d3e97c4a98fa532ff5fca124071
SHA256535cdbc4879e81356d3c9e1d83b414c3f39e6c29a618a4cd2af99125f8f3879e
SHA51298e7d7820d9676b26762b7b51b1db5dbf9ac96e9186d801c010cade987ed391e191e80fb5aeab816b4310558c5c55557fb6c7b8688d3116efb9f4708ed669768
-
Filesize
541KB
MD5dc4e4d669ee667f9e50e7d383986e1b1
SHA16399d21ad94d2d3e97c4a98fa532ff5fca124071
SHA256535cdbc4879e81356d3c9e1d83b414c3f39e6c29a618a4cd2af99125f8f3879e
SHA51298e7d7820d9676b26762b7b51b1db5dbf9ac96e9186d801c010cade987ed391e191e80fb5aeab816b4310558c5c55557fb6c7b8688d3116efb9f4708ed669768
-
Filesize
258KB
MD5b582c4713bac7e1aaa73285697222f6e
SHA1753dfa5a18857b743aee7405c22f7b0987d23450
SHA2568228ec55b8360cc0895a320912c970155316ebfccc5fe4efb0647c69f507eb1d
SHA512a24ca97130602fd2cac94ae04e44af51aa3f538c12dc1528db200daf50f1c40b4fe883a6d4f7d8bfbae0505b8df43b396d72b2d4c0baebb43822776c3ec3cf65
-
Filesize
258KB
MD5b582c4713bac7e1aaa73285697222f6e
SHA1753dfa5a18857b743aee7405c22f7b0987d23450
SHA2568228ec55b8360cc0895a320912c970155316ebfccc5fe4efb0647c69f507eb1d
SHA512a24ca97130602fd2cac94ae04e44af51aa3f538c12dc1528db200daf50f1c40b4fe883a6d4f7d8bfbae0505b8df43b396d72b2d4c0baebb43822776c3ec3cf65
-
Filesize
340KB
MD56b2882ac5118675e8ea83cd62887c449
SHA1473b8579fd1f46e01d951b547790004fa718534a
SHA2569490d92fe152c6af45eee9569ad9cbd46b38127bc2670527bd72ca8a30a02e4b
SHA512961877dba91efe6c53d93f4df461b2dae7dd1caa575294610fea1b795c41cb61d750a31fd3327785b3231a20c66637ee9b5b83ec2c85d10e9800cb4b2b091ce4
-
Filesize
340KB
MD56b2882ac5118675e8ea83cd62887c449
SHA1473b8579fd1f46e01d951b547790004fa718534a
SHA2569490d92fe152c6af45eee9569ad9cbd46b38127bc2670527bd72ca8a30a02e4b
SHA512961877dba91efe6c53d93f4df461b2dae7dd1caa575294610fea1b795c41cb61d750a31fd3327785b3231a20c66637ee9b5b83ec2c85d10e9800cb4b2b091ce4