Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe
Resource
win10v2004-20230220-en
General
-
Target
3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe
-
Size
1.4MB
-
MD5
afd448d2adbd259e497e57a1178fbccd
-
SHA1
7e98d3512e36c195db6078c6f1012cbfe4ae2c59
-
SHA256
3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec
-
SHA512
3723d1c0fcf265636c5039e9d865e72ee39854b32bc2e3fd21cbc0e595583121ab24c50492c1d2173a828f40820f1e89b39d61a5f6810381850894a4f0cb7c05
-
SSDEEP
24576:Ey9rvA4PBSse5pE8xw/lxVlcT2nWulbelIyeSB77TfnSonuSdL5j1ScWH:Thvex2lxA0lW7/VuQj1S5
Malware Config
Extracted
redline
maxbi
185.161.248.73:4164
-
auth_value
6aa7dba884fe45693dfa04c91440daef
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1680-212-0x000000000AA60000-0x000000000B078000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a92405775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a92405775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a92405775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a92405775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a92405775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a92405775.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4276 i79842986.exe 2044 i07872435.exe 2244 i87130228.exe 2104 i10002623.exe 4020 a92405775.exe 1680 b18432150.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a92405775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a92405775.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i79842986.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i79842986.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i87130228.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i07872435.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i07872435.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i87130228.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i10002623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i10002623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4020 a92405775.exe 4020 a92405775.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4020 a92405775.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1964 wrote to memory of 4276 1964 3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe 84 PID 1964 wrote to memory of 4276 1964 3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe 84 PID 1964 wrote to memory of 4276 1964 3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe 84 PID 4276 wrote to memory of 2044 4276 i79842986.exe 85 PID 4276 wrote to memory of 2044 4276 i79842986.exe 85 PID 4276 wrote to memory of 2044 4276 i79842986.exe 85 PID 2044 wrote to memory of 2244 2044 i07872435.exe 86 PID 2044 wrote to memory of 2244 2044 i07872435.exe 86 PID 2044 wrote to memory of 2244 2044 i07872435.exe 86 PID 2244 wrote to memory of 2104 2244 i87130228.exe 87 PID 2244 wrote to memory of 2104 2244 i87130228.exe 87 PID 2244 wrote to memory of 2104 2244 i87130228.exe 87 PID 2104 wrote to memory of 4020 2104 i10002623.exe 88 PID 2104 wrote to memory of 4020 2104 i10002623.exe 88 PID 2104 wrote to memory of 4020 2104 i10002623.exe 88 PID 2104 wrote to memory of 1680 2104 i10002623.exe 96 PID 2104 wrote to memory of 1680 2104 i10002623.exe 96 PID 2104 wrote to memory of 1680 2104 i10002623.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe"C:\Users\Admin\AppData\Local\Temp\3bbd402d2d675fab413e9310c8719377ede054dfa8a21f3a394098a28ec874ec.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i79842986.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i79842986.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i07872435.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i07872435.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i87130228.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i87130228.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i10002623.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i10002623.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92405775.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a92405775.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b18432150.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b18432150.exe6⤵
- Executes dropped EXE
PID:1680
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD52358394257a6977f9f162d108faaffab
SHA1c1b1adaf5fbb8bfe0baad1205ff737a438c3d25d
SHA2568bc7e3f6beac9ac2136aef9fc29d1a59419d25fa4623375cc9f3762d817de7a0
SHA5121650e531c1e4628f9a34817049ec7fc8f5e8a5d1cd3bee98bce80621ea51c937508e086bc741a8b132a3f7c88224679b361bcbc4a5cdb0f31a6fa4334ad5d09f
-
Filesize
1.3MB
MD52358394257a6977f9f162d108faaffab
SHA1c1b1adaf5fbb8bfe0baad1205ff737a438c3d25d
SHA2568bc7e3f6beac9ac2136aef9fc29d1a59419d25fa4623375cc9f3762d817de7a0
SHA5121650e531c1e4628f9a34817049ec7fc8f5e8a5d1cd3bee98bce80621ea51c937508e086bc741a8b132a3f7c88224679b361bcbc4a5cdb0f31a6fa4334ad5d09f
-
Filesize
1.1MB
MD532e49ee897d4e41469f3269e4e20f8e5
SHA16990b3d6a9712a6cdcc0c9ce2d06ade8df129bcd
SHA25641ff106c9495c134b8cfa99a9fe3c0df9dd6c069e2979d734bbe7856cd62bb5f
SHA512cd8484326cc4fd45684e6119183af20705ae82ca13bc0574261402a18f4f74d08cbf78e0c2bc2a0472a20607defb8537a2951f5333da03b6acdb3f6509cbaeaa
-
Filesize
1.1MB
MD532e49ee897d4e41469f3269e4e20f8e5
SHA16990b3d6a9712a6cdcc0c9ce2d06ade8df129bcd
SHA25641ff106c9495c134b8cfa99a9fe3c0df9dd6c069e2979d734bbe7856cd62bb5f
SHA512cd8484326cc4fd45684e6119183af20705ae82ca13bc0574261402a18f4f74d08cbf78e0c2bc2a0472a20607defb8537a2951f5333da03b6acdb3f6509cbaeaa
-
Filesize
644KB
MD55ec16d6bb952d0ffbd7c0c42fb633fd8
SHA163fb781bcbe5dc91d8cb63a066f2b8ad8fcab1a3
SHA2567e85ccc19f83171de021b916590932e421a0c33a5b830166ffc24120af99d848
SHA51242456d21cf214fcaf81fb97e7f1e96ea2c54dacc462a7fe5baf3aeb64f4e627c7249496ba7c63ff7c53cdb72011243437f6880bfe345ec0e8aebd9fbc4760738
-
Filesize
644KB
MD55ec16d6bb952d0ffbd7c0c42fb633fd8
SHA163fb781bcbe5dc91d8cb63a066f2b8ad8fcab1a3
SHA2567e85ccc19f83171de021b916590932e421a0c33a5b830166ffc24120af99d848
SHA51242456d21cf214fcaf81fb97e7f1e96ea2c54dacc462a7fe5baf3aeb64f4e627c7249496ba7c63ff7c53cdb72011243437f6880bfe345ec0e8aebd9fbc4760738
-
Filesize
385KB
MD584b9335fba6769263b80c8eb90c95c00
SHA14cf4ea7d200e53ee731bf0757ae7efc3b253046e
SHA256541cecd2fe318b8102042fda4b8322d3308eb9ea417db33d74eb4cc06c85c0c1
SHA512341d752cad51a3203bda876e6b9dda231c023ce8e2f6c9fa650f57122c812fa1351df58c2a2c118ac14dce2a9788625c1cfb60a7071f19c033f06b1e1a1eec94
-
Filesize
385KB
MD584b9335fba6769263b80c8eb90c95c00
SHA14cf4ea7d200e53ee731bf0757ae7efc3b253046e
SHA256541cecd2fe318b8102042fda4b8322d3308eb9ea417db33d74eb4cc06c85c0c1
SHA512341d752cad51a3203bda876e6b9dda231c023ce8e2f6c9fa650f57122c812fa1351df58c2a2c118ac14dce2a9788625c1cfb60a7071f19c033f06b1e1a1eec94
-
Filesize
291KB
MD5ce27553a2a3454e82a427b2a8a7847b8
SHA1572ce8d9daf60ba37132dfef202a22bf1db391e0
SHA25697734c5b3a6cc99d4baaafd1ca3e844e27b35b5c2072b2dd2fc258b3504a5373
SHA512036a00e8a137b9d746573598d4b4d51fe9c5f835abe72af0992261fc96e7a6d575209f4daafdeb6910fffcf7ef85fc10a42957c3d5c25d76b55c5fb31b1fda37
-
Filesize
291KB
MD5ce27553a2a3454e82a427b2a8a7847b8
SHA1572ce8d9daf60ba37132dfef202a22bf1db391e0
SHA25697734c5b3a6cc99d4baaafd1ca3e844e27b35b5c2072b2dd2fc258b3504a5373
SHA512036a00e8a137b9d746573598d4b4d51fe9c5f835abe72af0992261fc96e7a6d575209f4daafdeb6910fffcf7ef85fc10a42957c3d5c25d76b55c5fb31b1fda37
-
Filesize
168KB
MD5df9334955bb2461c384e61f8f8d7a628
SHA18a277eeb18bf974fdd58c5e5825c6779fde6ae51
SHA256827f9a77b86cb4745363cfeb07be2d2ab04149536a4085324289b9de1011bb5e
SHA5120055f0fe6417ff86d1d1ccb4cf8af88e1c481b325366922d1829281d1d3b957a54efaafa12f6fd8249ed96e1985d50f44d9aca8600e9fc2bcb5deec40a28019c
-
Filesize
168KB
MD5df9334955bb2461c384e61f8f8d7a628
SHA18a277eeb18bf974fdd58c5e5825c6779fde6ae51
SHA256827f9a77b86cb4745363cfeb07be2d2ab04149536a4085324289b9de1011bb5e
SHA5120055f0fe6417ff86d1d1ccb4cf8af88e1c481b325366922d1829281d1d3b957a54efaafa12f6fd8249ed96e1985d50f44d9aca8600e9fc2bcb5deec40a28019c