Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
c8cec3f5132b64facf2c62d4d8eaef0d907133d3f3e7b9920162acb6569ad513.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c8cec3f5132b64facf2c62d4d8eaef0d907133d3f3e7b9920162acb6569ad513.exe
Resource
win10v2004-20230220-en
General
-
Target
c8cec3f5132b64facf2c62d4d8eaef0d907133d3f3e7b9920162acb6569ad513.exe
-
Size
746KB
-
MD5
7d915bebb5bdcf752fbe9e7ed2c31bca
-
SHA1
983823832a72314c48ccebfa2ffe39fddf886bff
-
SHA256
c8cec3f5132b64facf2c62d4d8eaef0d907133d3f3e7b9920162acb6569ad513
-
SHA512
c7f0a89fe7916d120b6ea5e4175886be284b9bf83c03cd4318fed12bc2c06013176c26f66028bd43005f555ef099ef3823c829578093ed033edd015cbb5e22c4
-
SSDEEP
12288:6y90/Uw0r175e+zU6dSXsJpNf/3q2ha6YY9saBtXXdAfeBjNUIdQFVHU:6yiyt8R6dEsXR/Fhar6XXz3Jd2V0
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1788-995-0x0000000007950000-0x0000000007F68000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 63395101.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 63395101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 63395101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 63395101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 63395101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 63395101.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4040 un041791.exe 2684 63395101.exe 1788 rk411091.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 63395101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 63395101.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c8cec3f5132b64facf2c62d4d8eaef0d907133d3f3e7b9920162acb6569ad513.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c8cec3f5132b64facf2c62d4d8eaef0d907133d3f3e7b9920162acb6569ad513.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un041791.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un041791.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3568 2684 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2684 63395101.exe 2684 63395101.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2684 63395101.exe Token: SeDebugPrivilege 1788 rk411091.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4040 4972 c8cec3f5132b64facf2c62d4d8eaef0d907133d3f3e7b9920162acb6569ad513.exe 83 PID 4972 wrote to memory of 4040 4972 c8cec3f5132b64facf2c62d4d8eaef0d907133d3f3e7b9920162acb6569ad513.exe 83 PID 4972 wrote to memory of 4040 4972 c8cec3f5132b64facf2c62d4d8eaef0d907133d3f3e7b9920162acb6569ad513.exe 83 PID 4040 wrote to memory of 2684 4040 un041791.exe 84 PID 4040 wrote to memory of 2684 4040 un041791.exe 84 PID 4040 wrote to memory of 2684 4040 un041791.exe 84 PID 4040 wrote to memory of 1788 4040 un041791.exe 88 PID 4040 wrote to memory of 1788 4040 un041791.exe 88 PID 4040 wrote to memory of 1788 4040 un041791.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8cec3f5132b64facf2c62d4d8eaef0d907133d3f3e7b9920162acb6569ad513.exe"C:\Users\Admin\AppData\Local\Temp\c8cec3f5132b64facf2c62d4d8eaef0d907133d3f3e7b9920162acb6569ad513.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041791.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041791.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\63395101.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\63395101.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 10804⤵
- Program crash
PID:3568
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk411091.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk411091.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2684 -ip 26841⤵PID:3128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD59b8ef05f0514b5ed91d56c2690556202
SHA1d7615845c53486253a0eb55f22838958119be034
SHA256fe9d75307228a8315250e843ed5726eaaa9804f8eeb06f82211c6010c6fe7a5c
SHA51267bf366edc8a8b7cef45cf6321ee4cd32e341de39497b9372f7a5644d26072830e41cbb554956340001b25a0dc78e365146e33896181dad8966ecde1bb13bcd0
-
Filesize
591KB
MD59b8ef05f0514b5ed91d56c2690556202
SHA1d7615845c53486253a0eb55f22838958119be034
SHA256fe9d75307228a8315250e843ed5726eaaa9804f8eeb06f82211c6010c6fe7a5c
SHA51267bf366edc8a8b7cef45cf6321ee4cd32e341de39497b9372f7a5644d26072830e41cbb554956340001b25a0dc78e365146e33896181dad8966ecde1bb13bcd0
-
Filesize
376KB
MD50b8107a6b4f7aa6da0d543638cbfa500
SHA1c3d3f6f428d6923145fe4954566c553de8b3d4df
SHA256428215387ee8682854d7d3a1c6e4d3bf932265323f96e785d79b62a7bf855256
SHA5122958e1461591a7fbf43eb36ca2a21f0bbc4856ddd1efcfe116c95d3ea9000a92b2d25d4072304c1d7444670a02a86718e96034d5bb6e49523a95b10330baf77c
-
Filesize
376KB
MD50b8107a6b4f7aa6da0d543638cbfa500
SHA1c3d3f6f428d6923145fe4954566c553de8b3d4df
SHA256428215387ee8682854d7d3a1c6e4d3bf932265323f96e785d79b62a7bf855256
SHA5122958e1461591a7fbf43eb36ca2a21f0bbc4856ddd1efcfe116c95d3ea9000a92b2d25d4072304c1d7444670a02a86718e96034d5bb6e49523a95b10330baf77c
-
Filesize
459KB
MD55f554997b25e2980631888985dc85bc0
SHA1f984e4ffad30065b9791057912b0668aee420469
SHA2560d7416191649431acf4d84269e049227e214a7ddd985e864973484aba1f5f708
SHA512ce1a6921b0f16f2686e86793c9e6f6648be688a743da2389f0ff4860102f8e397a67ab3bd79d4adf22a033f04cd9d962177ce4fbe90b9b2ce9aa24c88ebb3a63
-
Filesize
459KB
MD55f554997b25e2980631888985dc85bc0
SHA1f984e4ffad30065b9791057912b0668aee420469
SHA2560d7416191649431acf4d84269e049227e214a7ddd985e864973484aba1f5f708
SHA512ce1a6921b0f16f2686e86793c9e6f6648be688a743da2389f0ff4860102f8e397a67ab3bd79d4adf22a033f04cd9d962177ce4fbe90b9b2ce9aa24c88ebb3a63