Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
244s -
max time network
271s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe
Resource
win10v2004-20230221-en
General
-
Target
bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe
-
Size
563KB
-
MD5
870aa86a43dbb23e56f31ff9f91bbba1
-
SHA1
5b2e84d06466d77bc2447600996dbb4a8440d4cb
-
SHA256
bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f
-
SHA512
cc6d2f062f4ee89e45ccab3058e80da34a3eca5aa9a5a47e369ed4caab570c8d1b61296a6fa971147ec64815f8cf92167d4bcd43b450841ccd656ff106ab713d
-
SSDEEP
12288:3y90jDej8qyV36VdOIIM7Vgmb6w0xcTolCIt7QV+CImv66q:3yhIqyVKa/wumgxcslvVHX
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1492-955-0x0000000009E10000-0x000000000A428000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 11515346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 11515346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 11515346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 11515346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 11515346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 11515346.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4844 st932756.exe 2588 11515346.exe 1492 kp744385.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 11515346.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st932756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st932756.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2588 11515346.exe 2588 11515346.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2588 11515346.exe Token: SeDebugPrivilege 1492 kp744385.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2076 wrote to memory of 4844 2076 bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe 80 PID 2076 wrote to memory of 4844 2076 bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe 80 PID 2076 wrote to memory of 4844 2076 bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe 80 PID 4844 wrote to memory of 2588 4844 st932756.exe 81 PID 4844 wrote to memory of 2588 4844 st932756.exe 81 PID 4844 wrote to memory of 1492 4844 st932756.exe 82 PID 4844 wrote to memory of 1492 4844 st932756.exe 82 PID 4844 wrote to memory of 1492 4844 st932756.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe"C:\Users\Admin\AppData\Local\Temp\bd0fe75fa6507e4ead0a8a91ab8e437b0e35584cde2f1ef35cf9af50739bbd6f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st932756.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st932756.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11515346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11515346.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp744385.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD57152e78bfa0906109303630d8a5ada60
SHA1c8bebfce660473bb5668105d138b442c066f91b9
SHA2565f8e27b265bea96f1f364bae8d9217a57694e5394fdb704e91b4ffcf1a017471
SHA51273eba88880ac839e10ddb3baa213b9a135ecd2e06af1d94d2c54db08109cb2a32ccdea00763ccac3b97cdcba5084983fa7a694ac2c3d1e591945cf3322d1e711
-
Filesize
408KB
MD57152e78bfa0906109303630d8a5ada60
SHA1c8bebfce660473bb5668105d138b442c066f91b9
SHA2565f8e27b265bea96f1f364bae8d9217a57694e5394fdb704e91b4ffcf1a017471
SHA51273eba88880ac839e10ddb3baa213b9a135ecd2e06af1d94d2c54db08109cb2a32ccdea00763ccac3b97cdcba5084983fa7a694ac2c3d1e591945cf3322d1e711
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD567a0a981e72175a44d5435a6c2eaac73
SHA1dcd9adfcd6cbca66f53988577dcbd141ac456043
SHA256020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040
SHA512e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc
-
Filesize
360KB
MD567a0a981e72175a44d5435a6c2eaac73
SHA1dcd9adfcd6cbca66f53988577dcbd141ac456043
SHA256020a53857bb0f3cf77539f5ecfc8dd820ba3642e92271c1900e724c9056a5040
SHA512e42bd9e68330ca0d32d91bd13bf24b37317ddedc97b0d6a291fb1a4da3079049b3afc70b4107423f494cb0801c5084604cf782e941ffb1f0338e275ed42a2cfc