Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
e88c37f1bb15fcbe857ee8c4d526153f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e88c37f1bb15fcbe857ee8c4d526153f.exe
Resource
win10v2004-20230220-en
General
-
Target
e88c37f1bb15fcbe857ee8c4d526153f.exe
-
Size
1.9MB
-
MD5
e88c37f1bb15fcbe857ee8c4d526153f
-
SHA1
c52537d8b02f5c9c9ea40f78a7e2c9f8dc78225b
-
SHA256
9fbc398697579871e9ed351b5874acacb8b435178b32ff6506a03e5738b2e75f
-
SHA512
8065ee3b4fd2130549f016c5accb5f8347812b2b0cf6cc97bf712e6b34d30d3dd893dbcf250db60bd0d17550e36462dce4d3ae33858007af2e19e7ad71e44164
-
SSDEEP
49152:IBJ/2XAf/cdSy4ihSiudHKWw7YYlMDFUjcgbeR:ywXI0c5icLKJEYlIFicWe
Malware Config
Extracted
redline
RED
79.137.202.0:81
-
auth_value
49e32ec54afd3f75dadad05dbf2e524f
Extracted
laplas
http://79.137.199.252
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4692-158-0x000000000B210000-0x000000000B828000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation e88c37f1bb15fcbe857ee8c4d526153f.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation e32Lke3.exe -
Executes dropped EXE 4 IoCs
pid Process 1120 cqb3grs.exe 1092 o02kvf1u.exe 3908 e32Lke3.exe 5340 svcservice.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" e32Lke3.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1120 set thread context of 4692 1120 cqb3grs.exe 88 PID 1092 set thread context of 1824 1092 o02kvf1u.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5072 1120 WerFault.exe 85 1544 1092 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2820 wrote to memory of 1120 2820 e88c37f1bb15fcbe857ee8c4d526153f.exe 85 PID 2820 wrote to memory of 1120 2820 e88c37f1bb15fcbe857ee8c4d526153f.exe 85 PID 2820 wrote to memory of 1120 2820 e88c37f1bb15fcbe857ee8c4d526153f.exe 85 PID 1120 wrote to memory of 4692 1120 cqb3grs.exe 88 PID 1120 wrote to memory of 4692 1120 cqb3grs.exe 88 PID 1120 wrote to memory of 4692 1120 cqb3grs.exe 88 PID 1120 wrote to memory of 4692 1120 cqb3grs.exe 88 PID 1120 wrote to memory of 4692 1120 cqb3grs.exe 88 PID 2820 wrote to memory of 1092 2820 e88c37f1bb15fcbe857ee8c4d526153f.exe 91 PID 2820 wrote to memory of 1092 2820 e88c37f1bb15fcbe857ee8c4d526153f.exe 91 PID 2820 wrote to memory of 1092 2820 e88c37f1bb15fcbe857ee8c4d526153f.exe 91 PID 1092 wrote to memory of 2260 1092 o02kvf1u.exe 96 PID 1092 wrote to memory of 2260 1092 o02kvf1u.exe 96 PID 1092 wrote to memory of 2260 1092 o02kvf1u.exe 96 PID 1092 wrote to memory of 1824 1092 o02kvf1u.exe 97 PID 1092 wrote to memory of 1824 1092 o02kvf1u.exe 97 PID 1092 wrote to memory of 1824 1092 o02kvf1u.exe 97 PID 1092 wrote to memory of 1824 1092 o02kvf1u.exe 97 PID 1092 wrote to memory of 1824 1092 o02kvf1u.exe 97 PID 2820 wrote to memory of 3908 2820 e88c37f1bb15fcbe857ee8c4d526153f.exe 102 PID 2820 wrote to memory of 3908 2820 e88c37f1bb15fcbe857ee8c4d526153f.exe 102 PID 2820 wrote to memory of 3908 2820 e88c37f1bb15fcbe857ee8c4d526153f.exe 102 PID 3908 wrote to memory of 5340 3908 e32Lke3.exe 105 PID 3908 wrote to memory of 5340 3908 e32Lke3.exe 105 PID 3908 wrote to memory of 5340 3908 e32Lke3.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"C:\Users\Admin\AppData\Local\Temp\e88c37f1bb15fcbe857ee8c4d526153f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\cqb3grs.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 1523⤵
- Program crash
PID:5072
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\o02kvf1u.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2260
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 1563⤵
- Program crash
PID:1544
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\e32Lke3.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"3⤵
- Executes dropped EXE
PID:5340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1120 -ip 11201⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1092 -ip 10921⤵PID:1192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.3MB
MD53681076e0468f402f6a12e9d586c24b1
SHA192d9039e76ad9166b00d38100994f86ad712818d
SHA256e6c6df931d2d1b58840c66475e55e659146cc677dd1a90adbbb160911169329f
SHA5125615fc46b28796034a2120a69113e5e18d94545b88370384ae0807090300b1c73a130a9e8e3ce8fe6f6e9148f6944a5f0fc0bccece84206b94b25be30cd73828
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
1.1MB
MD5a76d136239408f63bf5b2af3d4dffc0e
SHA17434e0882f2825ba265f69db57e1117a4375636a
SHA256c1d245ae8ca47c4e04608217d82fc94c1c77d10a81ab057f8c605dbfc24b8ccf
SHA512189c0e9ca5975ceaf36806020622ae3a77875039cf68c0c3aa2aa2f6e3fd8da1be559bfa1c6fb30538809d6220a00ffa000f9d17aa5f9d5f79199c1f90998dbe
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
3.6MB
MD59acf9c7921ee24285901751af52097b0
SHA10e6725a2fdc4e1f1bbf6a73f46393cbba4552e12
SHA25698c1105d2e0d9467d2cb9cbd3747b79d7471ecbc22a290653fddc8db3f49b04c
SHA5127f369214f16aca9dcd8c390ab729a1edaffe27f3fce6dc887df7bb39bc6f55ba938ea7c69f3f1dd739da00b899435a0e65750e5cd7cb0fb45272ad32d6e24792
-
Filesize
232.8MB
MD516303743319d448e79bc35e286f6f8fe
SHA13bdaac141e2c26e20ab9396ee4d8ecf216cdb138
SHA256d74581250aec4a720bf4d1ab1de4cff9178d56924a0ea0962d3b31d6b9f6cf87
SHA512a84f160106a41c9b7d90324e5738cda1f2ae6f0c335db0a33c56366ee3732345e57fde11dd2d2014dca4cf9c43e026df6ec3cbb9bae8d228b4acb10b03229808
-
Filesize
239.4MB
MD5469487ecbb03484802dd016d2830fa65
SHA1b06ecd645c66febf9718e37f8aab935b83ad3895
SHA256aa3fda536f24449197d37447fdd194039e1ce6ffbb59c99f5557467b64b84382
SHA512585ea8c2753e4189a1a2057bdf63d6808e2482ab612c6e5809fbd22e28c4e13ed85f33ef60b2a37a45813445ee23666b2b54255a7a80f37ef16bdbed29928f87