Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe
Resource
win10v2004-20230220-en
General
-
Target
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe
-
Size
793KB
-
MD5
f8f30664ab748bcd3257c54ad9730d90
-
SHA1
48fb7a8650a8c78e8663aacb48b0dd2ec5c95b2b
-
SHA256
d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f
-
SHA512
4e677859813c2cbe2f20806e0796df70ed4d5767f1a02906903ad585a4402a9d887bf7ce0917c33c9ca9d16217fb178203890926a21c9006b5be18867a5d6cf1
-
SSDEEP
24576:7y8B4nQYkTwtnfRSHmLPOy8aoJGPJ+0TjE:u8inQYWwtfoQ+qg0Tj
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4964-2314-0x000000000B0D0000-0x000000000B6E8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation m41589402.exe -
Executes dropped EXE 4 IoCs
pid Process 4796 x74298284.exe 1632 m41589402.exe 4964 1.exe 4776 n35292321.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x74298284.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x74298284.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 312 1632 WerFault.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1632 m41589402.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4796 4852 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe 84 PID 4852 wrote to memory of 4796 4852 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe 84 PID 4852 wrote to memory of 4796 4852 d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe 84 PID 4796 wrote to memory of 1632 4796 x74298284.exe 85 PID 4796 wrote to memory of 1632 4796 x74298284.exe 85 PID 4796 wrote to memory of 1632 4796 x74298284.exe 85 PID 1632 wrote to memory of 4964 1632 m41589402.exe 86 PID 1632 wrote to memory of 4964 1632 m41589402.exe 86 PID 1632 wrote to memory of 4964 1632 m41589402.exe 86 PID 4796 wrote to memory of 4776 4796 x74298284.exe 89 PID 4796 wrote to memory of 4776 4796 x74298284.exe 89 PID 4796 wrote to memory of 4776 4796 x74298284.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe"C:\Users\Admin\AppData\Local\Temp\d03f5692832cbe230b03eeca20b5f9cec41949f95d93ff60ed94a614b8f8d31f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x74298284.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x74298284.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m41589402.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m41589402.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 13884⤵
- Program crash
PID:312
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n35292321.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n35292321.exe3⤵
- Executes dropped EXE
PID:4776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1632 -ip 16321⤵PID:3808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD5cb41c6e952481d4e96ba50bb3238801e
SHA13f17ec63a15c00d4817b1389125b2d2053c2214b
SHA2568f874483608cbefe8b0e4756d2910723da33f39e78517d5f836352de21b15f1d
SHA5125abcb76819f5ab2470c4d2541e2b6b1aacb4a36fc3f34fc07f905e8766415f76a09e4f3c0417955877834365a552f3d72c7a9c592376d2fd878d3bc9b1fed297
-
Filesize
589KB
MD5cb41c6e952481d4e96ba50bb3238801e
SHA13f17ec63a15c00d4817b1389125b2d2053c2214b
SHA2568f874483608cbefe8b0e4756d2910723da33f39e78517d5f836352de21b15f1d
SHA5125abcb76819f5ab2470c4d2541e2b6b1aacb4a36fc3f34fc07f905e8766415f76a09e4f3c0417955877834365a552f3d72c7a9c592376d2fd878d3bc9b1fed297
-
Filesize
530KB
MD5b6e710dc31b22a2ae7b95e608fbf0b49
SHA117c57aa64000101a6a07243dddcbfb7a40b6c7c7
SHA2562b5b193a586589d4859c51c7de90285fa7a2d67a41320815407b6728f6209c98
SHA512bf22415a119fe048976da31848885120ec8ff261aa2a9bec5783ff25a8a26d14985271771422dd4640f9860c1edace4504732238babfa54cc9cb71e149519988
-
Filesize
530KB
MD5b6e710dc31b22a2ae7b95e608fbf0b49
SHA117c57aa64000101a6a07243dddcbfb7a40b6c7c7
SHA2562b5b193a586589d4859c51c7de90285fa7a2d67a41320815407b6728f6209c98
SHA512bf22415a119fe048976da31848885120ec8ff261aa2a9bec5783ff25a8a26d14985271771422dd4640f9860c1edace4504732238babfa54cc9cb71e149519988
-
Filesize
168KB
MD5a26df3463c07ca67c9ce51514ab74df7
SHA1368aea0bbc1210a7fb03c26c10648755c99a575d
SHA2564a987ff1d80f70211010889f3969863eccd2804d2b32424eae5a6af4a6a1d866
SHA512dca64ac7921b256ff9aa81722378655e7f709c8a4d2669bf49ef56ba591b64c28aea5c5035cd6bea15d1e8715f0a91553b7f00078bdfbc584817ea283ee8c451
-
Filesize
168KB
MD5a26df3463c07ca67c9ce51514ab74df7
SHA1368aea0bbc1210a7fb03c26c10648755c99a575d
SHA2564a987ff1d80f70211010889f3969863eccd2804d2b32424eae5a6af4a6a1d866
SHA512dca64ac7921b256ff9aa81722378655e7f709c8a4d2669bf49ef56ba591b64c28aea5c5035cd6bea15d1e8715f0a91553b7f00078bdfbc584817ea283ee8c451
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf