Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
d0aa3df71a9943907e9ef016c47d2133690c60c0f8323518bd779c0802577cb9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d0aa3df71a9943907e9ef016c47d2133690c60c0f8323518bd779c0802577cb9.exe
Resource
win10v2004-20230220-en
General
-
Target
d0aa3df71a9943907e9ef016c47d2133690c60c0f8323518bd779c0802577cb9.exe
-
Size
697KB
-
MD5
c6cffa513a9f7eaab59a15c8595e276c
-
SHA1
952b4069097235d093c3f4a5f91735017bac7811
-
SHA256
d0aa3df71a9943907e9ef016c47d2133690c60c0f8323518bd779c0802577cb9
-
SHA512
b1e96465b65a79f482a69d58544cecd355aebc32903c9c6d0cc9c72050fad2208241e740d0049f238a50fb0572abf6d79f27fce6c33878d8f3634a25f26b599a
-
SSDEEP
12288:sy90jkqwaRC8pmGmnXQxywvAjeZjxz9Bm2cJNIE2V7tNHSWa1c6k:symsawTGmXQxyLAjM2uS/Rh8c6k
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3084-987-0x0000000009CC0000-0x000000000A2D8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 79626243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 79626243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 79626243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 79626243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 79626243.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 79626243.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1584 un855735.exe 2044 79626243.exe 3084 rk346782.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 79626243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 79626243.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d0aa3df71a9943907e9ef016c47d2133690c60c0f8323518bd779c0802577cb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d0aa3df71a9943907e9ef016c47d2133690c60c0f8323518bd779c0802577cb9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un855735.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un855735.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4564 2044 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2044 79626243.exe 2044 79626243.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2044 79626243.exe Token: SeDebugPrivilege 3084 rk346782.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3240 wrote to memory of 1584 3240 d0aa3df71a9943907e9ef016c47d2133690c60c0f8323518bd779c0802577cb9.exe 82 PID 3240 wrote to memory of 1584 3240 d0aa3df71a9943907e9ef016c47d2133690c60c0f8323518bd779c0802577cb9.exe 82 PID 3240 wrote to memory of 1584 3240 d0aa3df71a9943907e9ef016c47d2133690c60c0f8323518bd779c0802577cb9.exe 82 PID 1584 wrote to memory of 2044 1584 un855735.exe 83 PID 1584 wrote to memory of 2044 1584 un855735.exe 83 PID 1584 wrote to memory of 2044 1584 un855735.exe 83 PID 1584 wrote to memory of 3084 1584 un855735.exe 90 PID 1584 wrote to memory of 3084 1584 un855735.exe 90 PID 1584 wrote to memory of 3084 1584 un855735.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0aa3df71a9943907e9ef016c47d2133690c60c0f8323518bd779c0802577cb9.exe"C:\Users\Admin\AppData\Local\Temp\d0aa3df71a9943907e9ef016c47d2133690c60c0f8323518bd779c0802577cb9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855735.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855735.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79626243.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79626243.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 10804⤵
- Program crash
PID:4564
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk346782.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk346782.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2044 -ip 20441⤵PID:2480
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD5392265fa634ad111c20ce760b126c045
SHA1e83f0ea66f6f56b2fafb9d1bd6ba5c2de7843b9b
SHA256cdf0980b713c33a34fdbabe794727ffae99d8b9f35426342565f51c491bd2cbf
SHA512bc5b1ec2403768a0de3d321d9cc82abd3c80da7e74f6fd1a751c53f7415628c4194bcb613e7b60bc250401e76bd2ad779999cc3d6ce70b39cbc496af302ae178
-
Filesize
543KB
MD5392265fa634ad111c20ce760b126c045
SHA1e83f0ea66f6f56b2fafb9d1bd6ba5c2de7843b9b
SHA256cdf0980b713c33a34fdbabe794727ffae99d8b9f35426342565f51c491bd2cbf
SHA512bc5b1ec2403768a0de3d321d9cc82abd3c80da7e74f6fd1a751c53f7415628c4194bcb613e7b60bc250401e76bd2ad779999cc3d6ce70b39cbc496af302ae178
-
Filesize
263KB
MD5e0157c7e823d513fb8f8fa3b2a862770
SHA1b9ecdb2c518b226e1b4782cf2198f85d8f4a5b0b
SHA2566151f57b5c083b5ad37c4849040c48717ad157dddd2f6c31271a93e04c715b29
SHA5123b29bb1d73f26b3023f3cba453aad81f76218b5567e96439da0cdacce1193859ee048c07c2a4354194a07af0768b84fb12e0a8cdb7cb2d555f1ee28ffe7e165c
-
Filesize
263KB
MD5e0157c7e823d513fb8f8fa3b2a862770
SHA1b9ecdb2c518b226e1b4782cf2198f85d8f4a5b0b
SHA2566151f57b5c083b5ad37c4849040c48717ad157dddd2f6c31271a93e04c715b29
SHA5123b29bb1d73f26b3023f3cba453aad81f76218b5567e96439da0cdacce1193859ee048c07c2a4354194a07af0768b84fb12e0a8cdb7cb2d555f1ee28ffe7e165c
-
Filesize
328KB
MD5d3c887ffdd796175ae11f5c6eca49393
SHA16770ebf510b60b5ec1b43ce9e06b9a36cc0d20fa
SHA256d5248c945dd288f4df2e869df94201ab9ead97d3c8ffe6c4c78547b257556bbd
SHA512daeed55fa47002d6567d648259e0de42ad814a8a3ef068ec5a632165cffaebb77ee065c110c7ed118c5fa862b454099df9080391e0c37b298cbf26e3c19ba86a
-
Filesize
328KB
MD5d3c887ffdd796175ae11f5c6eca49393
SHA16770ebf510b60b5ec1b43ce9e06b9a36cc0d20fa
SHA256d5248c945dd288f4df2e869df94201ab9ead97d3c8ffe6c4c78547b257556bbd
SHA512daeed55fa47002d6567d648259e0de42ad814a8a3ef068ec5a632165cffaebb77ee065c110c7ed118c5fa862b454099df9080391e0c37b298cbf26e3c19ba86a