Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
200s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe
Resource
win10v2004-20230220-en
General
-
Target
dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe
-
Size
479KB
-
MD5
12b434b14f0b99a862f43c64ace41124
-
SHA1
6e6a1d8470622c4f3a21dddfca13b27ffe9446ad
-
SHA256
dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d
-
SHA512
de361f943abd39064556536e46b6caa049388d24c21544934332a0b03614e0c255e6fb4ede163e5faa282f3b6eddb3040471a5e9354bf4a4a9009b993ebac2c9
-
SSDEEP
12288:pMr+y90LU+bWrT3zAE8aF01eMTzkVJWPVJ2:vyj+bA7z1W1eIzPVU
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2996-148-0x000000000B140000-0x000000000B758000-memory.dmp redline_stealer behavioral2/memory/2996-156-0x000000000B0B0000-0x000000000B116000-memory.dmp redline_stealer behavioral2/memory/2996-159-0x000000000BE40000-0x000000000C002000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l7430808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l7430808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l7430808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l7430808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l7430808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l7430808.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4948 y7851145.exe 2996 k8514684.exe 3168 l7430808.exe 1872 m6794171.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l7430808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l7430808.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7851145.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7851145.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2996 k8514684.exe 2996 k8514684.exe 3168 l7430808.exe 3168 l7430808.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2996 k8514684.exe Token: SeDebugPrivilege 3168 l7430808.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4696 wrote to memory of 4948 4696 dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe 80 PID 4696 wrote to memory of 4948 4696 dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe 80 PID 4696 wrote to memory of 4948 4696 dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe 80 PID 4948 wrote to memory of 2996 4948 y7851145.exe 81 PID 4948 wrote to memory of 2996 4948 y7851145.exe 81 PID 4948 wrote to memory of 2996 4948 y7851145.exe 81 PID 4948 wrote to memory of 3168 4948 y7851145.exe 88 PID 4948 wrote to memory of 3168 4948 y7851145.exe 88 PID 4948 wrote to memory of 3168 4948 y7851145.exe 88 PID 4696 wrote to memory of 1872 4696 dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe 89 PID 4696 wrote to memory of 1872 4696 dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe 89 PID 4696 wrote to memory of 1872 4696 dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe"C:\Users\Admin\AppData\Local\Temp\dff289a0a6c872d0b7fdc8abc1bae9663fa7d696dd77107f43bc4b6fb1fb3e9d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7851145.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7851145.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8514684.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8514684.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7430808.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7430808.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6794171.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6794171.exe2⤵
- Executes dropped EXE
PID:1872
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5bd41663dbbf09900d533b636379f56d1
SHA189a711ca27c50830cf79e899c18dd818bb45c5d3
SHA2561473d2ab814b935b94d8ad819187d85b53688ff57fd378988c17b0b3e9e067a4
SHA5120d9e1717a84404fdb33a40afa9a36a3cb076775586e4af86c697e30ecc08c3a2805984f98f24e428e34e838ffa2c3a30eb325e5c8f9335eac297ff9aac5e0df0
-
Filesize
206KB
MD5bd41663dbbf09900d533b636379f56d1
SHA189a711ca27c50830cf79e899c18dd818bb45c5d3
SHA2561473d2ab814b935b94d8ad819187d85b53688ff57fd378988c17b0b3e9e067a4
SHA5120d9e1717a84404fdb33a40afa9a36a3cb076775586e4af86c697e30ecc08c3a2805984f98f24e428e34e838ffa2c3a30eb325e5c8f9335eac297ff9aac5e0df0
-
Filesize
308KB
MD5f9833bbc24e5295d61c182a0c27993ea
SHA11647fc50fa34e0f0d78954d1bf718ed9ef068cea
SHA25615bb66e7c5ee1789a8bebf654ac71a54a5c35b9d52d014d2ec62db772225d13c
SHA512a1d9328056486a9648d59c3758ef72a26b21551e978568a1a28b1126827de0e6db5546aef58ffcc990f4073e9adb5168992063ec1c6833b73dc2187f91a04ebb
-
Filesize
308KB
MD5f9833bbc24e5295d61c182a0c27993ea
SHA11647fc50fa34e0f0d78954d1bf718ed9ef068cea
SHA25615bb66e7c5ee1789a8bebf654ac71a54a5c35b9d52d014d2ec62db772225d13c
SHA512a1d9328056486a9648d59c3758ef72a26b21551e978568a1a28b1126827de0e6db5546aef58ffcc990f4073e9adb5168992063ec1c6833b73dc2187f91a04ebb
-
Filesize
168KB
MD5504fe5975b85734ac7b93add4df3cbdb
SHA10e117336e8d428a7eae54ae6f14d4c7a64ab4bd0
SHA256bb1901df02c1ebe52e5997f2c090dcd85561942bb6afb178bd1ee3be0402a76e
SHA51262b53e680178293ddba056fd261daf4b7b8d7c73bd067a18c5c2e91c6f45b917335c7e2dee4e6aa6c7cd33ddce2aad30dc156ed627b3e64f0f063abf64a9eb51
-
Filesize
168KB
MD5504fe5975b85734ac7b93add4df3cbdb
SHA10e117336e8d428a7eae54ae6f14d4c7a64ab4bd0
SHA256bb1901df02c1ebe52e5997f2c090dcd85561942bb6afb178bd1ee3be0402a76e
SHA51262b53e680178293ddba056fd261daf4b7b8d7c73bd067a18c5c2e91c6f45b917335c7e2dee4e6aa6c7cd33ddce2aad30dc156ed627b3e64f0f063abf64a9eb51
-
Filesize
179KB
MD5831203a78cfd81b5ca43ed2b391bde19
SHA16abc13dac8e5f1458e85a0993e17d4753d3d43cc
SHA25611511d2b604a65ee7e779831645c88f8d7f0f999b7341a2dd78a4694383d333e
SHA512bf87832d91fd3a2e76f4c5cf24449d89a686041ff09819b7c4698a83a1698846ffb84550a1a4acc1051572e036f04afcc868a21556594a6c88ab4f62a71f7e84
-
Filesize
179KB
MD5831203a78cfd81b5ca43ed2b391bde19
SHA16abc13dac8e5f1458e85a0993e17d4753d3d43cc
SHA25611511d2b604a65ee7e779831645c88f8d7f0f999b7341a2dd78a4694383d333e
SHA512bf87832d91fd3a2e76f4c5cf24449d89a686041ff09819b7c4698a83a1698846ffb84550a1a4acc1051572e036f04afcc868a21556594a6c88ab4f62a71f7e84