Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
5c6f0628f176ed4b48066604aabf404cebb2750943d3e56dd5548a9a5dcb493a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5c6f0628f176ed4b48066604aabf404cebb2750943d3e56dd5548a9a5dcb493a.exe
Resource
win10v2004-20230220-en
General
-
Target
5c6f0628f176ed4b48066604aabf404cebb2750943d3e56dd5548a9a5dcb493a.exe
-
Size
479KB
-
MD5
f4cbc0adc6dac9c02101434fe9208dcd
-
SHA1
651338431eaa421a164ec448e56e694165667355
-
SHA256
5c6f0628f176ed4b48066604aabf404cebb2750943d3e56dd5548a9a5dcb493a
-
SHA512
6d6eafbe69e19b995f75eb0f3a412c6adaca8350ca4d8d67075a74cc48a67303be6cb77086c34b2d3da44fdced797784ecd6b9397d9eefca0c27412232e41dc3
-
SSDEEP
12288:OMrSy90aro2G7B+8FRa0n9DkUvgusoysnwFOhci:Iy16F+8FRaC9kkJ9wFg1
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1484-148-0x00000000077D0000-0x0000000007DE8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 2196 x6267625.exe 1484 g7244565.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5c6f0628f176ed4b48066604aabf404cebb2750943d3e56dd5548a9a5dcb493a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6267625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6267625.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5c6f0628f176ed4b48066604aabf404cebb2750943d3e56dd5548a9a5dcb493a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3420 wrote to memory of 2196 3420 5c6f0628f176ed4b48066604aabf404cebb2750943d3e56dd5548a9a5dcb493a.exe 83 PID 3420 wrote to memory of 2196 3420 5c6f0628f176ed4b48066604aabf404cebb2750943d3e56dd5548a9a5dcb493a.exe 83 PID 3420 wrote to memory of 2196 3420 5c6f0628f176ed4b48066604aabf404cebb2750943d3e56dd5548a9a5dcb493a.exe 83 PID 2196 wrote to memory of 1484 2196 x6267625.exe 84 PID 2196 wrote to memory of 1484 2196 x6267625.exe 84 PID 2196 wrote to memory of 1484 2196 x6267625.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c6f0628f176ed4b48066604aabf404cebb2750943d3e56dd5548a9a5dcb493a.exe"C:\Users\Admin\AppData\Local\Temp\5c6f0628f176ed4b48066604aabf404cebb2750943d3e56dd5548a9a5dcb493a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6267625.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6267625.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7244565.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7244565.exe3⤵
- Executes dropped EXE
PID:1484
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5e3a3cf86a4fe6e60a3f2a7a3eb42c0a6
SHA1ea1003e2d452f17165ffc57f7beff28a090d9672
SHA25647214080d942ad45da462eb66a04f4371191e7248b512fdd9a3e416db243e16c
SHA51264e7b9c1b8662038163b33b356fed9fdde806db7de4c865c67db89fe89560458c8e27d25c5065a5fb55209f166143916222730bf4bb9d057bc638c634bbe158e
-
Filesize
307KB
MD5e3a3cf86a4fe6e60a3f2a7a3eb42c0a6
SHA1ea1003e2d452f17165ffc57f7beff28a090d9672
SHA25647214080d942ad45da462eb66a04f4371191e7248b512fdd9a3e416db243e16c
SHA51264e7b9c1b8662038163b33b356fed9fdde806db7de4c865c67db89fe89560458c8e27d25c5065a5fb55209f166143916222730bf4bb9d057bc638c634bbe158e
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0