Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe
Resource
win10v2004-20230220-en
General
-
Target
636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe
-
Size
673KB
-
MD5
cbc430d7533eab35d40b4e11ebca0304
-
SHA1
e4c7c47d0c66ef140adeb942138aeb81a8a6fc6a
-
SHA256
636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099
-
SHA512
1fd90c143d7ce12e9a97e21cfa87a7cb7bf12e89758d905bc66707c418e57758c8eb072b65be1e0a242fc36b901f6c96618d192969d422f6ea9d24f092657f4d
-
SSDEEP
12288:Ny90g92W4igxjLtJ29onJ4nZWuZkjmuR61axn/PWpXa4M:NyV25ntJKonaZLZyZUDan
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4804-982-0x0000000007510000-0x0000000007B28000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 37638471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 37638471.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 37638471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 37638471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 37638471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 37638471.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3852 st236034.exe 100 37638471.exe 4804 kp282789.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 37638471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 37638471.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st236034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st236034.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 100 37638471.exe 100 37638471.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 100 37638471.exe Token: SeDebugPrivilege 4804 kp282789.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4900 wrote to memory of 3852 4900 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe 81 PID 4900 wrote to memory of 3852 4900 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe 81 PID 4900 wrote to memory of 3852 4900 636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe 81 PID 3852 wrote to memory of 100 3852 st236034.exe 82 PID 3852 wrote to memory of 100 3852 st236034.exe 82 PID 3852 wrote to memory of 100 3852 st236034.exe 82 PID 3852 wrote to memory of 4804 3852 st236034.exe 85 PID 3852 wrote to memory of 4804 3852 st236034.exe 85 PID 3852 wrote to memory of 4804 3852 st236034.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe"C:\Users\Admin\AppData\Local\Temp\636c9768303beb0f3fa52b9b31b5edb581e6bebf224d9ca0b1fa888ec1ac1099.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st236034.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st236034.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37638471.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37638471.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:100
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp282789.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp282789.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5c319e8a010ac18b2f3baf0dd991d4ae0
SHA1ce891af164cee8ab6b9bb5e002cefd00685e73e0
SHA256b27e782988e4b72fc3e99ae11b68bc421acd299e6929d66fe475b7460633dbbd
SHA512b0248ec03f92bbc17eef61b11b9fd57b3944cf726aa4d8d11cb8156cb14526928116af01c17d983194a72c91fe37b15177334e17dfea5c71e41ab98d93a0f499
-
Filesize
520KB
MD5c319e8a010ac18b2f3baf0dd991d4ae0
SHA1ce891af164cee8ab6b9bb5e002cefd00685e73e0
SHA256b27e782988e4b72fc3e99ae11b68bc421acd299e6929d66fe475b7460633dbbd
SHA512b0248ec03f92bbc17eef61b11b9fd57b3944cf726aa4d8d11cb8156cb14526928116af01c17d983194a72c91fe37b15177334e17dfea5c71e41ab98d93a0f499
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
415KB
MD5ad869f737d67effd614cf4480a604a03
SHA19ed6b9e116c52c53ba92ae573f0ab7341f6ba143
SHA25683250be62ca36b912106a0fd469f9444b556a14acb6311e0bfddc732bd31cb01
SHA512b7c0edb037670d01592c6aa457dcdc0b88f296b5653a8267074b430f1bbe342879625f5cbb1bff342f4726c803eba5144b04e3091f87fb8013e38d086753e073
-
Filesize
415KB
MD5ad869f737d67effd614cf4480a604a03
SHA19ed6b9e116c52c53ba92ae573f0ab7341f6ba143
SHA25683250be62ca36b912106a0fd469f9444b556a14acb6311e0bfddc732bd31cb01
SHA512b7c0edb037670d01592c6aa457dcdc0b88f296b5653a8267074b430f1bbe342879625f5cbb1bff342f4726c803eba5144b04e3091f87fb8013e38d086753e073