Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe
Resource
win10v2004-20230220-en
General
-
Target
64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe
-
Size
786KB
-
MD5
2591b97006a4d36ccb4d41d6155a8123
-
SHA1
fc7788662f6dc626331181e882e94cc2f02503be
-
SHA256
64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c
-
SHA512
a68e40428b63919c271defb9d68aa8e20d978e4201450affd4d9e3c481b621ce3c145121521c0859e4e475783cf043c8c95ba8817dc56bab7e0730762b8880dd
-
SSDEEP
12288:Ey90O50uuGlnG9oQsFXcI5ZJSyaskAQ1vD6/ss+isd5INfQ6KJX4g2j7cJA00:Eyj5j/2VuMIwX1M/cbQfQ6kX4g2s200
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2728-2322-0x0000000005420000-0x0000000005A38000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m52447443.exe -
Executes dropped EXE 4 IoCs
pid Process 2296 x12291274.exe 1416 m52447443.exe 2728 1.exe 820 n12813856.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x12291274.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x12291274.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1416 m52447443.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 644 wrote to memory of 2296 644 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe 84 PID 644 wrote to memory of 2296 644 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe 84 PID 644 wrote to memory of 2296 644 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe 84 PID 2296 wrote to memory of 1416 2296 x12291274.exe 85 PID 2296 wrote to memory of 1416 2296 x12291274.exe 85 PID 2296 wrote to memory of 1416 2296 x12291274.exe 85 PID 1416 wrote to memory of 2728 1416 m52447443.exe 92 PID 1416 wrote to memory of 2728 1416 m52447443.exe 92 PID 1416 wrote to memory of 2728 1416 m52447443.exe 92 PID 2296 wrote to memory of 820 2296 x12291274.exe 93 PID 2296 wrote to memory of 820 2296 x12291274.exe 93 PID 2296 wrote to memory of 820 2296 x12291274.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe"C:\Users\Admin\AppData\Local\Temp\64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x12291274.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x12291274.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m52447443.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m52447443.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n12813856.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n12813856.exe3⤵
- Executes dropped EXE
PID:820
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581KB
MD51d720734770f1e83d45e0f895afa041d
SHA10b18a8646e16211d48824cf6846ee3970695339b
SHA256f0305bf1751927a472e7af5b02f9fc5f82afbe989344ae0ed8e82384915a2228
SHA512898c715c7ec1bacaa67b632355670da775e2aa96225469db25c1ca18c1bbe136eabaaca1b7656e56b72234bcd2b0e5af0e389111b730c19d4b7c576415b8eea1
-
Filesize
581KB
MD51d720734770f1e83d45e0f895afa041d
SHA10b18a8646e16211d48824cf6846ee3970695339b
SHA256f0305bf1751927a472e7af5b02f9fc5f82afbe989344ae0ed8e82384915a2228
SHA512898c715c7ec1bacaa67b632355670da775e2aa96225469db25c1ca18c1bbe136eabaaca1b7656e56b72234bcd2b0e5af0e389111b730c19d4b7c576415b8eea1
-
Filesize
582KB
MD5d66173273a51f7657b9e9ea96140832f
SHA1d28f3a29bd54005a8f06a1b90986a6ac246ea84b
SHA25635496b1ad783fd4c8bbc2780c2c99fa3e753d589fa8cbcba9e439b961fc76b9c
SHA512663998609c2d2c5eb0358353aea944d912e2c09ac0275240987eee58b22afdd27ce1b3917cda4e24288d7f8bce17af21aa00f9e09fb069e49485e350fe8d9d4b
-
Filesize
582KB
MD5d66173273a51f7657b9e9ea96140832f
SHA1d28f3a29bd54005a8f06a1b90986a6ac246ea84b
SHA25635496b1ad783fd4c8bbc2780c2c99fa3e753d589fa8cbcba9e439b961fc76b9c
SHA512663998609c2d2c5eb0358353aea944d912e2c09ac0275240987eee58b22afdd27ce1b3917cda4e24288d7f8bce17af21aa00f9e09fb069e49485e350fe8d9d4b
-
Filesize
171KB
MD5d66996a22e799b2e867db2788a551962
SHA1d4905d5e9876634187183263850a4c8f66132bc2
SHA256740417a377b57c98e1f711d8d093548135994b0d22077f162e1e4ff658f30d5a
SHA51275d118adce45d37eac6a73b54c8cfd663df5e5809485e6bad6af189381736c8fed79a906f2a55c7f1623732e838b6384d7a3d91ba609e02502edb7c442897b85
-
Filesize
171KB
MD5d66996a22e799b2e867db2788a551962
SHA1d4905d5e9876634187183263850a4c8f66132bc2
SHA256740417a377b57c98e1f711d8d093548135994b0d22077f162e1e4ff658f30d5a
SHA51275d118adce45d37eac6a73b54c8cfd663df5e5809485e6bad6af189381736c8fed79a906f2a55c7f1623732e838b6384d7a3d91ba609e02502edb7c442897b85
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf