Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:26 UTC
Static task
static1
Behavioral task
behavioral1
Sample
3c3883533442009efd0c3dd708890c45e7538cc00e964ae0674a3087389c6082.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3c3883533442009efd0c3dd708890c45e7538cc00e964ae0674a3087389c6082.exe
Resource
win10v2004-20230220-en
General
-
Target
3c3883533442009efd0c3dd708890c45e7538cc00e964ae0674a3087389c6082.exe
-
Size
376KB
-
MD5
6e02fd05bbe0db74f83aeccbfe9e49e9
-
SHA1
76c1b4423f9bb38b9cc5cdb911abab3a7214871e
-
SHA256
3c3883533442009efd0c3dd708890c45e7538cc00e964ae0674a3087389c6082
-
SHA512
776514b8af35f6f36f6b09127d23bf9794703e123407ac8cab2887e1b94b45c880a363335dc8cba8af81bf4bc7d602f07e5ff659502508b1b8d840b3cd9d6ecf
-
SSDEEP
6144:KHy+bnr+6p0yN90QEsU6Iv1y+EsS2FYdKrVeAqdbTF1gL5amKT0Inljq:xMr6y90UILEs8KReAq1Fu4mDInljq
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1476-153-0x0000000008300000-0x0000000008918000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a9629893.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9629893.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9629893.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9629893.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9629893.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9629893.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1292 v2523044.exe 1172 a9629893.exe 1476 b3642225.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9629893.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3c3883533442009efd0c3dd708890c45e7538cc00e964ae0674a3087389c6082.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3c3883533442009efd0c3dd708890c45e7538cc00e964ae0674a3087389c6082.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2523044.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2523044.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1172 a9629893.exe 1172 a9629893.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1172 a9629893.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4044 wrote to memory of 1292 4044 3c3883533442009efd0c3dd708890c45e7538cc00e964ae0674a3087389c6082.exe 84 PID 4044 wrote to memory of 1292 4044 3c3883533442009efd0c3dd708890c45e7538cc00e964ae0674a3087389c6082.exe 84 PID 4044 wrote to memory of 1292 4044 3c3883533442009efd0c3dd708890c45e7538cc00e964ae0674a3087389c6082.exe 84 PID 1292 wrote to memory of 1172 1292 v2523044.exe 85 PID 1292 wrote to memory of 1172 1292 v2523044.exe 85 PID 1292 wrote to memory of 1476 1292 v2523044.exe 90 PID 1292 wrote to memory of 1476 1292 v2523044.exe 90 PID 1292 wrote to memory of 1476 1292 v2523044.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c3883533442009efd0c3dd708890c45e7538cc00e964ae0674a3087389c6082.exe"C:\Users\Admin\AppData\Local\Temp\3c3883533442009efd0c3dd708890c45e7538cc00e964ae0674a3087389c6082.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2523044.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2523044.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9629893.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9629893.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3642225.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3642225.exe3⤵
- Executes dropped EXE
PID:1476
-
-
Network
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request63.13.109.52.in-addr.arpaIN PTRResponse
-
322 B 7
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
322 B 7
-
322 B 7
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 5
-
322 B 7
-
260 B 5
-
260 B 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
104 B 2
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD531f894990c8f0349b444c5b68d6e1db2
SHA1e41bfb2067bc479ab3e43cc397ad0307c50010af
SHA2568f277a2f5c0ffd6bb5b1664f37802bcf15829a23c4b95b0869b369298ce86b80
SHA512eb31fe5b89aa8ece9cf387799a026cb6403801ec72a49d2196e8881f110d1f2c093752bb4cf57f585d092fcea5cbc65c986272eb6b3ecd72b2698928dc863213
-
Filesize
204KB
MD531f894990c8f0349b444c5b68d6e1db2
SHA1e41bfb2067bc479ab3e43cc397ad0307c50010af
SHA2568f277a2f5c0ffd6bb5b1664f37802bcf15829a23c4b95b0869b369298ce86b80
SHA512eb31fe5b89aa8ece9cf387799a026cb6403801ec72a49d2196e8881f110d1f2c093752bb4cf57f585d092fcea5cbc65c986272eb6b3ecd72b2698928dc863213
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284