Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:35 UTC
Static task
static1
Behavioral task
behavioral1
Sample
42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe
Resource
win10v2004-20230220-en
General
-
Target
42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe
-
Size
479KB
-
MD5
8fa03ba8d6cf5b72d02080a57c6cd1e2
-
SHA1
f23aff55bd0b99dd493f8d94a8369aeda50d5515
-
SHA256
42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee
-
SHA512
cf64ceabf769f1949948a3f064a12eee30d158f421607befa3252e3ff187f673853556a2ab66b43e1c9f7a7860dfcf14551348c8c8925fb986d7cf61432e4a92
-
SSDEEP
6144:KRy+bnr+Ip0yN90QEnWrRQVPIF0+1YqkyJZlEYnzbPs5qJpjl9iobv6dp3yYWn3V:DMrky90QGVPIFrKPyJZbnzSUERpjv0
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3504-187-0x0000000007610000-0x0000000007C28000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0290891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0290891.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k0290891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0290891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0290891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0290891.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1956 y6844578.exe 1912 k0290891.exe 3504 l6355288.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0290891.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0290891.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6844578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6844578.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1912 k0290891.exe 1912 k0290891.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1912 k0290891.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4388 wrote to memory of 1956 4388 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe 83 PID 4388 wrote to memory of 1956 4388 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe 83 PID 4388 wrote to memory of 1956 4388 42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe 83 PID 1956 wrote to memory of 1912 1956 y6844578.exe 84 PID 1956 wrote to memory of 1912 1956 y6844578.exe 84 PID 1956 wrote to memory of 1912 1956 y6844578.exe 84 PID 1956 wrote to memory of 3504 1956 y6844578.exe 86 PID 1956 wrote to memory of 3504 1956 y6844578.exe 86 PID 1956 wrote to memory of 3504 1956 y6844578.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe"C:\Users\Admin\AppData\Local\Temp\42e697d8a6f6510a0ca0926b985d0a77f3ac53a8ba5f96c930cff8966d6391ee.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6844578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6844578.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0290891.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0290891.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6355288.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6355288.exe3⤵
- Executes dropped EXE
PID:3504
-
-
Network
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.36.159.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request84.150.43.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request4.b.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request76.38.195.152.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request45.8.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request160.145.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request141.145.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request14.103.197.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request177.17.30.184.in-addr.arpaIN PTRResponse177.17.30.184.in-addr.arpaIN PTRa184-30-17-177deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request139.238.32.23.in-addr.arpaIN PTRResponse139.238.32.23.in-addr.arpaIN PTRa23-32-238-139deploystaticakamaitechnologiescom
-
104 B 2
-
322 B 7
-
260 B 5
-
322 B 7
-
260 B 5
-
260 B 5
-
260 B 200 B 5 5
-
260 B 5
-
260 B 200 B 5 5
-
322 B 7
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 160 B 5 4
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
104 B 80 B 2 2
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
71 B 133 B 1 1
DNS Request
2.36.159.162.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
84.150.43.20.in-addr.arpa
-
118 B 204 B 1 1
DNS Request
4.b.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa
-
72 B 143 B 1 1
DNS Request
76.38.195.152.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
45.8.109.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
160.145.190.20.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
141.145.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
73.159.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.103.197.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
177.17.30.184.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
139.238.32.23.in-addr.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD571049c4bc5ab36dc073cf7d8ddfc7648
SHA160d686b93cedb076e2d275441bd4a0eec20853d5
SHA256a72842a24243d60b2cbf4bea83f8193b582f02e2f40f19b38bb79b81dfd13ef5
SHA5122a925f78d2209ad202146d6a5a12eca0d2917edb697805f9fb72a30e15f5e923defd6ed727cdf0efea6d93592d6ef3cfddce0c00d2d83c64bcf466faee3593a1
-
Filesize
308KB
MD571049c4bc5ab36dc073cf7d8ddfc7648
SHA160d686b93cedb076e2d275441bd4a0eec20853d5
SHA256a72842a24243d60b2cbf4bea83f8193b582f02e2f40f19b38bb79b81dfd13ef5
SHA5122a925f78d2209ad202146d6a5a12eca0d2917edb697805f9fb72a30e15f5e923defd6ed727cdf0efea6d93592d6ef3cfddce0c00d2d83c64bcf466faee3593a1
-
Filesize
176KB
MD5c84ba20ff49929fab6cd9b23e9e742a6
SHA1d1325e3b07eccf4a1a2acbf030341493586aa76f
SHA256ecc667cc08f5d444328e7fa1c04485dbbe79d553e85a12036b078c1319d0c3e7
SHA51262988e40787bf41b43fc82c90f715d79206cc98f6e6a0b2318fbecfc73b4b07004b8a40f9c31bab374a57dbcbd26654d6ed98498264d588ca029ad276cbdedba
-
Filesize
176KB
MD5c84ba20ff49929fab6cd9b23e9e742a6
SHA1d1325e3b07eccf4a1a2acbf030341493586aa76f
SHA256ecc667cc08f5d444328e7fa1c04485dbbe79d553e85a12036b078c1319d0c3e7
SHA51262988e40787bf41b43fc82c90f715d79206cc98f6e6a0b2318fbecfc73b4b07004b8a40f9c31bab374a57dbcbd26654d6ed98498264d588ca029ad276cbdedba
-
Filesize
136KB
MD59a5f3a1f4992096ff6972577177ec5b2
SHA134018bea2cca77008975b86b601280e753782280
SHA2562cece02c68cf8f7220d30614ffa7f4f8f30548511acd6bef8f4a4bbf1e6bf725
SHA512247ed5a518d67dbded2440a409c76320a45364662ed6ae3bab1810f1b56e8f901ef6bbceb33d05ded118f9e68841c096cfb06969f4f06bc88d8fd0fc1cb68ff9
-
Filesize
136KB
MD59a5f3a1f4992096ff6972577177ec5b2
SHA134018bea2cca77008975b86b601280e753782280
SHA2562cece02c68cf8f7220d30614ffa7f4f8f30548511acd6bef8f4a4bbf1e6bf725
SHA512247ed5a518d67dbded2440a409c76320a45364662ed6ae3bab1810f1b56e8f901ef6bbceb33d05ded118f9e68841c096cfb06969f4f06bc88d8fd0fc1cb68ff9