Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:37

General

  • Target

    44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe

  • Size

    563KB

  • MD5

    020f975c44f8fe489ab00ab5f3c6935e

  • SHA1

    f5c9e3062fc92237d079d88ef27796b04f2cd2a6

  • SHA256

    44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2

  • SHA512

    776ec600b9692bbc5baf27d937a23f8adbfafef44db2914da307006a8375593fefcf8fcd7c814de67de742b6cc88e27b11721edd9cdef06c0448e4362288ceee

  • SSDEEP

    12288:Hy90P0rXsdmusM7DC5WoGo7w0lGF+pnHcnqL/oQrI07fM13sXGNNP:Hyq2cdbz7DC5GIIF8HrLgQ05L3

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe
    "C:\Users\Admin\AppData\Local\Temp\44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st636958.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st636958.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11974718.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11974718.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp626585.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp626585.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st636958.exe

    Filesize

    408KB

    MD5

    a4af458acee4fe87a69942df9a1a91c7

    SHA1

    4c9e2954c3b5767499c66a3a7cbe24438a560adb

    SHA256

    5c944cca3cd1e7641d5fde9ad791c4c45d1c456b5b974606dc4b01039a18dc3b

    SHA512

    0c5b398101f3e70b7afa32365f51a289a65f06168bec87e72545c29a158e16022f4ec82a30e434ead7dc89249be73ac2c814f3a67646bf5f448ea7e7974c8de6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st636958.exe

    Filesize

    408KB

    MD5

    a4af458acee4fe87a69942df9a1a91c7

    SHA1

    4c9e2954c3b5767499c66a3a7cbe24438a560adb

    SHA256

    5c944cca3cd1e7641d5fde9ad791c4c45d1c456b5b974606dc4b01039a18dc3b

    SHA512

    0c5b398101f3e70b7afa32365f51a289a65f06168bec87e72545c29a158e16022f4ec82a30e434ead7dc89249be73ac2c814f3a67646bf5f448ea7e7974c8de6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11974718.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11974718.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp626585.exe

    Filesize

    360KB

    MD5

    9a96ef9b19f307c7265f06305ce73c65

    SHA1

    c113694419b09817655d1eb078d8ba7ff669727c

    SHA256

    dcbfd05928f34ad6d453d7f636fb22a2416d6b5cd433250f16a0835a64d80a02

    SHA512

    c2bd3c93cc387d10677a58e45f105859706c9a5cb11cbd0a4e7d684ffd0f034af15f65eab141faad03a58111ee9c0ad8cecd0e4dd08d01005dc5878196433688

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp626585.exe

    Filesize

    360KB

    MD5

    9a96ef9b19f307c7265f06305ce73c65

    SHA1

    c113694419b09817655d1eb078d8ba7ff669727c

    SHA256

    dcbfd05928f34ad6d453d7f636fb22a2416d6b5cd433250f16a0835a64d80a02

    SHA512

    c2bd3c93cc387d10677a58e45f105859706c9a5cb11cbd0a4e7d684ffd0f034af15f65eab141faad03a58111ee9c0ad8cecd0e4dd08d01005dc5878196433688

  • memory/992-153-0x0000000002CF0000-0x0000000002D36000-memory.dmp

    Filesize

    280KB

  • memory/992-154-0x0000000007130000-0x00000000076D4000-memory.dmp

    Filesize

    5.6MB

  • memory/992-155-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-156-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-158-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-160-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-162-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-164-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-166-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-168-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-170-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-172-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-174-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-176-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-178-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-180-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-182-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-184-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/992-185-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-188-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-190-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-186-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/992-192-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-194-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-196-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-198-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-200-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-202-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-206-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-204-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-208-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-210-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-212-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-214-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-216-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-218-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-220-0x0000000007730000-0x0000000007765000-memory.dmp

    Filesize

    212KB

  • memory/992-949-0x0000000009C60000-0x000000000A278000-memory.dmp

    Filesize

    6.1MB

  • memory/992-950-0x000000000A320000-0x000000000A332000-memory.dmp

    Filesize

    72KB

  • memory/992-951-0x000000000A340000-0x000000000A44A000-memory.dmp

    Filesize

    1.0MB

  • memory/992-952-0x000000000A460000-0x000000000A49C000-memory.dmp

    Filesize

    240KB

  • memory/992-953-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/992-955-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/992-956-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/992-957-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/992-958-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/3872-147-0x0000000000C10000-0x0000000000C1A000-memory.dmp

    Filesize

    40KB