Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe
Resource
win10v2004-20230220-en
General
-
Target
44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe
-
Size
563KB
-
MD5
020f975c44f8fe489ab00ab5f3c6935e
-
SHA1
f5c9e3062fc92237d079d88ef27796b04f2cd2a6
-
SHA256
44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2
-
SHA512
776ec600b9692bbc5baf27d937a23f8adbfafef44db2914da307006a8375593fefcf8fcd7c814de67de742b6cc88e27b11721edd9cdef06c0448e4362288ceee
-
SSDEEP
12288:Hy90P0rXsdmusM7DC5WoGo7w0lGF+pnHcnqL/oQrI07fM13sXGNNP:Hyq2cdbz7DC5GIIF8HrLgQ05L3
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/992-949-0x0000000009C60000-0x000000000A278000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 11974718.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 11974718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 11974718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 11974718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 11974718.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 11974718.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2932 st636958.exe 3872 11974718.exe 992 kp626585.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 11974718.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st636958.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st636958.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3872 11974718.exe 3872 11974718.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3872 11974718.exe Token: SeDebugPrivilege 992 kp626585.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2932 2400 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe 86 PID 2400 wrote to memory of 2932 2400 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe 86 PID 2400 wrote to memory of 2932 2400 44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe 86 PID 2932 wrote to memory of 3872 2932 st636958.exe 87 PID 2932 wrote to memory of 3872 2932 st636958.exe 87 PID 2932 wrote to memory of 992 2932 st636958.exe 94 PID 2932 wrote to memory of 992 2932 st636958.exe 94 PID 2932 wrote to memory of 992 2932 st636958.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe"C:\Users\Admin\AppData\Local\Temp\44931694226938ac19e023a420efe97e12947c5731ce847917e294c2bb42e6a2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st636958.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st636958.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11974718.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11974718.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp626585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp626585.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5a4af458acee4fe87a69942df9a1a91c7
SHA14c9e2954c3b5767499c66a3a7cbe24438a560adb
SHA2565c944cca3cd1e7641d5fde9ad791c4c45d1c456b5b974606dc4b01039a18dc3b
SHA5120c5b398101f3e70b7afa32365f51a289a65f06168bec87e72545c29a158e16022f4ec82a30e434ead7dc89249be73ac2c814f3a67646bf5f448ea7e7974c8de6
-
Filesize
408KB
MD5a4af458acee4fe87a69942df9a1a91c7
SHA14c9e2954c3b5767499c66a3a7cbe24438a560adb
SHA2565c944cca3cd1e7641d5fde9ad791c4c45d1c456b5b974606dc4b01039a18dc3b
SHA5120c5b398101f3e70b7afa32365f51a289a65f06168bec87e72545c29a158e16022f4ec82a30e434ead7dc89249be73ac2c814f3a67646bf5f448ea7e7974c8de6
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD59a96ef9b19f307c7265f06305ce73c65
SHA1c113694419b09817655d1eb078d8ba7ff669727c
SHA256dcbfd05928f34ad6d453d7f636fb22a2416d6b5cd433250f16a0835a64d80a02
SHA512c2bd3c93cc387d10677a58e45f105859706c9a5cb11cbd0a4e7d684ffd0f034af15f65eab141faad03a58111ee9c0ad8cecd0e4dd08d01005dc5878196433688
-
Filesize
360KB
MD59a96ef9b19f307c7265f06305ce73c65
SHA1c113694419b09817655d1eb078d8ba7ff669727c
SHA256dcbfd05928f34ad6d453d7f636fb22a2416d6b5cd433250f16a0835a64d80a02
SHA512c2bd3c93cc387d10677a58e45f105859706c9a5cb11cbd0a4e7d684ffd0f034af15f65eab141faad03a58111ee9c0ad8cecd0e4dd08d01005dc5878196433688