Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:57 UTC

General

  • Target

    543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe

  • Size

    690KB

  • MD5

    f0c7cd4460a3b7348cfdc30280f86d83

  • SHA1

    322bcd748f0d54ac2e17eb115ebd74d62b7d3f71

  • SHA256

    543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362

  • SHA512

    6493463afb574586411d80eda07a8ed0e99afc032c1477497fb175139617b894029a615f4f64408bec9bde1abbcb75ed6ec042de825623a977e6b7f6cd635989

  • SSDEEP

    12288:zy90z7fXrWmm6RlMIQDgXxMIcRIO/QxDTT8WNzOvfV0f:zyaXrWL6Rl4sNcsxDTTxNSCf

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe
    "C:\Users\Admin\AppData\Local\Temp\543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un404914.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un404914.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99460676.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99460676.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2288
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 1080
          4⤵
          • Program crash
          PID:1392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk643771.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk643771.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4088
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2288 -ip 2288
    1⤵
      PID:400

    Network

    • flag-us
      DNS
      240.232.18.117.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      240.232.18.117.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      32.101.122.92.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      32.101.122.92.in-addr.arpa
      IN PTR
      Response
      32.101.122.92.in-addr.arpa
      IN PTR
      a92-122-101-32deploystaticakamaitechnologiescom
    • flag-us
      DNS
      8.3.197.209.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.3.197.209.in-addr.arpa
      IN PTR
      Response
      8.3.197.209.in-addr.arpa
      IN PTR
      vip0x008map2sslhwcdnnet
    • flag-us
      DNS
      64.13.109.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      64.13.109.52.in-addr.arpa
      IN PTR
      Response
    • 20.189.173.5:443
      322 B
      7
    • 185.161.248.143:38452
      rk643771.exe
      260 B
      5
    • 8.238.178.254:80
      322 B
      7
    • 185.161.248.143:38452
      rk643771.exe
      260 B
      5
    • 117.18.237.29:80
      322 B
      7
    • 8.238.178.254:80
      322 B
      7
    • 173.223.113.164:443
      322 B
      7
    • 173.223.113.131:80
      322 B
      7
    • 204.79.197.203:80
      322 B
      7
    • 185.161.248.143:38452
      rk643771.exe
      260 B
      5
    • 185.161.248.143:38452
      rk643771.exe
      260 B
      5
    • 117.18.232.240:80
      46 B
      1
    • 185.161.248.143:38452
      rk643771.exe
      260 B
      5
    • 8.8.8.8:53
      240.232.18.117.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      240.232.18.117.in-addr.arpa

    • 8.8.8.8:53
      32.101.122.92.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      32.101.122.92.in-addr.arpa

    • 8.8.8.8:53
      8.3.197.209.in-addr.arpa
      dns
      70 B
      111 B
      1
      1

      DNS Request

      8.3.197.209.in-addr.arpa

    • 8.8.8.8:53
      64.13.109.52.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      64.13.109.52.in-addr.arpa

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un404914.exe

      Filesize

      536KB

      MD5

      1fac8401900d1073942473422a13ce73

      SHA1

      2107b2442619d14db6d9402287b1af87da89e4fb

      SHA256

      149b061432fb6ce4ad435e36826d9edbf42af2c10c6d9dd2ad3e917c0849acb6

      SHA512

      db61da7aad22360dd360a3a0bedc3c83fe18c01f0e4432d16bf4bebe7656053e1e3cb4ea5089650dcd18eddb765acf21290317fadcd825c8b28396ed73dee865

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un404914.exe

      Filesize

      536KB

      MD5

      1fac8401900d1073942473422a13ce73

      SHA1

      2107b2442619d14db6d9402287b1af87da89e4fb

      SHA256

      149b061432fb6ce4ad435e36826d9edbf42af2c10c6d9dd2ad3e917c0849acb6

      SHA512

      db61da7aad22360dd360a3a0bedc3c83fe18c01f0e4432d16bf4bebe7656053e1e3cb4ea5089650dcd18eddb765acf21290317fadcd825c8b28396ed73dee865

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99460676.exe

      Filesize

      259KB

      MD5

      f61893cc078c077e01b6d57875896e7b

      SHA1

      c1a978f44fc0a97dab5dfb857c3e30b5d8371827

      SHA256

      ec20e19320faf045b6e71036a8d7e9722ccb3bcc5ee64e0722e9eab22f14e1ad

      SHA512

      2be84ddef93d499e23588617c4267b1488ccb7bb8fde5c85869bef120c91b1051fe666c28df4b466abc5e37159ef9d6adf0f17bb67540d3a0c0d7c1b82480bea

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99460676.exe

      Filesize

      259KB

      MD5

      f61893cc078c077e01b6d57875896e7b

      SHA1

      c1a978f44fc0a97dab5dfb857c3e30b5d8371827

      SHA256

      ec20e19320faf045b6e71036a8d7e9722ccb3bcc5ee64e0722e9eab22f14e1ad

      SHA512

      2be84ddef93d499e23588617c4267b1488ccb7bb8fde5c85869bef120c91b1051fe666c28df4b466abc5e37159ef9d6adf0f17bb67540d3a0c0d7c1b82480bea

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk643771.exe

      Filesize

      342KB

      MD5

      54788af31813c06410ee6f6096fe8bcd

      SHA1

      2d65f80e18c7b645c64f8cad06195fba7e20b834

      SHA256

      a162e6edf7956289cda2bd07e1f15491beb15b7ef56c0f9bbae2ad5dd6200568

      SHA512

      9a0a49e97e870810c9e2df28b52677b331f28eda9251e532548f3e7cdf079d2e15f304df17a9222bb27da90d5b011227def60ad17d2a605270b8041c93a25a38

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk643771.exe

      Filesize

      342KB

      MD5

      54788af31813c06410ee6f6096fe8bcd

      SHA1

      2d65f80e18c7b645c64f8cad06195fba7e20b834

      SHA256

      a162e6edf7956289cda2bd07e1f15491beb15b7ef56c0f9bbae2ad5dd6200568

      SHA512

      9a0a49e97e870810c9e2df28b52677b331f28eda9251e532548f3e7cdf079d2e15f304df17a9222bb27da90d5b011227def60ad17d2a605270b8041c93a25a38

    • memory/2288-167-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-150-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-153-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-155-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-157-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-159-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-161-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-163-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-165-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-151-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-169-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-171-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-173-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-175-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-177-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-178-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-179-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-180-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-181-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/2288-182-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-183-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-184-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-186-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/2288-149-0x0000000004B80000-0x0000000005124000-memory.dmp

      Filesize

      5.6MB

    • memory/2288-148-0x0000000002090000-0x00000000020BD000-memory.dmp

      Filesize

      180KB

    • memory/4088-414-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-219-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-991-0x0000000007560000-0x0000000007B78000-memory.dmp

      Filesize

      6.1MB

    • memory/4088-193-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-199-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-201-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-203-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-205-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-207-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-209-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-211-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-213-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-215-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-192-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-197-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-223-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-217-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-411-0x0000000001F90000-0x0000000001FD6000-memory.dmp

      Filesize

      280KB

    • memory/4088-412-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-989-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-988-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-221-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-990-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-195-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-992-0x0000000007BC0000-0x0000000007BD2000-memory.dmp

      Filesize

      72KB

    • memory/4088-993-0x0000000007BE0000-0x0000000007CEA000-memory.dmp

      Filesize

      1.0MB

    • memory/4088-994-0x0000000007D40000-0x0000000007D7C000-memory.dmp

      Filesize

      240KB

    • memory/4088-996-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-998-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.