Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:03

General

  • Target

    58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe

  • Size

    752KB

  • MD5

    99ee8afa485537280607d20dbe139f07

  • SHA1

    e6e877476de2da086546655d6b06da1f2a3205ec

  • SHA256

    58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c

  • SHA512

    f0d6ac8eb367a96fc8dab00532a27251ffbbe48973714afbf2b0b11b9446550a524785f25d77a0ef65baf37c7691e3610d378674e8988f1d52c204c8e5118dd6

  • SSDEEP

    12288:ky90VBiOEoLrsPGyoXlyltkcS3Y/pZBxdlHFWJ6V+Zr:kymiO5LrsPAX0ltklo/vzfHuCSr

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe
    "C:\Users\Admin\AppData\Local\Temp\58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2176
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe

    Filesize

    598KB

    MD5

    3b660b062091c65f92e7a3f3088d203d

    SHA1

    7c1632312de2e76b12fa0232935486c68daf6804

    SHA256

    12095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea

    SHA512

    313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe

    Filesize

    598KB

    MD5

    3b660b062091c65f92e7a3f3088d203d

    SHA1

    7c1632312de2e76b12fa0232935486c68daf6804

    SHA256

    12095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea

    SHA512

    313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe

    Filesize

    390KB

    MD5

    5804d95dbe128f91f5f37bf89913ed0f

    SHA1

    90f3fe3948eeb0ca112ea4f31f2aabec64a02ea8

    SHA256

    eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69

    SHA512

    c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe

    Filesize

    390KB

    MD5

    5804d95dbe128f91f5f37bf89913ed0f

    SHA1

    90f3fe3948eeb0ca112ea4f31f2aabec64a02ea8

    SHA256

    eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69

    SHA512

    c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe

    Filesize

    473KB

    MD5

    a891d85065206f2d71f7df8d8ee5d3ff

    SHA1

    9b331a4675df72eb3f78bd59d20b6f8e2ce32161

    SHA256

    0330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e

    SHA512

    8e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe

    Filesize

    473KB

    MD5

    a891d85065206f2d71f7df8d8ee5d3ff

    SHA1

    9b331a4675df72eb3f78bd59d20b6f8e2ce32161

    SHA256

    0330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e

    SHA512

    8e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594

  • memory/2176-162-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-158-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-152-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-153-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-154-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-155-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-156-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-151-0x00000000008E0000-0x000000000090D000-memory.dmp

    Filesize

    180KB

  • memory/2176-160-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-150-0x0000000004FE0000-0x0000000005584000-memory.dmp

    Filesize

    5.6MB

  • memory/2176-164-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-166-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-168-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-170-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-172-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-174-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-176-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-178-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-180-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-182-0x0000000002760000-0x0000000002772000-memory.dmp

    Filesize

    72KB

  • memory/2176-184-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-185-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/2176-187-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/2176-149-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/2176-148-0x00000000008E0000-0x000000000090D000-memory.dmp

    Filesize

    180KB

  • memory/2372-222-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2372-227-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-988-0x00000000078B0000-0x0000000007EC8000-memory.dmp

    Filesize

    6.1MB

  • memory/2372-193-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-199-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-201-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-203-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-205-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-207-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-209-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-211-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-213-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-216-0x0000000002430000-0x0000000002476000-memory.dmp

    Filesize

    280KB

  • memory/2372-192-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-197-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-215-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-989-0x0000000007F70000-0x0000000007F82000-memory.dmp

    Filesize

    72KB

  • memory/2372-220-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-219-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2372-225-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-218-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2372-195-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-223-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/2372-990-0x0000000007F90000-0x000000000809A000-memory.dmp

    Filesize

    1.0MB

  • memory/2372-992-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/2372-991-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2372-994-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2372-995-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2372-996-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2372-997-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB