Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe
Resource
win10v2004-20230220-en
General
-
Target
58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe
-
Size
752KB
-
MD5
99ee8afa485537280607d20dbe139f07
-
SHA1
e6e877476de2da086546655d6b06da1f2a3205ec
-
SHA256
58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c
-
SHA512
f0d6ac8eb367a96fc8dab00532a27251ffbbe48973714afbf2b0b11b9446550a524785f25d77a0ef65baf37c7691e3610d378674e8988f1d52c204c8e5118dd6
-
SSDEEP
12288:ky90VBiOEoLrsPGyoXlyltkcS3Y/pZBxdlHFWJ6V+Zr:kymiO5LrsPAX0ltklo/vzfHuCSr
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2372-988-0x00000000078B0000-0x0000000007EC8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 77577788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 77577788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 77577788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 77577788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 77577788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 77577788.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3984 un104011.exe 2176 77577788.exe 2372 rk783733.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 77577788.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 77577788.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un104011.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un104011.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2176 77577788.exe 2176 77577788.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2176 77577788.exe Token: SeDebugPrivilege 2372 rk783733.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3984 1940 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe 85 PID 1940 wrote to memory of 3984 1940 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe 85 PID 1940 wrote to memory of 3984 1940 58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe 85 PID 3984 wrote to memory of 2176 3984 un104011.exe 86 PID 3984 wrote to memory of 2176 3984 un104011.exe 86 PID 3984 wrote to memory of 2176 3984 un104011.exe 86 PID 3984 wrote to memory of 2372 3984 un104011.exe 90 PID 3984 wrote to memory of 2372 3984 un104011.exe 90 PID 3984 wrote to memory of 2372 3984 un104011.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe"C:\Users\Admin\AppData\Local\Temp\58d62c948c70e31e781bccee4d73c2aec555970dba12b632385811c22ede739c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un104011.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77577788.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk783733.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD53b660b062091c65f92e7a3f3088d203d
SHA17c1632312de2e76b12fa0232935486c68daf6804
SHA25612095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea
SHA512313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc
-
Filesize
598KB
MD53b660b062091c65f92e7a3f3088d203d
SHA17c1632312de2e76b12fa0232935486c68daf6804
SHA25612095af73ea12641a302194f22e201127fa147f60c74ce66f07f87265f6663ea
SHA512313ba7143561c2d1eb87707aceb1282e5f0f08af354439759011b40d06c95c980df994f611052a24722242f4696acea530b5fd09ee88979a94bea9f62bab27dc
-
Filesize
390KB
MD55804d95dbe128f91f5f37bf89913ed0f
SHA190f3fe3948eeb0ca112ea4f31f2aabec64a02ea8
SHA256eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69
SHA512c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297
-
Filesize
390KB
MD55804d95dbe128f91f5f37bf89913ed0f
SHA190f3fe3948eeb0ca112ea4f31f2aabec64a02ea8
SHA256eed20595a049ed2ba4e120e8c86926f9240f2623e4416dcade1909dbee0c2a69
SHA512c5a9b2d6f4ad2530e6fd8f64474acd1b7ee4b0bf32f4dedc7e2cee1cb1101b1eecdd8e353f4eb3cc397a5876614ae7d21f49eade20bf3c10aa7e48b38edd7297
-
Filesize
473KB
MD5a891d85065206f2d71f7df8d8ee5d3ff
SHA19b331a4675df72eb3f78bd59d20b6f8e2ce32161
SHA2560330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e
SHA5128e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594
-
Filesize
473KB
MD5a891d85065206f2d71f7df8d8ee5d3ff
SHA19b331a4675df72eb3f78bd59d20b6f8e2ce32161
SHA2560330d1c7cc9c516cdbd99658c4e451a95a3c286dafaf29c89ac442c5e4500d7e
SHA5128e9bbd69e39bbd28fb93395e425245decc666f3f003cb527cb551267b8cb09f01d97d1bb4f4df0b83691cd3b91b961f55a6e231e55f0cce323968c450b27a594