Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe
Resource
win10v2004-20230220-en
General
-
Target
5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe
-
Size
1.4MB
-
MD5
8d90361e8bf7f26eec4a063c82eaa6cd
-
SHA1
a44abc8788bfaaac8ee0e8a6b70458471a8e5648
-
SHA256
5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab
-
SHA512
3d9406f3be98992338f264f08c27f396062cfd5376717da4e9d9efbfc1481f6d7c699ac9dbcd4ba792550ce5aad4b4c176520ccc43e485d3dc2b93e58a6a25ff
-
SSDEEP
24576:tyrFNdHyoabka1N0oVq38WevoGuLiWnbC5z+jUFp9WHk3/fpcBx5Qf:I5Ko30tQsToGuLiASzEwWHrBxO
Malware Config
Extracted
redline
mazda
217.196.96.56:4138
-
auth_value
3d2870537d84a4c6d7aeecd002871c51
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4352-213-0x000000000B270000-0x000000000B888000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9918398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9918398.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a9918398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9918398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9918398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9918398.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4376 v2651320.exe 3252 v6031072.exe 2708 v9779676.exe 2960 v0364664.exe 2176 a9918398.exe 4352 b3381039.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9918398.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9918398.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2651320.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6031072.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9779676.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0364664.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0364664.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2651320.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6031072.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9779676.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4892 2176 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2176 a9918398.exe 2176 a9918398.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2176 a9918398.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4376 5064 5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe 84 PID 5064 wrote to memory of 4376 5064 5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe 84 PID 5064 wrote to memory of 4376 5064 5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe 84 PID 4376 wrote to memory of 3252 4376 v2651320.exe 85 PID 4376 wrote to memory of 3252 4376 v2651320.exe 85 PID 4376 wrote to memory of 3252 4376 v2651320.exe 85 PID 3252 wrote to memory of 2708 3252 v6031072.exe 86 PID 3252 wrote to memory of 2708 3252 v6031072.exe 86 PID 3252 wrote to memory of 2708 3252 v6031072.exe 86 PID 2708 wrote to memory of 2960 2708 v9779676.exe 87 PID 2708 wrote to memory of 2960 2708 v9779676.exe 87 PID 2708 wrote to memory of 2960 2708 v9779676.exe 87 PID 2960 wrote to memory of 2176 2960 v0364664.exe 88 PID 2960 wrote to memory of 2176 2960 v0364664.exe 88 PID 2960 wrote to memory of 2176 2960 v0364664.exe 88 PID 2960 wrote to memory of 4352 2960 v0364664.exe 91 PID 2960 wrote to memory of 4352 2960 v0364664.exe 91 PID 2960 wrote to memory of 4352 2960 v0364664.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe"C:\Users\Admin\AppData\Local\Temp\5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2651320.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2651320.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6031072.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6031072.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9779676.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9779676.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0364664.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0364664.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9918398.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a9918398.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 10807⤵
- Program crash
PID:4892
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3381039.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3381039.exe6⤵
- Executes dropped EXE
PID:4352
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2176 -ip 21761⤵PID:4576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51b585d289ddffffe1f8ae853d8c3ea91
SHA134b2bdba1efdb64f4d4e3ecb1d5df6ea5cce2f96
SHA2563996025360ac7f775f7df2bcd96af6e526e3cfbd8804446fe5bdcbdaf59923b7
SHA51222a12dd4939f14a7e97149de1612fea1b1b9b2d995a09861c3927072b867687beb6374b3d4af6f3e84d544d00648f977e0130924eb97224674a592999f339915
-
Filesize
1.3MB
MD51b585d289ddffffe1f8ae853d8c3ea91
SHA134b2bdba1efdb64f4d4e3ecb1d5df6ea5cce2f96
SHA2563996025360ac7f775f7df2bcd96af6e526e3cfbd8804446fe5bdcbdaf59923b7
SHA51222a12dd4939f14a7e97149de1612fea1b1b9b2d995a09861c3927072b867687beb6374b3d4af6f3e84d544d00648f977e0130924eb97224674a592999f339915
-
Filesize
846KB
MD50825e601bad32acf49f85674f1f6bbaf
SHA1c449440ce33948b8c9a8be3cfb848f8c22acdd13
SHA256d3bcd1710979a32b3bccfcd32f77c2acc8775189e5754a34cf23c6e062cc84aa
SHA512ff72ad23b0a2904951ee5a824b6de3fb6067063d5bd1353190d4e5665fd27db004cc77a5f44528338b4ca4c2cc7a43895d0df34d689001d49044a6d28000bf77
-
Filesize
846KB
MD50825e601bad32acf49f85674f1f6bbaf
SHA1c449440ce33948b8c9a8be3cfb848f8c22acdd13
SHA256d3bcd1710979a32b3bccfcd32f77c2acc8775189e5754a34cf23c6e062cc84aa
SHA512ff72ad23b0a2904951ee5a824b6de3fb6067063d5bd1353190d4e5665fd27db004cc77a5f44528338b4ca4c2cc7a43895d0df34d689001d49044a6d28000bf77
-
Filesize
642KB
MD503a628bce13a7a6f73b78cb27748c83e
SHA13d36b5043c005536607692cc3af271a95dc354f2
SHA2568e29739d0db64de82f2c1386f8ba689ab31a3b0c457102386884ac03967741c3
SHA51226264798a9a32453c10acdc1f4941bcc795a18142ba8a71566c4bd7d3707dd6d403be2e8ac7b8f9f3ea372847ad3844b84bbf20b8a14f88968bd92d6bd51e344
-
Filesize
642KB
MD503a628bce13a7a6f73b78cb27748c83e
SHA13d36b5043c005536607692cc3af271a95dc354f2
SHA2568e29739d0db64de82f2c1386f8ba689ab31a3b0c457102386884ac03967741c3
SHA51226264798a9a32453c10acdc1f4941bcc795a18142ba8a71566c4bd7d3707dd6d403be2e8ac7b8f9f3ea372847ad3844b84bbf20b8a14f88968bd92d6bd51e344
-
Filesize
383KB
MD55e44b8246a4fad15f34dde2e49e58067
SHA1cb676ca9b22843e81b188c531c985a2a4a3730c1
SHA2565841ec3b7d542eae2cf9ebf62e07d85243629f4959fc02afc2c581d0c1bb2e2b
SHA51224f6c376d9f8342c70be1a401ebfae3fb8cf05704a319a281e9c148c40212401607557a010d2af9d60fa3cc7fae5d66983b7105427eb7d1b3399765de7374f94
-
Filesize
383KB
MD55e44b8246a4fad15f34dde2e49e58067
SHA1cb676ca9b22843e81b188c531c985a2a4a3730c1
SHA2565841ec3b7d542eae2cf9ebf62e07d85243629f4959fc02afc2c581d0c1bb2e2b
SHA51224f6c376d9f8342c70be1a401ebfae3fb8cf05704a319a281e9c148c40212401607557a010d2af9d60fa3cc7fae5d66983b7105427eb7d1b3399765de7374f94
-
Filesize
289KB
MD59b325e403e6bcc2cbfce9467cc02f65f
SHA115323f0948fefc9615d96b9572181e3d487844cd
SHA256373bb84575db64553a977912644db7c299a5b5bb9de07195636a2a07ec7c1b78
SHA51215f5fe3d6507478eb3ec3ac6090a46e012cfa02730f3db536fc63a7bc86806287fd4fd084257676f1abe2f42dfe0b51082f0576950b6f702bb739a9f6889aba9
-
Filesize
289KB
MD59b325e403e6bcc2cbfce9467cc02f65f
SHA115323f0948fefc9615d96b9572181e3d487844cd
SHA256373bb84575db64553a977912644db7c299a5b5bb9de07195636a2a07ec7c1b78
SHA51215f5fe3d6507478eb3ec3ac6090a46e012cfa02730f3db536fc63a7bc86806287fd4fd084257676f1abe2f42dfe0b51082f0576950b6f702bb739a9f6889aba9
-
Filesize
168KB
MD5c859bfe277b92508fcbcef858adb5820
SHA1af00eb31954ed4ba20dbbd5a02505a05bf09e511
SHA2569547f193ab5b5ddc6080be3df500f5b89bfac957dcb4a799ef14719980cc2024
SHA512a4e9d05be95715981633423c7255e4ef7795a2d624242881917a5e85c3e25e2981fd13b1cb6f61d39acd4e885ce268f8e0efead8c03406b7c266e2e7f7ff5f19
-
Filesize
168KB
MD5c859bfe277b92508fcbcef858adb5820
SHA1af00eb31954ed4ba20dbbd5a02505a05bf09e511
SHA2569547f193ab5b5ddc6080be3df500f5b89bfac957dcb4a799ef14719980cc2024
SHA512a4e9d05be95715981633423c7255e4ef7795a2d624242881917a5e85c3e25e2981fd13b1cb6f61d39acd4e885ce268f8e0efead8c03406b7c266e2e7f7ff5f19