Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
177s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe
Resource
win10v2004-20230220-en
General
-
Target
6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe
-
Size
612KB
-
MD5
5fadd395151a2dc7a6fbdf729438624a
-
SHA1
0bee04c2f712d9380cb5d637140463f0922dc9fa
-
SHA256
6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302
-
SHA512
79ecec33904526fc9d2c6ee17003828bc317dc21a2ce2113dd33cfb80456971dcef78435096229bbe7948ab9803a2b924d1fa8155794c8fd1e2abc6725e409ba
-
SSDEEP
12288:ky900cg5+A8n98FdISCLw2gii6Wdx7w83xb3FLS+kI:kyFci+B9AHQw29Dac8hb6I
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4404-955-0x0000000007960000-0x0000000007F78000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 26289110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 26289110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 26289110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 26289110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 26289110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 26289110.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1304 st244268.exe 4460 26289110.exe 4404 kp242149.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 26289110.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st244268.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st244268.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4460 26289110.exe 4460 26289110.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4460 26289110.exe Token: SeDebugPrivilege 4404 kp242149.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1304 2504 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe 81 PID 2504 wrote to memory of 1304 2504 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe 81 PID 2504 wrote to memory of 1304 2504 6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe 81 PID 1304 wrote to memory of 4460 1304 st244268.exe 82 PID 1304 wrote to memory of 4460 1304 st244268.exe 82 PID 1304 wrote to memory of 4404 1304 st244268.exe 83 PID 1304 wrote to memory of 4404 1304 st244268.exe 83 PID 1304 wrote to memory of 4404 1304 st244268.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe"C:\Users\Admin\AppData\Local\Temp\6dec6fbc08f72cd75f83901acfac971d5a7303555cb562b85bfcd1b219e37302.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st244268.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st244268.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26289110.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\26289110.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp242149.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp242149.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD567f920374b633a3655589e776b93b030
SHA111854d118b863681e9bcc637266d526e1c69cd5b
SHA2563d47555dc63dddaf1ffb2c3dcd03529e7bf2a3c4c057d66c8e7b267a4756ca28
SHA512f9e90468112c07fa1cbbf307f211c942b2d9e159a32347b3b4a010ffa1efe61ef4ed31298ee0feaae4e92a814f8eef9446acaa1eec5f2855ca660a2b57d1f894
-
Filesize
458KB
MD567f920374b633a3655589e776b93b030
SHA111854d118b863681e9bcc637266d526e1c69cd5b
SHA2563d47555dc63dddaf1ffb2c3dcd03529e7bf2a3c4c057d66c8e7b267a4756ca28
SHA512f9e90468112c07fa1cbbf307f211c942b2d9e159a32347b3b4a010ffa1efe61ef4ed31298ee0feaae4e92a814f8eef9446acaa1eec5f2855ca660a2b57d1f894
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
460KB
MD548743041504b7db5dfeff86d32de1297
SHA15ba0583f1d62ea8afc0f88ac7cb489982314c162
SHA256bf00e3c45fe737c7df71058966df5ac172a748eb7f297906f87e68f6d561cb97
SHA512db8af7eb56dc9591e8f29ce04ea7f07afaf522a320ccd3cc73b0b87ee7f8ce3abe09aaec12dd4ec910e4c8e573cdf96bc7d7aaf48dfba6b5c00cf433eb8e05b3
-
Filesize
460KB
MD548743041504b7db5dfeff86d32de1297
SHA15ba0583f1d62ea8afc0f88ac7cb489982314c162
SHA256bf00e3c45fe737c7df71058966df5ac172a748eb7f297906f87e68f6d561cb97
SHA512db8af7eb56dc9591e8f29ce04ea7f07afaf522a320ccd3cc73b0b87ee7f8ce3abe09aaec12dd4ec910e4c8e573cdf96bc7d7aaf48dfba6b5c00cf433eb8e05b3