Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    193s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:29

General

  • Target

    7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe

  • Size

    1.2MB

  • MD5

    6b167374f39264956880174343f2be39

  • SHA1

    35b12f9c031bff55c33589a073b056bae802a9d8

  • SHA256

    7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096

  • SHA512

    f554b1f53a4ae6d7cd6534dde0d55135713279a0d1cb7b48c9ec7dc4840c2acb8f223ed2e483d12ce4e4d20b3522408a478d31d00fe3d5fd872baf1631b9dd9b

  • SSDEEP

    24576:KylXbAIQv4U/wVB1e863bh1UsYXlesp389DdC65YyK7+Fqoi93MiVHv:RlXbuiU863gVesd8VdCEK7+Fq9MO

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe
    "C:\Users\Admin\AppData\Local\Temp\7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe
          4⤵
          • Executes dropped EXE
          PID:2736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe

    Filesize

    919KB

    MD5

    fa3cd90e07be166f52e4199804cb51b4

    SHA1

    0441d5aded08ce8515fa51eb889193b6b16fc977

    SHA256

    e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727

    SHA512

    255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe

    Filesize

    919KB

    MD5

    fa3cd90e07be166f52e4199804cb51b4

    SHA1

    0441d5aded08ce8515fa51eb889193b6b16fc977

    SHA256

    e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727

    SHA512

    255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe

    Filesize

    420KB

    MD5

    fd494c79b7faedf40bd5861a7869e27a

    SHA1

    99015a410f7644b56f40014dfd95234ba77d2a24

    SHA256

    1f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383

    SHA512

    d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe

    Filesize

    420KB

    MD5

    fd494c79b7faedf40bd5861a7869e27a

    SHA1

    99015a410f7644b56f40014dfd95234ba77d2a24

    SHA256

    1f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383

    SHA512

    d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe

    Filesize

    136KB

    MD5

    dc26c0865ef6c13f8096d8c353e95f3e

    SHA1

    8e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05

    SHA256

    4477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d

    SHA512

    5e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe

    Filesize

    136KB

    MD5

    dc26c0865ef6c13f8096d8c353e95f3e

    SHA1

    8e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05

    SHA256

    4477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d

    SHA512

    5e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264

  • memory/2736-154-0x0000000000EB0000-0x0000000000ED8000-memory.dmp

    Filesize

    160KB

  • memory/2736-155-0x0000000008170000-0x0000000008788000-memory.dmp

    Filesize

    6.1MB

  • memory/2736-156-0x0000000005780000-0x0000000005792000-memory.dmp

    Filesize

    72KB

  • memory/2736-157-0x0000000007E60000-0x0000000007F6A000-memory.dmp

    Filesize

    1.0MB

  • memory/2736-158-0x0000000007D90000-0x0000000007DCC000-memory.dmp

    Filesize

    240KB

  • memory/2736-159-0x0000000008160000-0x0000000008170000-memory.dmp

    Filesize

    64KB

  • memory/2736-160-0x0000000008160000-0x0000000008170000-memory.dmp

    Filesize

    64KB