Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
193s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe
Resource
win10v2004-20230220-en
General
-
Target
7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe
-
Size
1.2MB
-
MD5
6b167374f39264956880174343f2be39
-
SHA1
35b12f9c031bff55c33589a073b056bae802a9d8
-
SHA256
7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096
-
SHA512
f554b1f53a4ae6d7cd6534dde0d55135713279a0d1cb7b48c9ec7dc4840c2acb8f223ed2e483d12ce4e4d20b3522408a478d31d00fe3d5fd872baf1631b9dd9b
-
SSDEEP
24576:KylXbAIQv4U/wVB1e863bh1UsYXlesp389DdC65YyK7+Fqoi93MiVHv:RlXbuiU863gVesd8VdCEK7+Fq9MO
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2736-155-0x0000000008170000-0x0000000008788000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3380 x1295626.exe 2460 x5963707.exe 2736 g8901022.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1295626.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1295626.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5963707.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5963707.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3252 wrote to memory of 3380 3252 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe 78 PID 3252 wrote to memory of 3380 3252 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe 78 PID 3252 wrote to memory of 3380 3252 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe 78 PID 3380 wrote to memory of 2460 3380 x1295626.exe 79 PID 3380 wrote to memory of 2460 3380 x1295626.exe 79 PID 3380 wrote to memory of 2460 3380 x1295626.exe 79 PID 2460 wrote to memory of 2736 2460 x5963707.exe 80 PID 2460 wrote to memory of 2736 2460 x5963707.exe 80 PID 2460 wrote to memory of 2736 2460 x5963707.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe"C:\Users\Admin\AppData\Local\Temp\7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe4⤵
- Executes dropped EXE
PID:2736
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
919KB
MD5fa3cd90e07be166f52e4199804cb51b4
SHA10441d5aded08ce8515fa51eb889193b6b16fc977
SHA256e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727
SHA512255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4
-
Filesize
919KB
MD5fa3cd90e07be166f52e4199804cb51b4
SHA10441d5aded08ce8515fa51eb889193b6b16fc977
SHA256e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727
SHA512255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4
-
Filesize
420KB
MD5fd494c79b7faedf40bd5861a7869e27a
SHA199015a410f7644b56f40014dfd95234ba77d2a24
SHA2561f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383
SHA512d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614
-
Filesize
420KB
MD5fd494c79b7faedf40bd5861a7869e27a
SHA199015a410f7644b56f40014dfd95234ba77d2a24
SHA2561f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383
SHA512d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614
-
Filesize
136KB
MD5dc26c0865ef6c13f8096d8c353e95f3e
SHA18e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05
SHA2564477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d
SHA5125e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264
-
Filesize
136KB
MD5dc26c0865ef6c13f8096d8c353e95f3e
SHA18e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05
SHA2564477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d
SHA5125e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264