Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
265s -
max time network
325s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe
Resource
win10v2004-20230221-en
General
-
Target
6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe
-
Size
651KB
-
MD5
dedb9dd808d1076385eeebcf2c448704
-
SHA1
ab0d2d3bc5155470da2653a4a52ebc5c13113fc0
-
SHA256
6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf
-
SHA512
dce85db6d8ce735de29551ba17f205093f7efac0717164b2a1b6b81e242b723b9e1a511ff7e8ce0f61e05d6d80921f70191b6816a579080287910dde707972e7
-
SSDEEP
12288:zy90+GJvIpjCxcPIAMnxMDBAolIC4Lb4uZuR9Y6BVXV:zy5oxcPXWMVn4X4uZcyw
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3228-981-0x0000000007580000-0x0000000007B98000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 77678053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 77678053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 77678053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 77678053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 77678053.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 77678053.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1956 st083158.exe 1864 77678053.exe 3228 kp229108.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 77678053.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 77678053.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st083158.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st083158.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1864 77678053.exe 1864 77678053.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1864 77678053.exe Token: SeDebugPrivilege 3228 kp229108.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 360 wrote to memory of 1956 360 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe 79 PID 360 wrote to memory of 1956 360 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe 79 PID 360 wrote to memory of 1956 360 6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe 79 PID 1956 wrote to memory of 1864 1956 st083158.exe 80 PID 1956 wrote to memory of 1864 1956 st083158.exe 80 PID 1956 wrote to memory of 1864 1956 st083158.exe 80 PID 1956 wrote to memory of 3228 1956 st083158.exe 83 PID 1956 wrote to memory of 3228 1956 st083158.exe 83 PID 1956 wrote to memory of 3228 1956 st083158.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe"C:\Users\Admin\AppData\Local\Temp\6f72d0cf46912ae72bad0a1bf13b5fea01912f5425fa890c462ae65fedf080cf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st083158.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st083158.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77678053.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77678053.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp229108.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp229108.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD58031ffc4390d56575105ce74697f4265
SHA1f30d1026bd1c7e02669b2f0a06c9f0a5197bc1f8
SHA256acb39fbc5430834959c711c35cb63b1c18c6f74b80b957d530c5be699a46a3aa
SHA512e2d3f118b84ced29170940c4ab49d917414885ae468a81c0d58d0c249aa7a5e492820f9f7d23b56b7c17b9b208288b0a2f06d433a6948c39d4fdfca460e1e082
-
Filesize
497KB
MD58031ffc4390d56575105ce74697f4265
SHA1f30d1026bd1c7e02669b2f0a06c9f0a5197bc1f8
SHA256acb39fbc5430834959c711c35cb63b1c18c6f74b80b957d530c5be699a46a3aa
SHA512e2d3f118b84ced29170940c4ab49d917414885ae468a81c0d58d0c249aa7a5e492820f9f7d23b56b7c17b9b208288b0a2f06d433a6948c39d4fdfca460e1e082
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
341KB
MD5844870bc9f98bd795947aeb4150039a5
SHA18083aebb9381ae3070750f033ba9f1b2ba327299
SHA2567003c755fb0aa71c7ce38c8429b9b8d29831400c207401a8a5d9500bfde88d2d
SHA512331afc2414c91a7b41deeb4da24c2a8a73f07039cc0d22ab395c596b8646fbb2ec3829c86964c2832e91514f87d80a7b9b434b32b49ca499d01d6acdbd258634
-
Filesize
341KB
MD5844870bc9f98bd795947aeb4150039a5
SHA18083aebb9381ae3070750f033ba9f1b2ba327299
SHA2567003c755fb0aa71c7ce38c8429b9b8d29831400c207401a8a5d9500bfde88d2d
SHA512331afc2414c91a7b41deeb4da24c2a8a73f07039cc0d22ab395c596b8646fbb2ec3829c86964c2832e91514f87d80a7b9b434b32b49ca499d01d6acdbd258634