Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 20:20

General

  • Target

    0808a60a9b8a4fbe55a0b7d7ada72f909a0225c2c7452ea583e8e506a2bde8a9.exe

  • Size

    643KB

  • MD5

    e1268b122e981ea245e85dadaf52f39e

  • SHA1

    fabd95e3ec5274bc7f218266eafbef29e72c6845

  • SHA256

    0808a60a9b8a4fbe55a0b7d7ada72f909a0225c2c7452ea583e8e506a2bde8a9

  • SHA512

    ce27e1ec965449d419e0c0de024cbb807b814b2121f4e6acd35479f96096866c25aa8958424bf795c8bc5c76d06207283245914fa16a8ec4bd4e37aa2839cfab

  • SSDEEP

    12288:/y90qK14l8AHIrX7jSQXV8q3EuYkqtE/S+Pi1ghUrJ1:/yFMuOrlVMurqO/k1gWz

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0808a60a9b8a4fbe55a0b7d7ada72f909a0225c2c7452ea583e8e506a2bde8a9.exe
    "C:\Users\Admin\AppData\Local\Temp\0808a60a9b8a4fbe55a0b7d7ada72f909a0225c2c7452ea583e8e506a2bde8a9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st168977.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st168977.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38490887.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38490887.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3896
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st168977.exe

    Filesize

    489KB

    MD5

    0ca7f454f812f755513b69b98106ff98

    SHA1

    7b48043f65850e6576df088df5212bc0b4f377dc

    SHA256

    31cfe2045ce8ed00213ad3ac1a6811ccba85a6eaba16041516f3c1a381479cf8

    SHA512

    d637a1ded1df5576e11a1a20d88be9782d75ec26494d3d920e8f3eb975ffca0375914afb599437032f541fed10b56be9e5a0163b08647c4c0deba9fc2d81a07b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st168977.exe

    Filesize

    489KB

    MD5

    0ca7f454f812f755513b69b98106ff98

    SHA1

    7b48043f65850e6576df088df5212bc0b4f377dc

    SHA256

    31cfe2045ce8ed00213ad3ac1a6811ccba85a6eaba16041516f3c1a381479cf8

    SHA512

    d637a1ded1df5576e11a1a20d88be9782d75ec26494d3d920e8f3eb975ffca0375914afb599437032f541fed10b56be9e5a0163b08647c4c0deba9fc2d81a07b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38490887.exe

    Filesize

    175KB

    MD5

    3d10b67208452d7a91d7bd7066067676

    SHA1

    e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

    SHA256

    5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

    SHA512

    b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\38490887.exe

    Filesize

    175KB

    MD5

    3d10b67208452d7a91d7bd7066067676

    SHA1

    e6c3ab7b6da65c8cc7dd95351f118caf3a50248d

    SHA256

    5c8ae96739bd9454a59e92b5eb6965647030e87453f7c417dbd7d53ebd837302

    SHA512

    b86d5ff4f55c90922a890401ae4301da7e71eb5e546a82536073cc58780ce55585214cff39ec9b52f70704580ad36c1fa95ebee1515dd2e7ea313cb670f2b4df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe

    Filesize

    332KB

    MD5

    8ad5b2fc1e81d78cb441a2b6853e30ef

    SHA1

    337123d3217ef503cb057db3cf2a442c9e4913d4

    SHA256

    102d561bdbd8bc6cc5617bc03805cce6717ebf0e0fc3d11f82d0cf42c972a430

    SHA512

    1fb0984abeae2df58064d39734cc226708e1a058ec86f5400697ef8cdeb017f74954a3f71b8161e9ed9dc0c4ff6fcc9abc0140b19326dc8c9b96554e598affb6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp308949.exe

    Filesize

    332KB

    MD5

    8ad5b2fc1e81d78cb441a2b6853e30ef

    SHA1

    337123d3217ef503cb057db3cf2a442c9e4913d4

    SHA256

    102d561bdbd8bc6cc5617bc03805cce6717ebf0e0fc3d11f82d0cf42c972a430

    SHA512

    1fb0984abeae2df58064d39734cc226708e1a058ec86f5400697ef8cdeb017f74954a3f71b8161e9ed9dc0c4ff6fcc9abc0140b19326dc8c9b96554e598affb6

  • memory/1108-214-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/1108-219-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-994-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/1108-993-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/1108-992-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/1108-991-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/1108-989-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/1108-202-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-988-0x0000000002E50000-0x0000000002E96000-memory.dmp

    Filesize

    280KB

  • memory/1108-987-0x000000000A440000-0x000000000A47C000-memory.dmp

    Filesize

    240KB

  • memory/1108-986-0x000000000A320000-0x000000000A42A000-memory.dmp

    Filesize

    1.0MB

  • memory/1108-194-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-984-0x0000000009C80000-0x000000000A298000-memory.dmp

    Filesize

    6.1MB

  • memory/1108-225-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-192-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-223-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-221-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-206-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-217-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-215-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-213-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/1108-210-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-187-0x0000000002E50000-0x0000000002E96000-memory.dmp

    Filesize

    280KB

  • memory/1108-188-0x0000000000400000-0x0000000002BAF000-memory.dmp

    Filesize

    39.7MB

  • memory/1108-189-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-190-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-211-0x0000000007240000-0x0000000007250000-memory.dmp

    Filesize

    64KB

  • memory/1108-985-0x000000000A300000-0x000000000A312000-memory.dmp

    Filesize

    72KB

  • memory/1108-208-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-200-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-198-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-196-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/1108-204-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/3896-174-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-160-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-151-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-148-0x0000000004B20000-0x0000000004B30000-memory.dmp

    Filesize

    64KB

  • memory/3896-150-0x0000000004B20000-0x0000000004B30000-memory.dmp

    Filesize

    64KB

  • memory/3896-181-0x0000000004B20000-0x0000000004B30000-memory.dmp

    Filesize

    64KB

  • memory/3896-147-0x0000000004B30000-0x00000000050D4000-memory.dmp

    Filesize

    5.6MB

  • memory/3896-180-0x0000000004B20000-0x0000000004B30000-memory.dmp

    Filesize

    64KB

  • memory/3896-179-0x0000000004B20000-0x0000000004B30000-memory.dmp

    Filesize

    64KB

  • memory/3896-178-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-176-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-172-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-170-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-168-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-166-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-164-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-162-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-158-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-156-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-154-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB

  • memory/3896-149-0x0000000004B20000-0x0000000004B30000-memory.dmp

    Filesize

    64KB

  • memory/3896-152-0x0000000002400000-0x0000000002413000-memory.dmp

    Filesize

    76KB