Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 20:12

General

  • Target

    02a95b4835016a5f0cb57e1429569bfa.exe

  • Size

    747KB

  • MD5

    02a95b4835016a5f0cb57e1429569bfa

  • SHA1

    a6cc2171275faafa07b71ed1f05d69e459de4ec2

  • SHA256

    8e1fde8738b3f83e7e01465a26d198229055664810dcc2342ed53771d6898b9f

  • SHA512

    02237be0baf5d7428d727ac208d5bbcdda2e7647dc59326486c495f719cf82ccca5c62a3187438b2c952bc13396296b819345a0fcae6a3ced2855f11acb275a3

  • SSDEEP

    12288:vy90AYpyJiVwF2vW1Gutmz6bGJM1NcU7NYpuDED2Rbe4wVTa4DF:vyAyN2vGbmwATU7NK0ocbeZVmS

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02a95b4835016a5f0cb57e1429569bfa.exe
    "C:\Users\Admin\AppData\Local\Temp\02a95b4835016a5f0cb57e1429569bfa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2344

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe

    Filesize

    593KB

    MD5

    bcadaab56887edc3b504f754c470a9f5

    SHA1

    89c7fc90796c51fd93431ca7fd717d8647dce196

    SHA256

    c699568d9c14b5741b9b2b7f3fb949757d548647eae0dc82fa8c766a655fc26d

    SHA512

    9e30024de0e419d3589544efa40c680d2d65e7acf3476fa5ea28ce9986dc42a0260f0a61436badaaebab6a505c0e7be9295ecac54cba78bec828d6dec50f09ef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe

    Filesize

    593KB

    MD5

    bcadaab56887edc3b504f754c470a9f5

    SHA1

    89c7fc90796c51fd93431ca7fd717d8647dce196

    SHA256

    c699568d9c14b5741b9b2b7f3fb949757d548647eae0dc82fa8c766a655fc26d

    SHA512

    9e30024de0e419d3589544efa40c680d2d65e7acf3476fa5ea28ce9986dc42a0260f0a61436badaaebab6a505c0e7be9295ecac54cba78bec828d6dec50f09ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe

    Filesize

    377KB

    MD5

    dd629787aa53b50aaecf9c60673df001

    SHA1

    cd707ffdd60442422e0f156c91982efa1c5e6bfa

    SHA256

    770196f67910e5a1b2cbb1c666f67801714e41d14cfead27933bde2033faee56

    SHA512

    e129e9197828f9c91df75c9a042c8b82d9231f4c43e1363c0e2d3a0cafbe27de4faba7fbf5e1da31a91bc68beda956a84ec426910732bcab065012baa5abe91f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe

    Filesize

    377KB

    MD5

    dd629787aa53b50aaecf9c60673df001

    SHA1

    cd707ffdd60442422e0f156c91982efa1c5e6bfa

    SHA256

    770196f67910e5a1b2cbb1c666f67801714e41d14cfead27933bde2033faee56

    SHA512

    e129e9197828f9c91df75c9a042c8b82d9231f4c43e1363c0e2d3a0cafbe27de4faba7fbf5e1da31a91bc68beda956a84ec426910732bcab065012baa5abe91f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe

    Filesize

    459KB

    MD5

    7dbc69b825d5f6410689926e5ec28a18

    SHA1

    71648a55f9d03112f83ba267c32b1cc430859b25

    SHA256

    6acab6957ebb088ad5ba74495cbb795c5fc44c5bc015d04dd8199d41bde5f173

    SHA512

    011566ffd0fe574d3405bb56bf605a8e6e4d2918ca5be4ffbb0e2592e56cd596e6e73cc0925b3326378f469bb7d0e97c36dc4ed6ac30071d63a83db8dda96f74

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe

    Filesize

    459KB

    MD5

    7dbc69b825d5f6410689926e5ec28a18

    SHA1

    71648a55f9d03112f83ba267c32b1cc430859b25

    SHA256

    6acab6957ebb088ad5ba74495cbb795c5fc44c5bc015d04dd8199d41bde5f173

    SHA512

    011566ffd0fe574d3405bb56bf605a8e6e4d2918ca5be4ffbb0e2592e56cd596e6e73cc0925b3326378f469bb7d0e97c36dc4ed6ac30071d63a83db8dda96f74

  • memory/2344-218-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-404-0x0000000000900000-0x0000000000946000-memory.dmp

    Filesize

    280KB

  • memory/2344-996-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/2344-995-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/2344-994-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/2344-992-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/2344-991-0x0000000007F90000-0x000000000809A000-memory.dmp

    Filesize

    1.0MB

  • memory/2344-194-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-989-0x0000000007940000-0x0000000007F58000-memory.dmp

    Filesize

    6.1MB

  • memory/2344-196-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-409-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/2344-405-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/2344-407-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/2344-198-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-193-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-224-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-222-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-220-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-216-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-214-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-212-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-210-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-208-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-206-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-204-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-202-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-200-0x0000000002970000-0x00000000029A5000-memory.dmp

    Filesize

    212KB

  • memory/2344-990-0x0000000007F70000-0x0000000007F82000-memory.dmp

    Filesize

    72KB

  • memory/3872-172-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-162-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-151-0x0000000000930000-0x000000000095D000-memory.dmp

    Filesize

    180KB

  • memory/3872-149-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/3872-150-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3872-188-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/3872-186-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/3872-185-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/3872-183-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/3872-182-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-180-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-148-0x0000000000930000-0x000000000095D000-memory.dmp

    Filesize

    180KB

  • memory/3872-178-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-176-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-174-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-170-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-168-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-166-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-164-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-160-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-158-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-155-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-156-0x0000000005330000-0x0000000005342000-memory.dmp

    Filesize

    72KB

  • memory/3872-154-0x0000000004D40000-0x00000000052E4000-memory.dmp

    Filesize

    5.6MB

  • memory/3872-153-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/3872-152-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB