Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
3104452519098577043aa6b07ce22cd41447a3807c96f2037090185ae62bf194.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3104452519098577043aa6b07ce22cd41447a3807c96f2037090185ae62bf194.exe
Resource
win10v2004-20230220-en
General
-
Target
3104452519098577043aa6b07ce22cd41447a3807c96f2037090185ae62bf194.exe
-
Size
600KB
-
MD5
7f879c5078f21fe470e3aae4f7a242c8
-
SHA1
d6be024f66129ce6eb455874776d2a4b87c5ad3c
-
SHA256
3104452519098577043aa6b07ce22cd41447a3807c96f2037090185ae62bf194
-
SHA512
cdd89a235aa898187f10c1b8f1cf357623d5d1930f8d777d318cfa9e8cbc2ab26afb6663e47d7685b10863546a1a0e85aea2920fdd9892ce383d9c79178a1a36
-
SSDEEP
12288:rMruy90ZAhzXWg0ywSav9BGEZqj1u90Helkn/pFh/JRS21JVUVZo:ZyD0yGVEEZqhe0HeOn/p3/TD1J2no
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2104-148-0x0000000007C50000-0x0000000008268000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 4960 y6502237.exe 2104 k1062174.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3104452519098577043aa6b07ce22cd41447a3807c96f2037090185ae62bf194.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3104452519098577043aa6b07ce22cd41447a3807c96f2037090185ae62bf194.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6502237.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6502237.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 996 wrote to memory of 4960 996 3104452519098577043aa6b07ce22cd41447a3807c96f2037090185ae62bf194.exe 83 PID 996 wrote to memory of 4960 996 3104452519098577043aa6b07ce22cd41447a3807c96f2037090185ae62bf194.exe 83 PID 996 wrote to memory of 4960 996 3104452519098577043aa6b07ce22cd41447a3807c96f2037090185ae62bf194.exe 83 PID 4960 wrote to memory of 2104 4960 y6502237.exe 84 PID 4960 wrote to memory of 2104 4960 y6502237.exe 84 PID 4960 wrote to memory of 2104 4960 y6502237.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3104452519098577043aa6b07ce22cd41447a3807c96f2037090185ae62bf194.exe"C:\Users\Admin\AppData\Local\Temp\3104452519098577043aa6b07ce22cd41447a3807c96f2037090185ae62bf194.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6502237.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6502237.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1062174.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1062174.exe3⤵
- Executes dropped EXE
PID:2104
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD54739e13004ceb6ed5976a1e12d2c7b48
SHA18e20e6e29d8f1b5d6dde4f04fa225b7a08ff506c
SHA25663ddbc3615fbd9f5c65d98aec255ecc0f636258db9e11e07a8b5485d7ef95a59
SHA51229094d961269003932211586d705aac5c86f665c6e734a562da7873a98b2343d7938fcda8ecb6ff0690f453c58c464c283a0946364f188b1fcf356607fecb9d3
-
Filesize
307KB
MD54739e13004ceb6ed5976a1e12d2c7b48
SHA18e20e6e29d8f1b5d6dde4f04fa225b7a08ff506c
SHA25663ddbc3615fbd9f5c65d98aec255ecc0f636258db9e11e07a8b5485d7ef95a59
SHA51229094d961269003932211586d705aac5c86f665c6e734a562da7873a98b2343d7938fcda8ecb6ff0690f453c58c464c283a0946364f188b1fcf356607fecb9d3
-
Filesize
136KB
MD5c2d4dd7877b80ec0e2cd76dfe12c7fe7
SHA178bd3110d1a3be940a4df9b71748242e3b46b310
SHA256870df0572b5ed6417e9a7b8e39781812e1e6eebe6dc4463b85cc8679edf0cdf2
SHA5127934a46507497bc59109c0a3c55e4a40acb82b7818448fe4b7248781ed32aecdb3795d52298ffa196ae287b2bc24f5ac653cb37338deb640b32b7e636e662693
-
Filesize
136KB
MD5c2d4dd7877b80ec0e2cd76dfe12c7fe7
SHA178bd3110d1a3be940a4df9b71748242e3b46b310
SHA256870df0572b5ed6417e9a7b8e39781812e1e6eebe6dc4463b85cc8679edf0cdf2
SHA5127934a46507497bc59109c0a3c55e4a40acb82b7818448fe4b7248781ed32aecdb3795d52298ffa196ae287b2bc24f5ac653cb37338deb640b32b7e636e662693