Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    189s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:20

General

  • Target

    36651de7a4d7ab0b0b0ccdb3d109d6774d61fda49f90803520cfb129bdea6c73.exe

  • Size

    480KB

  • MD5

    abdaf8c4d1ca10508f21f22884488fcc

  • SHA1

    dbc1180675603091a1be4f77e4e7dfe63c4beb14

  • SHA256

    36651de7a4d7ab0b0b0ccdb3d109d6774d61fda49f90803520cfb129bdea6c73

  • SHA512

    c8f53b5dbf44fe9d4eb9277365f1a1d05a53c4019a0072da13b29c496b58da2b755ff794d95f8dba07b30688df34c92f8775a8e10fa33655f36a9f57555e3e9e

  • SSDEEP

    12288:3Mr1y90vNzCUjEuLVACmVOb/nAJYAiWD:2y+McmwbHaD

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36651de7a4d7ab0b0b0ccdb3d109d6774d61fda49f90803520cfb129bdea6c73.exe
    "C:\Users\Admin\AppData\Local\Temp\36651de7a4d7ab0b0b0ccdb3d109d6774d61fda49f90803520cfb129bdea6c73.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8053191.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8053191.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1930753.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1930753.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9140976.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9140976.exe
        3⤵
        • Executes dropped EXE
        PID:228

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8053191.exe

    Filesize

    308KB

    MD5

    0456c4a2743c0b4b70436d66acb6fafc

    SHA1

    2fe54f7fe9dbaa2bfafb992cfdc23ca1db8cbb9b

    SHA256

    85abb191c0b0ab003e04a18b196727815730ea6ba5f3837ca77d85d1075de753

    SHA512

    ded2e7321abcbf1952d86831c8667946250138e457eb13b75b62f9c7320874488a0757b220961838dff8022ba73e02f5f4e13870b7548faf387a6cd6839daae1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8053191.exe

    Filesize

    308KB

    MD5

    0456c4a2743c0b4b70436d66acb6fafc

    SHA1

    2fe54f7fe9dbaa2bfafb992cfdc23ca1db8cbb9b

    SHA256

    85abb191c0b0ab003e04a18b196727815730ea6ba5f3837ca77d85d1075de753

    SHA512

    ded2e7321abcbf1952d86831c8667946250138e457eb13b75b62f9c7320874488a0757b220961838dff8022ba73e02f5f4e13870b7548faf387a6cd6839daae1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1930753.exe

    Filesize

    175KB

    MD5

    a86edf98e8646e918ddeb2347d5abe71

    SHA1

    4c8a75109439bb30ec42cd0f692f1d3573a02af4

    SHA256

    02d589929e8427fd3e3da6617a40435d4d9a558a2febffdda8f2353ed78d87e6

    SHA512

    b15239ceea3e47ec253e796d76ccc25dbe8535cb0b299aa3f3c90bca076e4a4f7edb54f514b6b4aa6cc8d1cc3847b13e6f5e5906aa227d46d5c9546ed4ab232d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1930753.exe

    Filesize

    175KB

    MD5

    a86edf98e8646e918ddeb2347d5abe71

    SHA1

    4c8a75109439bb30ec42cd0f692f1d3573a02af4

    SHA256

    02d589929e8427fd3e3da6617a40435d4d9a558a2febffdda8f2353ed78d87e6

    SHA512

    b15239ceea3e47ec253e796d76ccc25dbe8535cb0b299aa3f3c90bca076e4a4f7edb54f514b6b4aa6cc8d1cc3847b13e6f5e5906aa227d46d5c9546ed4ab232d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9140976.exe

    Filesize

    136KB

    MD5

    b176745ada22706c1f962c44e8bfcecf

    SHA1

    e76138730934459fd138732cb215fee3a36c3a21

    SHA256

    bf6543dbe1b7d0456589d3345e83dffd985be78becb31edc238668a0ae68b2ba

    SHA512

    a7ee2fbb0bd0a7a61f927607c0e61493d636bfb223ad67c96f79f711ca12088df59e054d8a0d76175a0453846bc7c9a43fcf1b0755116d7c97b2374b37af3549

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9140976.exe

    Filesize

    136KB

    MD5

    b176745ada22706c1f962c44e8bfcecf

    SHA1

    e76138730934459fd138732cb215fee3a36c3a21

    SHA256

    bf6543dbe1b7d0456589d3345e83dffd985be78becb31edc238668a0ae68b2ba

    SHA512

    a7ee2fbb0bd0a7a61f927607c0e61493d636bfb223ad67c96f79f711ca12088df59e054d8a0d76175a0453846bc7c9a43fcf1b0755116d7c97b2374b37af3549

  • memory/228-189-0x0000000006E30000-0x0000000006E40000-memory.dmp

    Filesize

    64KB

  • memory/228-188-0x0000000006ED0000-0x0000000006FDA000-memory.dmp

    Filesize

    1.0MB

  • memory/228-187-0x0000000006DA0000-0x0000000006DB2000-memory.dmp

    Filesize

    72KB

  • memory/228-186-0x00000000073A0000-0x00000000079B8000-memory.dmp

    Filesize

    6.1MB

  • memory/228-185-0x0000000000080000-0x00000000000A8000-memory.dmp

    Filesize

    160KB

  • memory/228-190-0x0000000006E40000-0x0000000006E7C000-memory.dmp

    Filesize

    240KB

  • memory/228-191-0x0000000006E30000-0x0000000006E40000-memory.dmp

    Filesize

    64KB

  • memory/1412-167-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-180-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/1412-161-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-163-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-169-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-171-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-173-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-175-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-177-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-178-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/1412-179-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/1412-165-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-159-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-157-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-155-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-150-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-151-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-153-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/1412-149-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/1412-148-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/1412-147-0x0000000004AA0000-0x0000000005044000-memory.dmp

    Filesize

    5.6MB