Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 20:31

General

  • Target

    10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe

  • Size

    747KB

  • MD5

    534b48e6b10322870a892162cf33b6ef

  • SHA1

    770e2d351430f0fbecc947015e32e72731e7b0dd

  • SHA256

    10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b

  • SHA512

    ea9c1c51fd4d19b7e6772206aabf29d92e6a243e18912e7920d40a14e843c9d80e41092e2c5c8ad28c881a17ef42e91828f909fd77209774c227b61eb03f60d5

  • SSDEEP

    12288:Ky90G70Iwzv6Z2Fdz0L0GY5BXa8uY9C9r8dcffYvbn4T5B17JbY4wB2lTJdD:KyW7v6Od04p5nr9+rMcovkT5TFbYZcTb

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe
    "C:\Users\Admin\AppData\Local\Temp\10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:224

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exe

    Filesize

    592KB

    MD5

    9103cc01bdd64fd6cdce38fd7e57bcf8

    SHA1

    b273ac7452fa77948a8d55babb219099df44ffcd

    SHA256

    049d3b83f301b6a386d6b1470059db430b30ba8e10f574473abb9a7c30281734

    SHA512

    94e9f884b05c0a11ac6a291a81f0281f964d90296030e553824a8c40e504cdd37c2d90250ce4e2037f3d9e5713fb394e07558e54b6ef4fc43bfe3294b55a5ee9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exe

    Filesize

    592KB

    MD5

    9103cc01bdd64fd6cdce38fd7e57bcf8

    SHA1

    b273ac7452fa77948a8d55babb219099df44ffcd

    SHA256

    049d3b83f301b6a386d6b1470059db430b30ba8e10f574473abb9a7c30281734

    SHA512

    94e9f884b05c0a11ac6a291a81f0281f964d90296030e553824a8c40e504cdd37c2d90250ce4e2037f3d9e5713fb394e07558e54b6ef4fc43bfe3294b55a5ee9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe

    Filesize

    377KB

    MD5

    872744d1bc73da14be494f12759a7612

    SHA1

    2bdb2c97fe194722b448bcccade8ffa11ded876d

    SHA256

    de540dbc9e11538a809772753b06097d2a868b4e831e277b08078b589f00b353

    SHA512

    cea9006616d66802868395bc1928c0788b2e5dea5a3eb3719319c6052e0ef9e6b23181b4657379502f4e7e3faab7a94d272c17a80eaa09d1bc6eb93f1d869165

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe

    Filesize

    377KB

    MD5

    872744d1bc73da14be494f12759a7612

    SHA1

    2bdb2c97fe194722b448bcccade8ffa11ded876d

    SHA256

    de540dbc9e11538a809772753b06097d2a868b4e831e277b08078b589f00b353

    SHA512

    cea9006616d66802868395bc1928c0788b2e5dea5a3eb3719319c6052e0ef9e6b23181b4657379502f4e7e3faab7a94d272c17a80eaa09d1bc6eb93f1d869165

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe

    Filesize

    459KB

    MD5

    3620e6d433e2f628ebf115bd42b94ae9

    SHA1

    27640473d87aed1fbf6473af0b2b4e2696f4927e

    SHA256

    3730bec82c4583037693be9134a6a1e3623777cfcb254335707f1916def449b0

    SHA512

    66a02ae8de951e782875e9f02223442c7e265b36addcf8e42a0663546be6ba6fe5b255d209d1e09cb795e497f957c4e7f61451e592cb9ed2a91615bc12477491

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe

    Filesize

    459KB

    MD5

    3620e6d433e2f628ebf115bd42b94ae9

    SHA1

    27640473d87aed1fbf6473af0b2b4e2696f4927e

    SHA256

    3730bec82c4583037693be9134a6a1e3623777cfcb254335707f1916def449b0

    SHA512

    66a02ae8de951e782875e9f02223442c7e265b36addcf8e42a0663546be6ba6fe5b255d209d1e09cb795e497f957c4e7f61451e592cb9ed2a91615bc12477491

  • memory/224-211-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-219-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-994-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/224-992-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/224-991-0x0000000002AF0000-0x0000000002B2C000-memory.dmp

    Filesize

    240KB

  • memory/224-990-0x0000000008120000-0x000000000822A000-memory.dmp

    Filesize

    1.0MB

  • memory/224-989-0x0000000002AC0000-0x0000000002AD2000-memory.dmp

    Filesize

    72KB

  • memory/224-197-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/224-987-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/224-986-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/224-985-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/224-225-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-223-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-221-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-194-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/224-201-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-217-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-215-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-213-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-209-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-205-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-196-0x00000000050C0000-0x00000000050D0000-memory.dmp

    Filesize

    64KB

  • memory/224-188-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-189-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-191-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-193-0x0000000000960000-0x00000000009A6000-memory.dmp

    Filesize

    280KB

  • memory/224-207-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-988-0x0000000007B00000-0x0000000008118000-memory.dmp

    Filesize

    6.1MB

  • memory/224-203-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-195-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/224-199-0x0000000002680000-0x00000000026B5000-memory.dmp

    Filesize

    212KB

  • memory/1276-177-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-149-0x0000000004F90000-0x0000000005534000-memory.dmp

    Filesize

    5.6MB

  • memory/1276-151-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-150-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-183-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1276-148-0x0000000000810000-0x000000000083D000-memory.dmp

    Filesize

    180KB

  • memory/1276-181-0x0000000000400000-0x0000000000803000-memory.dmp

    Filesize

    4.0MB

  • memory/1276-180-0x0000000004F80000-0x0000000004F90000-memory.dmp

    Filesize

    64KB

  • memory/1276-179-0x0000000004F80000-0x0000000004F90000-memory.dmp

    Filesize

    64KB

  • memory/1276-178-0x0000000004F80000-0x0000000004F90000-memory.dmp

    Filesize

    64KB

  • memory/1276-175-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-173-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-171-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-169-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-167-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-165-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-163-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-161-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-159-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-157-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-155-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB

  • memory/1276-153-0x0000000002920000-0x0000000002932000-memory.dmp

    Filesize

    72KB