Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe
Resource
win10v2004-20230220-en
General
-
Target
10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe
-
Size
747KB
-
MD5
534b48e6b10322870a892162cf33b6ef
-
SHA1
770e2d351430f0fbecc947015e32e72731e7b0dd
-
SHA256
10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b
-
SHA512
ea9c1c51fd4d19b7e6772206aabf29d92e6a243e18912e7920d40a14e843c9d80e41092e2c5c8ad28c881a17ef42e91828f909fd77209774c227b61eb03f60d5
-
SSDEEP
12288:Ky90G70Iwzv6Z2Fdz0L0GY5BXa8uY9C9r8dcffYvbn4T5B17JbY4wB2lTJdD:KyW7v6Od04p5nr9+rMcovkT5TFbYZcTb
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/224-988-0x0000000007B00000-0x0000000008118000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 91828366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 91828366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 91828366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 91828366.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 91828366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 91828366.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4104 un402047.exe 1276 91828366.exe 224 rk742353.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 91828366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 91828366.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un402047.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un402047.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1276 91828366.exe 1276 91828366.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1276 91828366.exe Token: SeDebugPrivilege 224 rk742353.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4104 4416 10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe 83 PID 4416 wrote to memory of 4104 4416 10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe 83 PID 4416 wrote to memory of 4104 4416 10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe 83 PID 4104 wrote to memory of 1276 4104 un402047.exe 84 PID 4104 wrote to memory of 1276 4104 un402047.exe 84 PID 4104 wrote to memory of 1276 4104 un402047.exe 84 PID 4104 wrote to memory of 224 4104 un402047.exe 85 PID 4104 wrote to memory of 224 4104 un402047.exe 85 PID 4104 wrote to memory of 224 4104 un402047.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe"C:\Users\Admin\AppData\Local\Temp\10403fbb929ac5c352c5542fe4da82438a48c1bfeb034f12c794c063dded227b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un402047.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91828366.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742353.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD59103cc01bdd64fd6cdce38fd7e57bcf8
SHA1b273ac7452fa77948a8d55babb219099df44ffcd
SHA256049d3b83f301b6a386d6b1470059db430b30ba8e10f574473abb9a7c30281734
SHA51294e9f884b05c0a11ac6a291a81f0281f964d90296030e553824a8c40e504cdd37c2d90250ce4e2037f3d9e5713fb394e07558e54b6ef4fc43bfe3294b55a5ee9
-
Filesize
592KB
MD59103cc01bdd64fd6cdce38fd7e57bcf8
SHA1b273ac7452fa77948a8d55babb219099df44ffcd
SHA256049d3b83f301b6a386d6b1470059db430b30ba8e10f574473abb9a7c30281734
SHA51294e9f884b05c0a11ac6a291a81f0281f964d90296030e553824a8c40e504cdd37c2d90250ce4e2037f3d9e5713fb394e07558e54b6ef4fc43bfe3294b55a5ee9
-
Filesize
377KB
MD5872744d1bc73da14be494f12759a7612
SHA12bdb2c97fe194722b448bcccade8ffa11ded876d
SHA256de540dbc9e11538a809772753b06097d2a868b4e831e277b08078b589f00b353
SHA512cea9006616d66802868395bc1928c0788b2e5dea5a3eb3719319c6052e0ef9e6b23181b4657379502f4e7e3faab7a94d272c17a80eaa09d1bc6eb93f1d869165
-
Filesize
377KB
MD5872744d1bc73da14be494f12759a7612
SHA12bdb2c97fe194722b448bcccade8ffa11ded876d
SHA256de540dbc9e11538a809772753b06097d2a868b4e831e277b08078b589f00b353
SHA512cea9006616d66802868395bc1928c0788b2e5dea5a3eb3719319c6052e0ef9e6b23181b4657379502f4e7e3faab7a94d272c17a80eaa09d1bc6eb93f1d869165
-
Filesize
459KB
MD53620e6d433e2f628ebf115bd42b94ae9
SHA127640473d87aed1fbf6473af0b2b4e2696f4927e
SHA2563730bec82c4583037693be9134a6a1e3623777cfcb254335707f1916def449b0
SHA51266a02ae8de951e782875e9f02223442c7e265b36addcf8e42a0663546be6ba6fe5b255d209d1e09cb795e497f957c4e7f61451e592cb9ed2a91615bc12477491
-
Filesize
459KB
MD53620e6d433e2f628ebf115bd42b94ae9
SHA127640473d87aed1fbf6473af0b2b4e2696f4927e
SHA2563730bec82c4583037693be9134a6a1e3623777cfcb254335707f1916def449b0
SHA51266a02ae8de951e782875e9f02223442c7e265b36addcf8e42a0663546be6ba6fe5b255d209d1e09cb795e497f957c4e7f61451e592cb9ed2a91615bc12477491