Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe
Resource
win10v2004-20230220-en
General
-
Target
126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe
-
Size
611KB
-
MD5
7d086131850c139d2df3a70db5eaa502
-
SHA1
9893e4cf7d2066e792401ac0799eb5cf29584798
-
SHA256
126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899
-
SHA512
58ca1ac62c87cd86654fe545d9afe570ab1cf953e5a71a2901c610622ce43d89f5d1d630fc157f311604fe9683ece59da195102d290108380a4d5794b0a6bd62
-
SSDEEP
12288:1y90i8ALkfEdTiqhN/baGu08k8sOqgSbaIikNNN7yk:1yF8Mkfiiqh9bvmZsbbfikvwk
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2036-950-0x00000000078F0000-0x0000000007F08000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 20231186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 20231186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 20231186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 20231186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 20231186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 20231186.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2944 st185861.exe 3456 20231186.exe 2036 kp613638.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 20231186.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st185861.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st185861.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3456 20231186.exe 3456 20231186.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3456 20231186.exe Token: SeDebugPrivilege 2036 kp613638.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4772 wrote to memory of 2944 4772 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe 84 PID 4772 wrote to memory of 2944 4772 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe 84 PID 4772 wrote to memory of 2944 4772 126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe 84 PID 2944 wrote to memory of 3456 2944 st185861.exe 86 PID 2944 wrote to memory of 3456 2944 st185861.exe 86 PID 2944 wrote to memory of 2036 2944 st185861.exe 87 PID 2944 wrote to memory of 2036 2944 st185861.exe 87 PID 2944 wrote to memory of 2036 2944 st185861.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe"C:\Users\Admin\AppData\Local\Temp\126d84e6be14384774285af86e4e8c139d5e2a60ab871c70af63d6632cd99899.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st185861.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st185861.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\20231186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\20231186.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp613638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp613638.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD5189a24fd0c6b93bee30a0577927e6dba
SHA118544d39d4826123a5e85ed4abd1f4c611a5aec5
SHA256e53afa30e5ba298ec669bff3cb3107ec2dfc2f179bf26d5bbb9b7c40cf40e478
SHA5121749ff20d3cee7659aa909296ac95237e00419161c7606a0aea0cf375fa863099ffa589fe6bf85437cc427b0428bf259a2be78afaa57500999eabda523ccbea7
-
Filesize
457KB
MD5189a24fd0c6b93bee30a0577927e6dba
SHA118544d39d4826123a5e85ed4abd1f4c611a5aec5
SHA256e53afa30e5ba298ec669bff3cb3107ec2dfc2f179bf26d5bbb9b7c40cf40e478
SHA5121749ff20d3cee7659aa909296ac95237e00419161c7606a0aea0cf375fa863099ffa589fe6bf85437cc427b0428bf259a2be78afaa57500999eabda523ccbea7
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD516936e81c41d6253d35908b67870a85c
SHA1360bee9e200be15c048b156cfdf0d2e1873360cc
SHA2567bf59b580bb84db84838b13050b5cbf5ba649fcccf5f4a6372188331551f67b4
SHA5128b66034ea8566e0f8c81840c835f9ae13063257ed63317c09fa4b7f15052bbd9d35d507b310eb0845e89c399635cad502f76d228bc854e1bc192ad4041b49596
-
Filesize
459KB
MD516936e81c41d6253d35908b67870a85c
SHA1360bee9e200be15c048b156cfdf0d2e1873360cc
SHA2567bf59b580bb84db84838b13050b5cbf5ba649fcccf5f4a6372188331551f67b4
SHA5128b66034ea8566e0f8c81840c835f9ae13063257ed63317c09fa4b7f15052bbd9d35d507b310eb0845e89c399635cad502f76d228bc854e1bc192ad4041b49596