Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
16e33753cbc1526c31a7bfb70f89cdfa4a7bf3d0526e954b6703e3132ed75f85.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
16e33753cbc1526c31a7bfb70f89cdfa4a7bf3d0526e954b6703e3132ed75f85.exe
Resource
win10v2004-20230220-en
General
-
Target
16e33753cbc1526c31a7bfb70f89cdfa4a7bf3d0526e954b6703e3132ed75f85.exe
-
Size
690KB
-
MD5
d488ae7600e6c8ef1df2897a26595fd2
-
SHA1
63a3bf8c5584f35f5921cb6cb777ef865887685e
-
SHA256
16e33753cbc1526c31a7bfb70f89cdfa4a7bf3d0526e954b6703e3132ed75f85
-
SHA512
8e1a66fb27ba36708e53fc84a8f238c9d8586a70c8b1b2ed2b6b0e2a4d210ce8d767e9942da810adc1d004898dacde22e30c94fa4d37469424eb2d4155406a66
-
SSDEEP
12288:uy90otjAvB4o6bUcyR9ZjIjQvLJxeexUwEUGes04vC2ymO4tErGLEgb:uylo7G2LJxJTSR62yfGErFgb
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/652-988-0x0000000007630000-0x0000000007C48000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 85754062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 85754062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 85754062.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 85754062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 85754062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 85754062.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2196 un091214.exe 4592 85754062.exe 652 rk592187.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 85754062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 85754062.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 16e33753cbc1526c31a7bfb70f89cdfa4a7bf3d0526e954b6703e3132ed75f85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16e33753cbc1526c31a7bfb70f89cdfa4a7bf3d0526e954b6703e3132ed75f85.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un091214.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un091214.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4724 4592 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4592 85754062.exe 4592 85754062.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4592 85754062.exe Token: SeDebugPrivilege 652 rk592187.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4512 wrote to memory of 2196 4512 16e33753cbc1526c31a7bfb70f89cdfa4a7bf3d0526e954b6703e3132ed75f85.exe 84 PID 4512 wrote to memory of 2196 4512 16e33753cbc1526c31a7bfb70f89cdfa4a7bf3d0526e954b6703e3132ed75f85.exe 84 PID 4512 wrote to memory of 2196 4512 16e33753cbc1526c31a7bfb70f89cdfa4a7bf3d0526e954b6703e3132ed75f85.exe 84 PID 2196 wrote to memory of 4592 2196 un091214.exe 85 PID 2196 wrote to memory of 4592 2196 un091214.exe 85 PID 2196 wrote to memory of 4592 2196 un091214.exe 85 PID 2196 wrote to memory of 652 2196 un091214.exe 88 PID 2196 wrote to memory of 652 2196 un091214.exe 88 PID 2196 wrote to memory of 652 2196 un091214.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\16e33753cbc1526c31a7bfb70f89cdfa4a7bf3d0526e954b6703e3132ed75f85.exe"C:\Users\Admin\AppData\Local\Temp\16e33753cbc1526c31a7bfb70f89cdfa4a7bf3d0526e954b6703e3132ed75f85.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un091214.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un091214.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85754062.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85754062.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 10804⤵
- Program crash
PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk592187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk592187.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4592 -ip 45921⤵PID:2288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5dee300d875b4e287fbc510a26d20b85f
SHA1c7d3a734635bab9fae8fde0a395b1412107061d6
SHA256c57f83d42d2c2892598a5b3fc50808b79098b92577eeb8d2c7290f9b904e343b
SHA512f90ddd529a67200b5b5806b2cadd3231daa6d1f907ba7a5c25a933d711976aeaeb043999d8e6247da6d5db438ea65de6b1b1ee6d73138251866230bc98d3306c
-
Filesize
536KB
MD5dee300d875b4e287fbc510a26d20b85f
SHA1c7d3a734635bab9fae8fde0a395b1412107061d6
SHA256c57f83d42d2c2892598a5b3fc50808b79098b92577eeb8d2c7290f9b904e343b
SHA512f90ddd529a67200b5b5806b2cadd3231daa6d1f907ba7a5c25a933d711976aeaeb043999d8e6247da6d5db438ea65de6b1b1ee6d73138251866230bc98d3306c
-
Filesize
259KB
MD565a44951d469e460f32c03f1d62e1214
SHA1506c23de9e94478e62f6c9eeffe19b9123814d25
SHA256e926118f5f0308e2487dff193a50b5e65baf8b323ef1fac6511c0b868480ebbc
SHA512367f761b184cc90a87391c115c1a78eaca2454da6a41fafefdaa8a2580010e6cf22062b84c51f552b4b1606d317a6cf5387a7e1b527e1fbe0d91f77fcd5d1291
-
Filesize
259KB
MD565a44951d469e460f32c03f1d62e1214
SHA1506c23de9e94478e62f6c9eeffe19b9123814d25
SHA256e926118f5f0308e2487dff193a50b5e65baf8b323ef1fac6511c0b868480ebbc
SHA512367f761b184cc90a87391c115c1a78eaca2454da6a41fafefdaa8a2580010e6cf22062b84c51f552b4b1606d317a6cf5387a7e1b527e1fbe0d91f77fcd5d1291
-
Filesize
341KB
MD5ee9406dfb1f432eec680366cd207b183
SHA1e6cd486f86c90ea2e0cb840103d56f7292e8f155
SHA256dfdebe54dde5bd0f3d70d8b33213385b4acc1916a9e8fc835da37dd92e97ba2c
SHA512a955b0cff678c543839be3fcfbf7bf3687a815e02c08add7878c2a33c3a0ea3dae67d113270a8fd63ce0e3ad9e35ad393d689a7f975fa1f4b7cbfa8b5ed9561a
-
Filesize
341KB
MD5ee9406dfb1f432eec680366cd207b183
SHA1e6cd486f86c90ea2e0cb840103d56f7292e8f155
SHA256dfdebe54dde5bd0f3d70d8b33213385b4acc1916a9e8fc835da37dd92e97ba2c
SHA512a955b0cff678c543839be3fcfbf7bf3687a815e02c08add7878c2a33c3a0ea3dae67d113270a8fd63ce0e3ad9e35ad393d689a7f975fa1f4b7cbfa8b5ed9561a