Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:42 UTC
Static task
static1
Behavioral task
behavioral1
Sample
18cfb5cb802fe6b49808a7a95892e509f908d7440d20f1a6eaaaa1c4259657af.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
18cfb5cb802fe6b49808a7a95892e509f908d7440d20f1a6eaaaa1c4259657af.exe
Resource
win10v2004-20230220-en
General
-
Target
18cfb5cb802fe6b49808a7a95892e509f908d7440d20f1a6eaaaa1c4259657af.exe
-
Size
890KB
-
MD5
d1156d92b2b741dd88dac7b3a3304800
-
SHA1
83f7239229b78ccf6f3033668ab7c135f1f93a26
-
SHA256
18cfb5cb802fe6b49808a7a95892e509f908d7440d20f1a6eaaaa1c4259657af
-
SHA512
82fc39c6af299c2aefe087566a6ed12ff2f201ddac85a3203fe4b3a9d0aca9b6c9dedc52facf72bc8253375e85e1e7053566ba9c821fe898f817d1a846134a65
-
SSDEEP
12288:hy90x9fP1CMpUOrsDF5+56cFUrFrktjUdRzVKdkIJwIh3S0zKFBo9/g3SfsKu2f1:hycX0ZO8+uwwdL1ICI8SvoCxu2TeaoS
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dork
185.161.248.73:4164
-
auth_value
e81be7d6cfb453cc812e1b4890eeadad
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4864-2317-0x0000000005120000-0x0000000005738000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation p11505084.exe -
Executes dropped EXE 4 IoCs
pid Process 4108 y28900514.exe 1032 p11505084.exe 4864 1.exe 4684 r97629527.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y28900514.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 18cfb5cb802fe6b49808a7a95892e509f908d7440d20f1a6eaaaa1c4259657af.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18cfb5cb802fe6b49808a7a95892e509f908d7440d20f1a6eaaaa1c4259657af.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y28900514.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3724 1032 WerFault.exe 83 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1032 p11505084.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4260 wrote to memory of 4108 4260 18cfb5cb802fe6b49808a7a95892e509f908d7440d20f1a6eaaaa1c4259657af.exe 82 PID 4260 wrote to memory of 4108 4260 18cfb5cb802fe6b49808a7a95892e509f908d7440d20f1a6eaaaa1c4259657af.exe 82 PID 4260 wrote to memory of 4108 4260 18cfb5cb802fe6b49808a7a95892e509f908d7440d20f1a6eaaaa1c4259657af.exe 82 PID 4108 wrote to memory of 1032 4108 y28900514.exe 83 PID 4108 wrote to memory of 1032 4108 y28900514.exe 83 PID 4108 wrote to memory of 1032 4108 y28900514.exe 83 PID 1032 wrote to memory of 4864 1032 p11505084.exe 90 PID 1032 wrote to memory of 4864 1032 p11505084.exe 90 PID 1032 wrote to memory of 4864 1032 p11505084.exe 90 PID 4108 wrote to memory of 4684 4108 y28900514.exe 94 PID 4108 wrote to memory of 4684 4108 y28900514.exe 94 PID 4108 wrote to memory of 4684 4108 y28900514.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\18cfb5cb802fe6b49808a7a95892e509f908d7440d20f1a6eaaaa1c4259657af.exe"C:\Users\Admin\AppData\Local\Temp\18cfb5cb802fe6b49808a7a95892e509f908d7440d20f1a6eaaaa1c4259657af.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y28900514.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y28900514.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p11505084.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p11505084.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 13764⤵
- Program crash
PID:3724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r97629527.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r97629527.exe3⤵
- Executes dropped EXE
PID:4684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1032 -ip 10321⤵PID:3388
Network
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request17.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request146.78.124.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.254.224.20.in-addr.arpaIN PTRResponse
-
260 B 5
-
260 B 5
-
322 B 7
-
260 B 5
-
322 B 7
-
260 B 5
-
260 B 5
-
260 B 5
-
322 B 7
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
17.160.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
146.78.124.51.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
73.254.224.20.in-addr.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD5ff364d53df504632dbc1701429e154b2
SHA1f8df1498bcb70ab19755162d2e0d30cfc023500d
SHA256e8a7312544eb5fa0b3bf22300a67d3fc0ddf322c0739778a1a40f37488419311
SHA51264b1545ba3bd80821a4c2315cbb3172ae0c0d2bad79c705619692b6a30701d3b2511fd938ead0184f8998444458519a28d91204e03a17f994e55a71ebb38e77a
-
Filesize
589KB
MD5ff364d53df504632dbc1701429e154b2
SHA1f8df1498bcb70ab19755162d2e0d30cfc023500d
SHA256e8a7312544eb5fa0b3bf22300a67d3fc0ddf322c0739778a1a40f37488419311
SHA51264b1545ba3bd80821a4c2315cbb3172ae0c0d2bad79c705619692b6a30701d3b2511fd938ead0184f8998444458519a28d91204e03a17f994e55a71ebb38e77a
-
Filesize
530KB
MD52278cb7db32184ebde6b36e5d87236a7
SHA1fd9b12d385e24e443ac2f029e689f01aa6ffa005
SHA256698d98c66f544b06f815cb7b24db3241afad40cb2d3d0c9460d5ac0e5567f035
SHA512873268d7debd2eac7b8edc7900bdc3cbf01cc9e6c4a68d336e2e04302579fb91c14b97ca42263118973ccca881cbb3e67a82fb97bd762c01933cc538b5b80c7c
-
Filesize
530KB
MD52278cb7db32184ebde6b36e5d87236a7
SHA1fd9b12d385e24e443ac2f029e689f01aa6ffa005
SHA256698d98c66f544b06f815cb7b24db3241afad40cb2d3d0c9460d5ac0e5567f035
SHA512873268d7debd2eac7b8edc7900bdc3cbf01cc9e6c4a68d336e2e04302579fb91c14b97ca42263118973ccca881cbb3e67a82fb97bd762c01933cc538b5b80c7c
-
Filesize
168KB
MD5d19ee2ed2586976c85447c68d56b2627
SHA13b1e45730c3e7f7765d70e6e4155d7eb70221b30
SHA2563ef6919b437f1cd62ce1140568cee42c077cfc95ef4bf2274d177e577f292abe
SHA5123cd3b1e8aea21bfbb8444f75cf1bbe137f1fcf9dff55ca3427fd72f945a119cae05e35217f919bacc081177faf10a2f39e65a74d3e29d7e96df19abbda92e07a
-
Filesize
168KB
MD5d19ee2ed2586976c85447c68d56b2627
SHA13b1e45730c3e7f7765d70e6e4155d7eb70221b30
SHA2563ef6919b437f1cd62ce1140568cee42c077cfc95ef4bf2274d177e577f292abe
SHA5123cd3b1e8aea21bfbb8444f75cf1bbe137f1fcf9dff55ca3427fd72f945a119cae05e35217f919bacc081177faf10a2f39e65a74d3e29d7e96df19abbda92e07a
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf