Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe
Resource
win10v2004-20230220-en
General
-
Target
2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe
-
Size
695KB
-
MD5
d45f82b98272f1cedb01c2faf5a6de4f
-
SHA1
6ca6384694b516fe144ea4991952acf8f4910b7b
-
SHA256
2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840
-
SHA512
1e497c4547ef13875513d06d734ab7ea1d7cae6dac11abe6d78018c8096c7be0814e7d675cdbdc0bd1110969a166d9baa16ae89b0b3cdba69e6dc7cc114881e2
-
SSDEEP
12288:py90Z9lRphVbwhekrNN2Yl9jA6rwTwa6F3VGmUL5vleu2Kh+T1ZgKs:pyYlAheUNNPl9j5ZVGmUzWKh+T1s
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3968-990-0x0000000009C50000-0x000000000A268000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 94557299.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 94557299.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 688 un738904.exe 2128 94557299.exe 3968 rk697725.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 94557299.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 94557299.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un738904.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un738904.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4360 2128 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2128 94557299.exe 2128 94557299.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2128 94557299.exe Token: SeDebugPrivilege 3968 rk697725.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 768 wrote to memory of 688 768 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 83 PID 768 wrote to memory of 688 768 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 83 PID 768 wrote to memory of 688 768 2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe 83 PID 688 wrote to memory of 2128 688 un738904.exe 84 PID 688 wrote to memory of 2128 688 un738904.exe 84 PID 688 wrote to memory of 2128 688 un738904.exe 84 PID 688 wrote to memory of 3968 688 un738904.exe 88 PID 688 wrote to memory of 3968 688 un738904.exe 88 PID 688 wrote to memory of 3968 688 un738904.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe"C:\Users\Admin\AppData\Local\Temp\2a7e039df0a85a8dd740f779e411fe47d2ffbecac1b9e41ef49c4ecc3bb64840.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738904.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738904.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94557299.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94557299.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 10884⤵
- Program crash
PID:4360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk697725.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk697725.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2128 -ip 21281⤵PID:1820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD57753cb8ef538cf99a49af6a636a60280
SHA17805bc4a3d701a1debce327dfcdedad1f42a3b4b
SHA256b481a2ef5ba5762f882abf438ae6c7da8933b81ff8df34a6ef0efb52d2e6bd5e
SHA512a5ce627102367ac7ca898329a289f6a76317ca01f8569b0080b0eb5404d232dc1f49a2e0f9bf9a86f8f1b6a984db67294991971f2cfb0bff38e4f62e80087aad
-
Filesize
541KB
MD57753cb8ef538cf99a49af6a636a60280
SHA17805bc4a3d701a1debce327dfcdedad1f42a3b4b
SHA256b481a2ef5ba5762f882abf438ae6c7da8933b81ff8df34a6ef0efb52d2e6bd5e
SHA512a5ce627102367ac7ca898329a289f6a76317ca01f8569b0080b0eb5404d232dc1f49a2e0f9bf9a86f8f1b6a984db67294991971f2cfb0bff38e4f62e80087aad
-
Filesize
257KB
MD5b68748f8358a0a693b9640689528e0ad
SHA1e1e0c8fd713e42b3e04d8cad5f40643aaec53cbb
SHA2563182ad0fc202219e8f94c4c7ceb6467d0b1b1e53c88eae4a11290ef14a555250
SHA5127a6cfdec03535855a5565294d851fd79d62cd4915ec9f4b1e97b70cc65a28f457b4b7c1973ceb7dfc6617a664d488dc015bb3eee4c4067ff20226779fba80875
-
Filesize
257KB
MD5b68748f8358a0a693b9640689528e0ad
SHA1e1e0c8fd713e42b3e04d8cad5f40643aaec53cbb
SHA2563182ad0fc202219e8f94c4c7ceb6467d0b1b1e53c88eae4a11290ef14a555250
SHA5127a6cfdec03535855a5565294d851fd79d62cd4915ec9f4b1e97b70cc65a28f457b4b7c1973ceb7dfc6617a664d488dc015bb3eee4c4067ff20226779fba80875
-
Filesize
340KB
MD5ecb52039e10e634af1e0d00366732f30
SHA1eca73fb0fb0a0e25b235ff2b95a8aab48d6564ac
SHA256b3b174cbb21ed0cb5ec0f478b96a26b15144192d353de3954bbf41718d5ee6cf
SHA5121632848839569ae788919fffc73dc4e9be9e009f1194f4c4fd4227bb9d8e1d758df462dec288049c6847e4f957203c8c05bac2355a2c3ddb741053d35826daf0
-
Filesize
340KB
MD5ecb52039e10e634af1e0d00366732f30
SHA1eca73fb0fb0a0e25b235ff2b95a8aab48d6564ac
SHA256b3b174cbb21ed0cb5ec0f478b96a26b15144192d353de3954bbf41718d5ee6cf
SHA5121632848839569ae788919fffc73dc4e9be9e009f1194f4c4fd4227bb9d8e1d758df462dec288049c6847e4f957203c8c05bac2355a2c3ddb741053d35826daf0