Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe
Resource
win10v2004-20230220-en
General
-
Target
2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe
-
Size
599KB
-
MD5
579ba1c8fe2dafba83ffe2aba5f6a07d
-
SHA1
35ef464b64c6e0c2bc97d619fd9a1e54dde2c33e
-
SHA256
2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157
-
SHA512
5ac8a105b59d188a6b33402782595a47df3f1a17385abaa9f3e5bd8c2f64751663609980625184a7e333522dbe1a0c9ba551c0262709882aa634699097c5086d
-
SSDEEP
12288:xMrey906Emu9BKLLbroX1IDDToyXIi6a9YEGeSduYyz:fydoBaga9XJx+/eSduYa
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3364-151-0x00000000074A0000-0x0000000007AB8000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 4456 y0052950.exe 3364 k8932178.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0052950.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0052950.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4736 wrote to memory of 4456 4736 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe 82 PID 4736 wrote to memory of 4456 4736 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe 82 PID 4736 wrote to memory of 4456 4736 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe 82 PID 4456 wrote to memory of 3364 4456 y0052950.exe 83 PID 4456 wrote to memory of 3364 4456 y0052950.exe 83 PID 4456 wrote to memory of 3364 4456 y0052950.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe"C:\Users\Admin\AppData\Local\Temp\2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0052950.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0052950.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8932178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8932178.exe3⤵
- Executes dropped EXE
PID:3364
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD510f05a531c697fd3fc57c14fbcdca498
SHA130ef526e424157a6bead127b5c3eda60ce7683d0
SHA2566f0525e710b1ae50ecbbe11e07efc75586ba6c3599faca401b6b43d8ebbedac9
SHA512d03dece36bc0021ed76ba6c53c199006f634ad0b84c695b56e55856f1e0912f7391c7f8e2c2b205a1585ff69075b42f8ebd8723a3a57497523ed534cdd3a2d49
-
Filesize
307KB
MD510f05a531c697fd3fc57c14fbcdca498
SHA130ef526e424157a6bead127b5c3eda60ce7683d0
SHA2566f0525e710b1ae50ecbbe11e07efc75586ba6c3599faca401b6b43d8ebbedac9
SHA512d03dece36bc0021ed76ba6c53c199006f634ad0b84c695b56e55856f1e0912f7391c7f8e2c2b205a1585ff69075b42f8ebd8723a3a57497523ed534cdd3a2d49
-
Filesize
136KB
MD51dd5f288f46e1dc1964b5b595c31d6b3
SHA15fa9eda2c2eed89dd7edb694cf298cdde03f5984
SHA2563aa79ff6bc819242ae7eadbcfcce9c276c4b8cfb7c64d579b21dac86ec51d62d
SHA5124f939bf8f82120b584da7ee4dc8d515d4f5c7748d5daf542a6e62c1274b517aeca0e80e14039209501c08e26bd37f2a26fedaf10a4502ef3321d020023ad28df
-
Filesize
136KB
MD51dd5f288f46e1dc1964b5b595c31d6b3
SHA15fa9eda2c2eed89dd7edb694cf298cdde03f5984
SHA2563aa79ff6bc819242ae7eadbcfcce9c276c4b8cfb7c64d579b21dac86ec51d62d
SHA5124f939bf8f82120b584da7ee4dc8d515d4f5c7748d5daf542a6e62c1274b517aeca0e80e14039209501c08e26bd37f2a26fedaf10a4502ef3321d020023ad28df