Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
107s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/10/2022, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe
Resource
win10-20220812-en
General
-
Target
d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe
-
Size
269KB
-
MD5
286f83b1b21e6c05f1a687e5f1ca1c31
-
SHA1
46b106a13e2396c0ba8df3f1e53467fbedd6aefc
-
SHA256
d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196
-
SHA512
d00ac23609be4b553b24ffdb7f93bcd8048ac855dee16a27b7f670e020d7d32367dd6eb5ed01d43e712d4943c0e9569d90c02ff5d1268e918f67914b352ad3db
-
SSDEEP
1536:erae78zjORCDGwfdCSog01313Cs5gZl43Ni:mahKyd2n3175C43M
Malware Config
Extracted
redline
Buk2
tyastazirowi.xyz:80
yaterirennin.xyz:80
-
auth_value
813662de00b041e18fa868da733fca07
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4552-352-0x000000000042216E-mapping.dmp family_redline behavioral1/memory/4552-405-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2464 attribstuneov.exe 4352 Hshzunnightpc_s.exe 4552 attribstuneov.exe 3324 Hshzunnightpc_s.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Pyyli = "\"C:\\Users\\Admin\\AppData\\Roaming\\Tcqhicpd\\Pyyli.exe\"" attribstuneov.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Pyyli = "\"C:\\Users\\Admin\\AppData\\Roaming\\Tcqhicpd\\Pyyli.exe\"" Hshzunnightpc_s.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2464 set thread context of 4552 2464 attribstuneov.exe 70 PID 4352 set thread context of 3324 4352 Hshzunnightpc_s.exe 74 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4168 powershell.exe 4168 powershell.exe 4168 powershell.exe 668 powershell.exe 668 powershell.exe 668 powershell.exe 4552 attribstuneov.exe 4552 attribstuneov.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2464 attribstuneov.exe Token: SeDebugPrivilege 4168 powershell.exe Token: SeDebugPrivilege 4352 Hshzunnightpc_s.exe Token: SeDebugPrivilege 668 powershell.exe Token: SeDebugPrivilege 4552 attribstuneov.exe Token: SeDebugPrivilege 3324 Hshzunnightpc_s.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2464 2716 d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe 66 PID 2716 wrote to memory of 2464 2716 d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe 66 PID 2716 wrote to memory of 2464 2716 d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe 66 PID 2464 wrote to memory of 4168 2464 attribstuneov.exe 67 PID 2464 wrote to memory of 4168 2464 attribstuneov.exe 67 PID 2464 wrote to memory of 4168 2464 attribstuneov.exe 67 PID 2464 wrote to memory of 4352 2464 attribstuneov.exe 69 PID 2464 wrote to memory of 4352 2464 attribstuneov.exe 69 PID 2464 wrote to memory of 4352 2464 attribstuneov.exe 69 PID 2464 wrote to memory of 4552 2464 attribstuneov.exe 70 PID 2464 wrote to memory of 4552 2464 attribstuneov.exe 70 PID 2464 wrote to memory of 4552 2464 attribstuneov.exe 70 PID 2464 wrote to memory of 4552 2464 attribstuneov.exe 70 PID 2464 wrote to memory of 4552 2464 attribstuneov.exe 70 PID 2464 wrote to memory of 4552 2464 attribstuneov.exe 70 PID 2464 wrote to memory of 4552 2464 attribstuneov.exe 70 PID 2464 wrote to memory of 4552 2464 attribstuneov.exe 70 PID 4352 wrote to memory of 668 4352 Hshzunnightpc_s.exe 71 PID 4352 wrote to memory of 668 4352 Hshzunnightpc_s.exe 71 PID 4352 wrote to memory of 668 4352 Hshzunnightpc_s.exe 71 PID 4352 wrote to memory of 3324 4352 Hshzunnightpc_s.exe 74 PID 4352 wrote to memory of 3324 4352 Hshzunnightpc_s.exe 74 PID 4352 wrote to memory of 3324 4352 Hshzunnightpc_s.exe 74 PID 4352 wrote to memory of 3324 4352 Hshzunnightpc_s.exe 74 PID 4352 wrote to memory of 3324 4352 Hshzunnightpc_s.exe 74 PID 4352 wrote to memory of 3324 4352 Hshzunnightpc_s.exe 74 PID 4352 wrote to memory of 3324 4352 Hshzunnightpc_s.exe 74 PID 4352 wrote to memory of 3324 4352 Hshzunnightpc_s.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe"C:\Users\Admin\AppData\Local\Temp\d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\attribstuneov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\attribstuneov.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\Hshzunnightpc_s.exe"C:\Users\Admin\AppData\Local\Temp\Hshzunnightpc_s.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\Hshzunnightpc_s.exeC:\Users\Admin\AppData\Local\Temp\Hshzunnightpc_s.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\attribstuneov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\attribstuneov.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD594783fcf58c98f5ea0b416f441ad15eb
SHA1979a7c39c6a5dbed314bc41a22c4ccdca6db206b
SHA256117df0a0e80abf166ef148863dd82ba9e75c05b38ed3979d048f5fcc848ef905
SHA5129301306461cb978e91761b24b1d04339c2bff71771431987cd8dc373387c12feb81dbdbf272da1f7c045eade4ffff1976885ca705ca7cf9a40a6c4a7553aa06c
-
Filesize
1KB
MD594783fcf58c98f5ea0b416f441ad15eb
SHA1979a7c39c6a5dbed314bc41a22c4ccdca6db206b
SHA256117df0a0e80abf166ef148863dd82ba9e75c05b38ed3979d048f5fcc848ef905
SHA5129301306461cb978e91761b24b1d04339c2bff71771431987cd8dc373387c12feb81dbdbf272da1f7c045eade4ffff1976885ca705ca7cf9a40a6c4a7553aa06c
-
Filesize
1KB
MD566382a4ca6c4dcf75ce41417d44be93e
SHA18132cbef1c12f8a89a68a6153ade4286bf130812
SHA256a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56
SHA5122bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc
-
Filesize
45KB
MD55f640bd48e2547b4c1a7421f080f815f
SHA1a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a
SHA256916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c
SHA512a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e
-
Filesize
16KB
MD5c65e44b1889df076e3af463b47bcad9b
SHA13d7f74c29bbff0e6a8e2b19b8c2b4c4cede8966c
SHA2568223e4c8fbe583e89f59ac99c80e5730b87f55c07ee67e559241f4442abb50a0
SHA512a138ed048c1c3f8472e576d62357faec0155955bf545b7d4445574483fd99a63168384d43fefb790baa5919a41dc3f8b3b81763a844287a394d9332cdd0382a2
-
Filesize
87KB
MD5fa5a9446a33e713c6cc88b97186b2392
SHA131fa2b86a3d3d5c8062cc19ddf58d13324150c39
SHA2561e3494640f978ee502113a45bbb041c26cb64b3a23c8a6819f645f1e4a6bdd31
SHA512f3fb226fb700d4724a2fdfc04c4b60d0ca015ed69b5514d6575a8a55263a257984d3e0eafb55ce76b365c20f7808399380c0bbcea888c6cf170ceeb9c9e6960b
-
Filesize
87KB
MD5fa5a9446a33e713c6cc88b97186b2392
SHA131fa2b86a3d3d5c8062cc19ddf58d13324150c39
SHA2561e3494640f978ee502113a45bbb041c26cb64b3a23c8a6819f645f1e4a6bdd31
SHA512f3fb226fb700d4724a2fdfc04c4b60d0ca015ed69b5514d6575a8a55263a257984d3e0eafb55ce76b365c20f7808399380c0bbcea888c6cf170ceeb9c9e6960b
-
Filesize
87KB
MD5fa5a9446a33e713c6cc88b97186b2392
SHA131fa2b86a3d3d5c8062cc19ddf58d13324150c39
SHA2561e3494640f978ee502113a45bbb041c26cb64b3a23c8a6819f645f1e4a6bdd31
SHA512f3fb226fb700d4724a2fdfc04c4b60d0ca015ed69b5514d6575a8a55263a257984d3e0eafb55ce76b365c20f7808399380c0bbcea888c6cf170ceeb9c9e6960b
-
Filesize
152.6MB
MD5d721d6cec91d8fd3c0aca004a9df42c9
SHA1c30cab905dcb1a023abadbcc877337a6b1fa88c4
SHA256a6697233ee8a2a64c247d9a5c42d3399f47046c603271d92ee5253f6429d6777
SHA512d00df63beef16565a164cbf6744d42ffd7c1d672b2d439d1d1614c9893d62598b8c5e8b87e0546bf2f483a2bcef04a0d0230931aa9898ecc26973aba4a0bb90e
-
Filesize
152.6MB
MD5d721d6cec91d8fd3c0aca004a9df42c9
SHA1c30cab905dcb1a023abadbcc877337a6b1fa88c4
SHA256a6697233ee8a2a64c247d9a5c42d3399f47046c603271d92ee5253f6429d6777
SHA512d00df63beef16565a164cbf6744d42ffd7c1d672b2d439d1d1614c9893d62598b8c5e8b87e0546bf2f483a2bcef04a0d0230931aa9898ecc26973aba4a0bb90e
-
Filesize
152.6MB
MD5d721d6cec91d8fd3c0aca004a9df42c9
SHA1c30cab905dcb1a023abadbcc877337a6b1fa88c4
SHA256a6697233ee8a2a64c247d9a5c42d3399f47046c603271d92ee5253f6429d6777
SHA512d00df63beef16565a164cbf6744d42ffd7c1d672b2d439d1d1614c9893d62598b8c5e8b87e0546bf2f483a2bcef04a0d0230931aa9898ecc26973aba4a0bb90e