Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
268s -
max time network
379s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10/02/2023, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
729KB
-
MD5
dfd88d57d5e427da1d0bc2f0150f23b5
-
SHA1
97155aa867f8eb50c6b6ab4acb15e69eeedc6947
-
SHA256
9aaa98d81e26111aca6fdba78459fc58522bc4c7db50df775cd21dead591c8c1
-
SHA512
4b85a3a16d0d433a0c80c84f7a7ec0299bdbcd1e0478c0982aba3c7c32dcba23d37df34eb046a46c15091161fc51dadb9e4bc1813f48a2264ab6b95e8e6a66c9
-
SSDEEP
12288:3Mr0y90By6MLP4V54dNVt4nIFksWnsU7DUTQp897PQf5RB8WnMOyiab3mwZGv:bymVY4V54IImsWsfyf8wMTZa
Malware Config
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 1712 fNt91GB.exe 1504 fjF44pM.exe 2036 ayd55CH.exe 1584 mnolyk.exe 1428 bwJ82he.exe -
Loads dropped DLL 10 IoCs
pid Process 1896 file.exe 1712 fNt91GB.exe 1712 fNt91GB.exe 1504 fjF44pM.exe 1504 fjF44pM.exe 2036 ayd55CH.exe 2036 ayd55CH.exe 1504 fjF44pM.exe 1584 mnolyk.exe 1428 bwJ82he.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce fNt91GB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" fNt91GB.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce fjF44pM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" fjF44pM.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1428 bwJ82he.exe 1428 bwJ82he.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1428 bwJ82he.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1896 wrote to memory of 1712 1896 file.exe 28 PID 1896 wrote to memory of 1712 1896 file.exe 28 PID 1896 wrote to memory of 1712 1896 file.exe 28 PID 1896 wrote to memory of 1712 1896 file.exe 28 PID 1896 wrote to memory of 1712 1896 file.exe 28 PID 1896 wrote to memory of 1712 1896 file.exe 28 PID 1896 wrote to memory of 1712 1896 file.exe 28 PID 1712 wrote to memory of 1504 1712 fNt91GB.exe 29 PID 1712 wrote to memory of 1504 1712 fNt91GB.exe 29 PID 1712 wrote to memory of 1504 1712 fNt91GB.exe 29 PID 1712 wrote to memory of 1504 1712 fNt91GB.exe 29 PID 1712 wrote to memory of 1504 1712 fNt91GB.exe 29 PID 1712 wrote to memory of 1504 1712 fNt91GB.exe 29 PID 1712 wrote to memory of 1504 1712 fNt91GB.exe 29 PID 1504 wrote to memory of 2036 1504 fjF44pM.exe 30 PID 1504 wrote to memory of 2036 1504 fjF44pM.exe 30 PID 1504 wrote to memory of 2036 1504 fjF44pM.exe 30 PID 1504 wrote to memory of 2036 1504 fjF44pM.exe 30 PID 1504 wrote to memory of 2036 1504 fjF44pM.exe 30 PID 1504 wrote to memory of 2036 1504 fjF44pM.exe 30 PID 1504 wrote to memory of 2036 1504 fjF44pM.exe 30 PID 2036 wrote to memory of 1584 2036 ayd55CH.exe 31 PID 2036 wrote to memory of 1584 2036 ayd55CH.exe 31 PID 2036 wrote to memory of 1584 2036 ayd55CH.exe 31 PID 2036 wrote to memory of 1584 2036 ayd55CH.exe 31 PID 2036 wrote to memory of 1584 2036 ayd55CH.exe 31 PID 2036 wrote to memory of 1584 2036 ayd55CH.exe 31 PID 2036 wrote to memory of 1584 2036 ayd55CH.exe 31 PID 1504 wrote to memory of 1428 1504 fjF44pM.exe 32 PID 1504 wrote to memory of 1428 1504 fjF44pM.exe 32 PID 1504 wrote to memory of 1428 1504 fjF44pM.exe 32 PID 1504 wrote to memory of 1428 1504 fjF44pM.exe 32 PID 1504 wrote to memory of 1428 1504 fjF44pM.exe 32 PID 1504 wrote to memory of 1428 1504 fjF44pM.exe 32 PID 1504 wrote to memory of 1428 1504 fjF44pM.exe 32 PID 1584 wrote to memory of 2024 1584 mnolyk.exe 33 PID 1584 wrote to memory of 2024 1584 mnolyk.exe 33 PID 1584 wrote to memory of 2024 1584 mnolyk.exe 33 PID 1584 wrote to memory of 2024 1584 mnolyk.exe 33 PID 1584 wrote to memory of 2024 1584 mnolyk.exe 33 PID 1584 wrote to memory of 2024 1584 mnolyk.exe 33 PID 1584 wrote to memory of 2024 1584 mnolyk.exe 33 PID 1584 wrote to memory of 764 1584 mnolyk.exe 35 PID 1584 wrote to memory of 764 1584 mnolyk.exe 35 PID 1584 wrote to memory of 764 1584 mnolyk.exe 35 PID 1584 wrote to memory of 764 1584 mnolyk.exe 35 PID 1584 wrote to memory of 764 1584 mnolyk.exe 35 PID 1584 wrote to memory of 764 1584 mnolyk.exe 35 PID 1584 wrote to memory of 764 1584 mnolyk.exe 35 PID 764 wrote to memory of 980 764 cmd.exe 37 PID 764 wrote to memory of 980 764 cmd.exe 37 PID 764 wrote to memory of 980 764 cmd.exe 37 PID 764 wrote to memory of 980 764 cmd.exe 37 PID 764 wrote to memory of 980 764 cmd.exe 37 PID 764 wrote to memory of 980 764 cmd.exe 37 PID 764 wrote to memory of 980 764 cmd.exe 37 PID 764 wrote to memory of 340 764 cmd.exe 38 PID 764 wrote to memory of 340 764 cmd.exe 38 PID 764 wrote to memory of 340 764 cmd.exe 38 PID 764 wrote to memory of 340 764 cmd.exe 38 PID 764 wrote to memory of 340 764 cmd.exe 38 PID 764 wrote to memory of 340 764 cmd.exe 38 PID 764 wrote to memory of 340 764 cmd.exe 38 PID 764 wrote to memory of 1092 764 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fNt91GB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fNt91GB.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fjF44pM.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fjF44pM.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ayd55CH.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ayd55CH.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:2024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:980
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:1092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"7⤵PID:1076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E7⤵PID:1740
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bwJ82he.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bwJ82he.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
625KB
MD5ca780f30f7dcdb523cb30e95c578e2b0
SHA1b65d5aaa9364d5b2bc06a4e1232c9c1dc5a2388b
SHA25603371d355d9e06fa34dd224c61e9b01f6264ff5d531422ad4d9630ceba3110cb
SHA51257d2fcd3a388e3fbd4d67094fd3fd4d8c2ee94e50d809d2a78a734d6248af8f2d2c94a5c5854dfd45ad4c336535682f08c1f354d8f46a2d7e1da728566b38b58
-
Filesize
625KB
MD5ca780f30f7dcdb523cb30e95c578e2b0
SHA1b65d5aaa9364d5b2bc06a4e1232c9c1dc5a2388b
SHA25603371d355d9e06fa34dd224c61e9b01f6264ff5d531422ad4d9630ceba3110cb
SHA51257d2fcd3a388e3fbd4d67094fd3fd4d8c2ee94e50d809d2a78a734d6248af8f2d2c94a5c5854dfd45ad4c336535682f08c1f354d8f46a2d7e1da728566b38b58
-
Filesize
286KB
MD57f7d80fa0762a89df0a61223a819d65f
SHA1adb000bceaf67ff7ce2dae60cd4c1cd53a1d64ca
SHA256b4ab1ceade63f7a890e22ec68f65d8d10246ce5e41025e6bd012ad65bb5508c4
SHA5129cae6e7a9ffb2f76dc6a128baf32f3d5c5fc855202ee8dea9662636729b5b8ab4a4fde7814d936003c27f8cde4501f6338ab6264f97ee86b7e823014b03b8a11
-
Filesize
286KB
MD57f7d80fa0762a89df0a61223a819d65f
SHA1adb000bceaf67ff7ce2dae60cd4c1cd53a1d64ca
SHA256b4ab1ceade63f7a890e22ec68f65d8d10246ce5e41025e6bd012ad65bb5508c4
SHA5129cae6e7a9ffb2f76dc6a128baf32f3d5c5fc855202ee8dea9662636729b5b8ab4a4fde7814d936003c27f8cde4501f6338ab6264f97ee86b7e823014b03b8a11
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
625KB
MD5ca780f30f7dcdb523cb30e95c578e2b0
SHA1b65d5aaa9364d5b2bc06a4e1232c9c1dc5a2388b
SHA25603371d355d9e06fa34dd224c61e9b01f6264ff5d531422ad4d9630ceba3110cb
SHA51257d2fcd3a388e3fbd4d67094fd3fd4d8c2ee94e50d809d2a78a734d6248af8f2d2c94a5c5854dfd45ad4c336535682f08c1f354d8f46a2d7e1da728566b38b58
-
Filesize
625KB
MD5ca780f30f7dcdb523cb30e95c578e2b0
SHA1b65d5aaa9364d5b2bc06a4e1232c9c1dc5a2388b
SHA25603371d355d9e06fa34dd224c61e9b01f6264ff5d531422ad4d9630ceba3110cb
SHA51257d2fcd3a388e3fbd4d67094fd3fd4d8c2ee94e50d809d2a78a734d6248af8f2d2c94a5c5854dfd45ad4c336535682f08c1f354d8f46a2d7e1da728566b38b58
-
Filesize
286KB
MD57f7d80fa0762a89df0a61223a819d65f
SHA1adb000bceaf67ff7ce2dae60cd4c1cd53a1d64ca
SHA256b4ab1ceade63f7a890e22ec68f65d8d10246ce5e41025e6bd012ad65bb5508c4
SHA5129cae6e7a9ffb2f76dc6a128baf32f3d5c5fc855202ee8dea9662636729b5b8ab4a4fde7814d936003c27f8cde4501f6338ab6264f97ee86b7e823014b03b8a11
-
Filesize
286KB
MD57f7d80fa0762a89df0a61223a819d65f
SHA1adb000bceaf67ff7ce2dae60cd4c1cd53a1d64ca
SHA256b4ab1ceade63f7a890e22ec68f65d8d10246ce5e41025e6bd012ad65bb5508c4
SHA5129cae6e7a9ffb2f76dc6a128baf32f3d5c5fc855202ee8dea9662636729b5b8ab4a4fde7814d936003c27f8cde4501f6338ab6264f97ee86b7e823014b03b8a11
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42