Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
208s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10/02/2023, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
729KB
-
MD5
dfd88d57d5e427da1d0bc2f0150f23b5
-
SHA1
97155aa867f8eb50c6b6ab4acb15e69eeedc6947
-
SHA256
9aaa98d81e26111aca6fdba78459fc58522bc4c7db50df775cd21dead591c8c1
-
SHA512
4b85a3a16d0d433a0c80c84f7a7ec0299bdbcd1e0478c0982aba3c7c32dcba23d37df34eb046a46c15091161fc51dadb9e4bc1813f48a2264ab6b95e8e6a66c9
-
SSDEEP
12288:3Mr0y90By6MLP4V54dNVt4nIFksWnsU7DUTQp897PQf5RB8WnMOyiab3mwZGv:bymVY4V54IImsWsfyf8wMTZa
Malware Config
Extracted
amadey
3.66
62.204.41.4/Gol478Ns/index.php
Extracted
redline
dunm
193.233.20.12:4132
-
auth_value
352959e3707029296ec94306d74e2334
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation ayd55CH.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 8 IoCs
pid Process 336 fNt91GB.exe 3272 fjF44pM.exe 4248 ayd55CH.exe 2152 mnolyk.exe 2816 bwJ82he.exe 4888 mnolyk.exe 4184 mnolyk.exe 3236 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4392 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fNt91GB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" fNt91GB.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fjF44pM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" fjF44pM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 804 schtasks.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4300 wrote to memory of 336 4300 file.exe 80 PID 4300 wrote to memory of 336 4300 file.exe 80 PID 4300 wrote to memory of 336 4300 file.exe 80 PID 336 wrote to memory of 3272 336 fNt91GB.exe 81 PID 336 wrote to memory of 3272 336 fNt91GB.exe 81 PID 336 wrote to memory of 3272 336 fNt91GB.exe 81 PID 3272 wrote to memory of 4248 3272 fjF44pM.exe 82 PID 3272 wrote to memory of 4248 3272 fjF44pM.exe 82 PID 3272 wrote to memory of 4248 3272 fjF44pM.exe 82 PID 4248 wrote to memory of 2152 4248 ayd55CH.exe 83 PID 4248 wrote to memory of 2152 4248 ayd55CH.exe 83 PID 4248 wrote to memory of 2152 4248 ayd55CH.exe 83 PID 3272 wrote to memory of 2816 3272 fjF44pM.exe 84 PID 3272 wrote to memory of 2816 3272 fjF44pM.exe 84 PID 3272 wrote to memory of 2816 3272 fjF44pM.exe 84 PID 2152 wrote to memory of 804 2152 mnolyk.exe 85 PID 2152 wrote to memory of 804 2152 mnolyk.exe 85 PID 2152 wrote to memory of 804 2152 mnolyk.exe 85 PID 2152 wrote to memory of 2348 2152 mnolyk.exe 87 PID 2152 wrote to memory of 2348 2152 mnolyk.exe 87 PID 2152 wrote to memory of 2348 2152 mnolyk.exe 87 PID 2348 wrote to memory of 3708 2348 cmd.exe 89 PID 2348 wrote to memory of 3708 2348 cmd.exe 89 PID 2348 wrote to memory of 3708 2348 cmd.exe 89 PID 2348 wrote to memory of 3156 2348 cmd.exe 90 PID 2348 wrote to memory of 3156 2348 cmd.exe 90 PID 2348 wrote to memory of 3156 2348 cmd.exe 90 PID 2348 wrote to memory of 2416 2348 cmd.exe 91 PID 2348 wrote to memory of 2416 2348 cmd.exe 91 PID 2348 wrote to memory of 2416 2348 cmd.exe 91 PID 2348 wrote to memory of 384 2348 cmd.exe 92 PID 2348 wrote to memory of 384 2348 cmd.exe 92 PID 2348 wrote to memory of 384 2348 cmd.exe 92 PID 2348 wrote to memory of 3124 2348 cmd.exe 93 PID 2348 wrote to memory of 3124 2348 cmd.exe 93 PID 2348 wrote to memory of 3124 2348 cmd.exe 93 PID 2348 wrote to memory of 4444 2348 cmd.exe 94 PID 2348 wrote to memory of 4444 2348 cmd.exe 94 PID 2348 wrote to memory of 4444 2348 cmd.exe 94 PID 2152 wrote to memory of 4392 2152 mnolyk.exe 97 PID 2152 wrote to memory of 4392 2152 mnolyk.exe 97 PID 2152 wrote to memory of 4392 2152 mnolyk.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fNt91GB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fNt91GB.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fjF44pM.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fjF44pM.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ayd55CH.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ayd55CH.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4b9a106e76" /P "Admin:N"&&CACLS "..\4b9a106e76" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3708
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:3156
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:2416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:384
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:N"7⤵PID:3124
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4b9a106e76" /P "Admin:R" /E7⤵PID:4444
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bwJ82he.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\bwJ82he.exe4⤵
- Executes dropped EXE
PID:2816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:4888
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:4184
-
C:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4b9a106e76\mnolyk.exe1⤵
- Executes dropped EXE
PID:3236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
625KB
MD5ca780f30f7dcdb523cb30e95c578e2b0
SHA1b65d5aaa9364d5b2bc06a4e1232c9c1dc5a2388b
SHA25603371d355d9e06fa34dd224c61e9b01f6264ff5d531422ad4d9630ceba3110cb
SHA51257d2fcd3a388e3fbd4d67094fd3fd4d8c2ee94e50d809d2a78a734d6248af8f2d2c94a5c5854dfd45ad4c336535682f08c1f354d8f46a2d7e1da728566b38b58
-
Filesize
625KB
MD5ca780f30f7dcdb523cb30e95c578e2b0
SHA1b65d5aaa9364d5b2bc06a4e1232c9c1dc5a2388b
SHA25603371d355d9e06fa34dd224c61e9b01f6264ff5d531422ad4d9630ceba3110cb
SHA51257d2fcd3a388e3fbd4d67094fd3fd4d8c2ee94e50d809d2a78a734d6248af8f2d2c94a5c5854dfd45ad4c336535682f08c1f354d8f46a2d7e1da728566b38b58
-
Filesize
286KB
MD57f7d80fa0762a89df0a61223a819d65f
SHA1adb000bceaf67ff7ce2dae60cd4c1cd53a1d64ca
SHA256b4ab1ceade63f7a890e22ec68f65d8d10246ce5e41025e6bd012ad65bb5508c4
SHA5129cae6e7a9ffb2f76dc6a128baf32f3d5c5fc855202ee8dea9662636729b5b8ab4a4fde7814d936003c27f8cde4501f6338ab6264f97ee86b7e823014b03b8a11
-
Filesize
286KB
MD57f7d80fa0762a89df0a61223a819d65f
SHA1adb000bceaf67ff7ce2dae60cd4c1cd53a1d64ca
SHA256b4ab1ceade63f7a890e22ec68f65d8d10246ce5e41025e6bd012ad65bb5508c4
SHA5129cae6e7a9ffb2f76dc6a128baf32f3d5c5fc855202ee8dea9662636729b5b8ab4a4fde7814d936003c27f8cde4501f6338ab6264f97ee86b7e823014b03b8a11
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
236KB
MD58bb923c4d81284daef7896e5682df6c6
SHA167e34a96b77e44b666c5479f540995bdeacf5de2
SHA2569b0410052289a8416a458401fbb9a74d6361f4769465431b209f32151d7c6f21
SHA5122daed03277a343db5fcb22e26baea5cda41de39dc825fe0aad51f6ec181b8f38f09427f27fb58ffd179f37032600d107ef772cc6275f7d0d62899c6cd3f8aff7
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
175KB
MD569f79e05d0c83aee310d9adfe5aa7f2b
SHA1485c490180380051a14316564fbda07723be11b1
SHA256c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2
SHA512f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba
-
Filesize
89KB
MD5c79b74d8fec5e7e2ba2f1789fd582a15
SHA178a1e5d99dbaccc5e07b125e1dfb280112cb3128
SHA256b5bd049d32f0faeea6ce65a0f0d326de5bc4427a7c1ad24bfb0ea050c1dec7d3
SHA5120debfc54904fd538cfb1fc648d18f90a991337200b3decf74b28ac2f341843fb3bab4f45bc92cfec333b18dfff9cc136854462e79054a39926a7bd8ee2e057ba