Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
191s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2023, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
c01d52086b9777a6c07e2d6fe3c399b5acd28a5991f266433ef9310eae8e8d20.exe
Resource
win10v2004-20221111-en
General
-
Target
c01d52086b9777a6c07e2d6fe3c399b5acd28a5991f266433ef9310eae8e8d20.exe
-
Size
796KB
-
MD5
09ff6b1220346c5a2d24cffebbad64d8
-
SHA1
9f6ab6980c5bf67f423778b8795d706ce4b997e6
-
SHA256
c01d52086b9777a6c07e2d6fe3c399b5acd28a5991f266433ef9310eae8e8d20
-
SHA512
90fae5228d2f421b3fabbfe16bd65179eb4ac9ca7e209a374c36aa9b2f7b00956e665e8125998ec0f2dd717b68d15b7a53e1f44c54ffbfaf2286e696d681b1a0
-
SSDEEP
12288:BMrDy90FnHVOJsgSmpGigMDetsvsqA881o6IPY45Bs3QDrNIm1UsTQxj7gBG:Gymn9YMsEl881o6IQAeXGi58G
Malware Config
Extracted
redline
fusa
193.233.20.12:4132
-
auth_value
a08b2f01bd2af756e38c5dd60e87e697
Extracted
amadey
3.66
62.204.41.5/Bu58Ngs/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation mUg33.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 7 IoCs
pid Process 1548 syT11zK.exe 2248 sAa26hK.exe 1028 kAY90QB.exe 3504 mUg33.exe 4068 mnolyk.exe 4404 nxC25Fg.exe 3364 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4396 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sAa26hK.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c01d52086b9777a6c07e2d6fe3c399b5acd28a5991f266433ef9310eae8e8d20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c01d52086b9777a6c07e2d6fe3c399b5acd28a5991f266433ef9310eae8e8d20.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce syT11zK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" syT11zK.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sAa26hK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 788 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1028 kAY90QB.exe 1028 kAY90QB.exe 4404 nxC25Fg.exe 4404 nxC25Fg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1028 kAY90QB.exe Token: SeDebugPrivilege 4404 nxC25Fg.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4280 wrote to memory of 1548 4280 c01d52086b9777a6c07e2d6fe3c399b5acd28a5991f266433ef9310eae8e8d20.exe 79 PID 4280 wrote to memory of 1548 4280 c01d52086b9777a6c07e2d6fe3c399b5acd28a5991f266433ef9310eae8e8d20.exe 79 PID 4280 wrote to memory of 1548 4280 c01d52086b9777a6c07e2d6fe3c399b5acd28a5991f266433ef9310eae8e8d20.exe 79 PID 1548 wrote to memory of 2248 1548 syT11zK.exe 80 PID 1548 wrote to memory of 2248 1548 syT11zK.exe 80 PID 1548 wrote to memory of 2248 1548 syT11zK.exe 80 PID 2248 wrote to memory of 1028 2248 sAa26hK.exe 81 PID 2248 wrote to memory of 1028 2248 sAa26hK.exe 81 PID 2248 wrote to memory of 1028 2248 sAa26hK.exe 81 PID 2248 wrote to memory of 3504 2248 sAa26hK.exe 82 PID 2248 wrote to memory of 3504 2248 sAa26hK.exe 82 PID 2248 wrote to memory of 3504 2248 sAa26hK.exe 82 PID 3504 wrote to memory of 4068 3504 mUg33.exe 83 PID 3504 wrote to memory of 4068 3504 mUg33.exe 83 PID 3504 wrote to memory of 4068 3504 mUg33.exe 83 PID 1548 wrote to memory of 4404 1548 syT11zK.exe 84 PID 1548 wrote to memory of 4404 1548 syT11zK.exe 84 PID 1548 wrote to memory of 4404 1548 syT11zK.exe 84 PID 4068 wrote to memory of 788 4068 mnolyk.exe 85 PID 4068 wrote to memory of 788 4068 mnolyk.exe 85 PID 4068 wrote to memory of 788 4068 mnolyk.exe 85 PID 4068 wrote to memory of 4636 4068 mnolyk.exe 87 PID 4068 wrote to memory of 4636 4068 mnolyk.exe 87 PID 4068 wrote to memory of 4636 4068 mnolyk.exe 87 PID 4636 wrote to memory of 4316 4636 cmd.exe 89 PID 4636 wrote to memory of 4316 4636 cmd.exe 89 PID 4636 wrote to memory of 4316 4636 cmd.exe 89 PID 4636 wrote to memory of 3056 4636 cmd.exe 90 PID 4636 wrote to memory of 3056 4636 cmd.exe 90 PID 4636 wrote to memory of 3056 4636 cmd.exe 90 PID 4636 wrote to memory of 4372 4636 cmd.exe 91 PID 4636 wrote to memory of 4372 4636 cmd.exe 91 PID 4636 wrote to memory of 4372 4636 cmd.exe 91 PID 4636 wrote to memory of 3156 4636 cmd.exe 92 PID 4636 wrote to memory of 3156 4636 cmd.exe 92 PID 4636 wrote to memory of 3156 4636 cmd.exe 92 PID 4636 wrote to memory of 3660 4636 cmd.exe 93 PID 4636 wrote to memory of 3660 4636 cmd.exe 93 PID 4636 wrote to memory of 3660 4636 cmd.exe 93 PID 4636 wrote to memory of 3692 4636 cmd.exe 94 PID 4636 wrote to memory of 3692 4636 cmd.exe 94 PID 4636 wrote to memory of 3692 4636 cmd.exe 94 PID 4068 wrote to memory of 4396 4068 mnolyk.exe 99 PID 4068 wrote to memory of 4396 4068 mnolyk.exe 99 PID 4068 wrote to memory of 4396 4068 mnolyk.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\c01d52086b9777a6c07e2d6fe3c399b5acd28a5991f266433ef9310eae8e8d20.exe"C:\Users\Admin\AppData\Local\Temp\c01d52086b9777a6c07e2d6fe3c399b5acd28a5991f266433ef9310eae8e8d20.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\syT11zK.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\syT11zK.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sAa26hK.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sAa26hK.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kAY90QB.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kAY90QB.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mUg33.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mUg33.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F6⤵
- Creates scheduled task(s)
PID:788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"7⤵PID:3056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E7⤵PID:4372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3156
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:N"7⤵PID:3660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\5eb6b96734" /P "Admin:R" /E7⤵PID:3692
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4396
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nxC25Fg.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nxC25Fg.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
-
C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe1⤵
- Executes dropped EXE
PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4404 -ip 44041⤵PID:1012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
692KB
MD5702ce83d807846451636afdd742d1857
SHA18054739a47f252609ba65649659a8da2d8833421
SHA256a2fbadf6b9873157f1d0c1bb4c61b574226b3ccb7caf3190a890255f269672c6
SHA51269a531598e2df60d9a44a7688d94aa6399e508053af651abab1ff9f7dba907e5bba9ac99473cf14c96ed9e1d69df7a705699cf7dab3d0d4b1969fc2fdecffcf5
-
Filesize
692KB
MD5702ce83d807846451636afdd742d1857
SHA18054739a47f252609ba65649659a8da2d8833421
SHA256a2fbadf6b9873157f1d0c1bb4c61b574226b3ccb7caf3190a890255f269672c6
SHA51269a531598e2df60d9a44a7688d94aa6399e508053af651abab1ff9f7dba907e5bba9ac99473cf14c96ed9e1d69df7a705699cf7dab3d0d4b1969fc2fdecffcf5
-
Filesize
485KB
MD52ffd688179ef975ec35aef8a6e316476
SHA1570354d98052429ef91e3349dbb8966b3cd16bbb
SHA256ed2e175f5c92c9f62319b09347d73179d650b1f5f176f388e5b4a29d288a8d38
SHA5120640bd4648548ff471d2f49e0cf21927677ec951080dfe752f414d24aad2669604dcda7761286e22736b0332fa946655fb51d1add0e722be4505b9c95b4dcda5
-
Filesize
485KB
MD52ffd688179ef975ec35aef8a6e316476
SHA1570354d98052429ef91e3349dbb8966b3cd16bbb
SHA256ed2e175f5c92c9f62319b09347d73179d650b1f5f176f388e5b4a29d288a8d38
SHA5120640bd4648548ff471d2f49e0cf21927677ec951080dfe752f414d24aad2669604dcda7761286e22736b0332fa946655fb51d1add0e722be4505b9c95b4dcda5
-
Filesize
286KB
MD5b02c99a822ea724f10e91b1ccfd28c24
SHA1cea0c9da10e5e11117ba60a0aa7108c681f06417
SHA256f1600b959e68d47b00d3a8bb3b58a994eeae43d8680b57336569855161689c95
SHA5122b295bb743728c176a6a582b412b0e24fa73170b5192be217a091cf726c339608dc62cf60e288d229865f114806f053c73170c3c32e726a3321ac98c00cd1e3c
-
Filesize
286KB
MD5b02c99a822ea724f10e91b1ccfd28c24
SHA1cea0c9da10e5e11117ba60a0aa7108c681f06417
SHA256f1600b959e68d47b00d3a8bb3b58a994eeae43d8680b57336569855161689c95
SHA5122b295bb743728c176a6a582b412b0e24fa73170b5192be217a091cf726c339608dc62cf60e288d229865f114806f053c73170c3c32e726a3321ac98c00cd1e3c
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
175KB
MD5da6f3bef8abc85bd09f50783059964e3
SHA1a0f25f60ec1896c4c920ea397f40e6ce29724322
SHA256e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b
SHA5124d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
236KB
MD5fde8915d251fada3a37530421eb29dcf
SHA144386a8947ddfab993409945dae05a772a13e047
SHA2566cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116
SHA512ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3
-
Filesize
89KB
MD59221a421a3e777eb7d4ce55e474bcc4a
SHA1c96d7bd7ccbf9352d50527bff472595b3dc5298e
SHA25610ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8
SHA51263ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3