Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe
Resource
win10v2004-20230220-en
General
-
Target
43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe
-
Size
774KB
-
MD5
6db523ecaccbecc16f24cc6252e339c1
-
SHA1
fb0843ded0f9021272deaa029a33322c7816870f
-
SHA256
43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9
-
SHA512
1ed8ba8df4a91f4f49fda2dc92248490d44ac47469d3823fe48900f436806fe17e85ff1b2387f3eaa635d293eab22407541f58fa0c14fe39121066b506460c64
-
SSDEEP
12288:5y90ZDybGXaGAaNwj9QXU92ImPUSvAYd/LVaP4b7Kvdbj6QcqY4yg0RGAMH:5yoLabQX82ItSoYvIJj6QhYcAMH
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
donka
185.161.248.73:4164
-
auth_value
ebd13e189a2e7c34425e5f4c46bb7a55
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1140 x89439160.exe 1516 m83891755.exe 608 1.exe 1628 n74153778.exe -
Loads dropped DLL 9 IoCs
pid Process 1416 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe 1140 x89439160.exe 1140 x89439160.exe 1140 x89439160.exe 1516 m83891755.exe 1516 m83891755.exe 608 1.exe 1140 x89439160.exe 1628 n74153778.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x89439160.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x89439160.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1516 m83891755.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1140 1416 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe 28 PID 1416 wrote to memory of 1140 1416 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe 28 PID 1416 wrote to memory of 1140 1416 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe 28 PID 1416 wrote to memory of 1140 1416 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe 28 PID 1416 wrote to memory of 1140 1416 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe 28 PID 1416 wrote to memory of 1140 1416 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe 28 PID 1416 wrote to memory of 1140 1416 43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe 28 PID 1140 wrote to memory of 1516 1140 x89439160.exe 29 PID 1140 wrote to memory of 1516 1140 x89439160.exe 29 PID 1140 wrote to memory of 1516 1140 x89439160.exe 29 PID 1140 wrote to memory of 1516 1140 x89439160.exe 29 PID 1140 wrote to memory of 1516 1140 x89439160.exe 29 PID 1140 wrote to memory of 1516 1140 x89439160.exe 29 PID 1140 wrote to memory of 1516 1140 x89439160.exe 29 PID 1516 wrote to memory of 608 1516 m83891755.exe 30 PID 1516 wrote to memory of 608 1516 m83891755.exe 30 PID 1516 wrote to memory of 608 1516 m83891755.exe 30 PID 1516 wrote to memory of 608 1516 m83891755.exe 30 PID 1516 wrote to memory of 608 1516 m83891755.exe 30 PID 1516 wrote to memory of 608 1516 m83891755.exe 30 PID 1516 wrote to memory of 608 1516 m83891755.exe 30 PID 1140 wrote to memory of 1628 1140 x89439160.exe 31 PID 1140 wrote to memory of 1628 1140 x89439160.exe 31 PID 1140 wrote to memory of 1628 1140 x89439160.exe 31 PID 1140 wrote to memory of 1628 1140 x89439160.exe 31 PID 1140 wrote to memory of 1628 1140 x89439160.exe 31 PID 1140 wrote to memory of 1628 1140 x89439160.exe 31 PID 1140 wrote to memory of 1628 1140 x89439160.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe"C:\Users\Admin\AppData\Local\Temp\43763b2c538b0745b99d3e7c2273542194dd64bb7a81a48b6c55128f27c73ce9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x89439160.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x89439160.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m83891755.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m83891755.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:608
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n74153778.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n74153778.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD502b98db89472cd2515f0de4df88b89a3
SHA18c33f4ff038ebc54ab1eacb0eadbd3fd6e3a5f71
SHA2564c9b3e8cc3a92fc8b65f1422b8f2a23e93c60114eeaccde82857b6a21d84ea69
SHA512d81b0081f0634a6f084e6e063186f5592393b9fe9608c9c2b71f50da26e0dbc47423ddf636e4da4781e75ca147d6a778ce67050300f1b1cf3e93324c50466508
-
Filesize
570KB
MD502b98db89472cd2515f0de4df88b89a3
SHA18c33f4ff038ebc54ab1eacb0eadbd3fd6e3a5f71
SHA2564c9b3e8cc3a92fc8b65f1422b8f2a23e93c60114eeaccde82857b6a21d84ea69
SHA512d81b0081f0634a6f084e6e063186f5592393b9fe9608c9c2b71f50da26e0dbc47423ddf636e4da4781e75ca147d6a778ce67050300f1b1cf3e93324c50466508
-
Filesize
476KB
MD5504b1075fd8b0c2b2b281d3676c84932
SHA192f08e90cfac8d08e20512c820326c8a01d9a811
SHA2564bb531cc567f94141a240e36216390a6959df76b5f02504efe2b5f1e77290b3b
SHA5126b2584378ac5716e9fe89b73280f1215aefe9b3d0b69c7b14ce0bb15c012db9f97d8bda5496a86e0da3b277985a6c6d8ed409ababc2d18327c3c137a3721d02c
-
Filesize
476KB
MD5504b1075fd8b0c2b2b281d3676c84932
SHA192f08e90cfac8d08e20512c820326c8a01d9a811
SHA2564bb531cc567f94141a240e36216390a6959df76b5f02504efe2b5f1e77290b3b
SHA5126b2584378ac5716e9fe89b73280f1215aefe9b3d0b69c7b14ce0bb15c012db9f97d8bda5496a86e0da3b277985a6c6d8ed409ababc2d18327c3c137a3721d02c
-
Filesize
476KB
MD5504b1075fd8b0c2b2b281d3676c84932
SHA192f08e90cfac8d08e20512c820326c8a01d9a811
SHA2564bb531cc567f94141a240e36216390a6959df76b5f02504efe2b5f1e77290b3b
SHA5126b2584378ac5716e9fe89b73280f1215aefe9b3d0b69c7b14ce0bb15c012db9f97d8bda5496a86e0da3b277985a6c6d8ed409ababc2d18327c3c137a3721d02c
-
Filesize
168KB
MD510aaccf3277f9d9c24a78662fc803a56
SHA1a9a4365355437bf12c61a088154165f83043e2de
SHA2566aaedebdae15ff74eeaeafd5f6ecefe1c613f0d8b1e7a02c608b85aa7db33606
SHA512c35207b5c33e8e74bbf446515ae1b927cc68e1e4abdbf22624204b613274924df024605a8fd66d7c2e8a4d4f81814ead558e37d5d61c31de0f8ae110ade3f1c8
-
Filesize
168KB
MD510aaccf3277f9d9c24a78662fc803a56
SHA1a9a4365355437bf12c61a088154165f83043e2de
SHA2566aaedebdae15ff74eeaeafd5f6ecefe1c613f0d8b1e7a02c608b85aa7db33606
SHA512c35207b5c33e8e74bbf446515ae1b927cc68e1e4abdbf22624204b613274924df024605a8fd66d7c2e8a4d4f81814ead558e37d5d61c31de0f8ae110ade3f1c8
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
570KB
MD502b98db89472cd2515f0de4df88b89a3
SHA18c33f4ff038ebc54ab1eacb0eadbd3fd6e3a5f71
SHA2564c9b3e8cc3a92fc8b65f1422b8f2a23e93c60114eeaccde82857b6a21d84ea69
SHA512d81b0081f0634a6f084e6e063186f5592393b9fe9608c9c2b71f50da26e0dbc47423ddf636e4da4781e75ca147d6a778ce67050300f1b1cf3e93324c50466508
-
Filesize
570KB
MD502b98db89472cd2515f0de4df88b89a3
SHA18c33f4ff038ebc54ab1eacb0eadbd3fd6e3a5f71
SHA2564c9b3e8cc3a92fc8b65f1422b8f2a23e93c60114eeaccde82857b6a21d84ea69
SHA512d81b0081f0634a6f084e6e063186f5592393b9fe9608c9c2b71f50da26e0dbc47423ddf636e4da4781e75ca147d6a778ce67050300f1b1cf3e93324c50466508
-
Filesize
476KB
MD5504b1075fd8b0c2b2b281d3676c84932
SHA192f08e90cfac8d08e20512c820326c8a01d9a811
SHA2564bb531cc567f94141a240e36216390a6959df76b5f02504efe2b5f1e77290b3b
SHA5126b2584378ac5716e9fe89b73280f1215aefe9b3d0b69c7b14ce0bb15c012db9f97d8bda5496a86e0da3b277985a6c6d8ed409ababc2d18327c3c137a3721d02c
-
Filesize
476KB
MD5504b1075fd8b0c2b2b281d3676c84932
SHA192f08e90cfac8d08e20512c820326c8a01d9a811
SHA2564bb531cc567f94141a240e36216390a6959df76b5f02504efe2b5f1e77290b3b
SHA5126b2584378ac5716e9fe89b73280f1215aefe9b3d0b69c7b14ce0bb15c012db9f97d8bda5496a86e0da3b277985a6c6d8ed409ababc2d18327c3c137a3721d02c
-
Filesize
476KB
MD5504b1075fd8b0c2b2b281d3676c84932
SHA192f08e90cfac8d08e20512c820326c8a01d9a811
SHA2564bb531cc567f94141a240e36216390a6959df76b5f02504efe2b5f1e77290b3b
SHA5126b2584378ac5716e9fe89b73280f1215aefe9b3d0b69c7b14ce0bb15c012db9f97d8bda5496a86e0da3b277985a6c6d8ed409ababc2d18327c3c137a3721d02c
-
Filesize
168KB
MD510aaccf3277f9d9c24a78662fc803a56
SHA1a9a4365355437bf12c61a088154165f83043e2de
SHA2566aaedebdae15ff74eeaeafd5f6ecefe1c613f0d8b1e7a02c608b85aa7db33606
SHA512c35207b5c33e8e74bbf446515ae1b927cc68e1e4abdbf22624204b613274924df024605a8fd66d7c2e8a4d4f81814ead558e37d5d61c31de0f8ae110ade3f1c8
-
Filesize
168KB
MD510aaccf3277f9d9c24a78662fc803a56
SHA1a9a4365355437bf12c61a088154165f83043e2de
SHA2566aaedebdae15ff74eeaeafd5f6ecefe1c613f0d8b1e7a02c608b85aa7db33606
SHA512c35207b5c33e8e74bbf446515ae1b927cc68e1e4abdbf22624204b613274924df024605a8fd66d7c2e8a4d4f81814ead558e37d5d61c31de0f8ae110ade3f1c8
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf