Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe
Resource
win10v2004-20230220-en
General
-
Target
b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe
-
Size
1.2MB
-
MD5
ab67c1651f4c05d94d91162d3e3e6b2f
-
SHA1
eed26c7077d8d2401ffc67924a87ee45e1480852
-
SHA256
b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7
-
SHA512
4b1566f87896c3cb445bfdfd029812cdea5ef8b03f2fe68847cca2b887524d64da1b2d39a3804421af0a1d64f40acb2116df010f8b9000b854e46f9bdc3fb82d
-
SSDEEP
24576:zyaBBra9rUv8jHFZIaXKmiKPumFOq2FcJi3wnfXV9dCTw:GaBBrSrUEzvfXojdN2JPfXbdCT
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1992 z59412567.exe 1952 z69272784.exe 1944 z49654519.exe 1744 s95028090.exe 532 1.exe 772 t19280905.exe -
Loads dropped DLL 13 IoCs
pid Process 2024 b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe 1992 z59412567.exe 1992 z59412567.exe 1952 z69272784.exe 1952 z69272784.exe 1944 z49654519.exe 1944 z49654519.exe 1944 z49654519.exe 1744 s95028090.exe 1744 s95028090.exe 532 1.exe 1944 z49654519.exe 772 t19280905.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z49654519.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z49654519.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z59412567.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z59412567.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z69272784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z69272784.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1744 s95028090.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1992 2024 b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe 26 PID 2024 wrote to memory of 1992 2024 b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe 26 PID 2024 wrote to memory of 1992 2024 b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe 26 PID 2024 wrote to memory of 1992 2024 b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe 26 PID 2024 wrote to memory of 1992 2024 b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe 26 PID 2024 wrote to memory of 1992 2024 b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe 26 PID 2024 wrote to memory of 1992 2024 b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe 26 PID 1992 wrote to memory of 1952 1992 z59412567.exe 27 PID 1992 wrote to memory of 1952 1992 z59412567.exe 27 PID 1992 wrote to memory of 1952 1992 z59412567.exe 27 PID 1992 wrote to memory of 1952 1992 z59412567.exe 27 PID 1992 wrote to memory of 1952 1992 z59412567.exe 27 PID 1992 wrote to memory of 1952 1992 z59412567.exe 27 PID 1992 wrote to memory of 1952 1992 z59412567.exe 27 PID 1952 wrote to memory of 1944 1952 z69272784.exe 28 PID 1952 wrote to memory of 1944 1952 z69272784.exe 28 PID 1952 wrote to memory of 1944 1952 z69272784.exe 28 PID 1952 wrote to memory of 1944 1952 z69272784.exe 28 PID 1952 wrote to memory of 1944 1952 z69272784.exe 28 PID 1952 wrote to memory of 1944 1952 z69272784.exe 28 PID 1952 wrote to memory of 1944 1952 z69272784.exe 28 PID 1944 wrote to memory of 1744 1944 z49654519.exe 29 PID 1944 wrote to memory of 1744 1944 z49654519.exe 29 PID 1944 wrote to memory of 1744 1944 z49654519.exe 29 PID 1944 wrote to memory of 1744 1944 z49654519.exe 29 PID 1944 wrote to memory of 1744 1944 z49654519.exe 29 PID 1944 wrote to memory of 1744 1944 z49654519.exe 29 PID 1944 wrote to memory of 1744 1944 z49654519.exe 29 PID 1744 wrote to memory of 532 1744 s95028090.exe 30 PID 1744 wrote to memory of 532 1744 s95028090.exe 30 PID 1744 wrote to memory of 532 1744 s95028090.exe 30 PID 1744 wrote to memory of 532 1744 s95028090.exe 30 PID 1744 wrote to memory of 532 1744 s95028090.exe 30 PID 1744 wrote to memory of 532 1744 s95028090.exe 30 PID 1744 wrote to memory of 532 1744 s95028090.exe 30 PID 1944 wrote to memory of 772 1944 z49654519.exe 31 PID 1944 wrote to memory of 772 1944 z49654519.exe 31 PID 1944 wrote to memory of 772 1944 z49654519.exe 31 PID 1944 wrote to memory of 772 1944 z49654519.exe 31 PID 1944 wrote to memory of 772 1944 z49654519.exe 31 PID 1944 wrote to memory of 772 1944 z49654519.exe 31 PID 1944 wrote to memory of 772 1944 z49654519.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe"C:\Users\Admin\AppData\Local\Temp\b6983b275bbcfc343b7d7cca8d102f2b940165cedf1301c727165953d2b34ff7.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59412567.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z59412567.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z69272784.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z69272784.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z49654519.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z49654519.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s95028090.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s95028090.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t19280905.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t19280905.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:772
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD58e5d294501aba2bb44f69b3a25ef14ae
SHA14aad0b3c84299346f348c053ada168c6f6d86e66
SHA25676858caa9bde961c9c100b5603096730c03b4b3848199afe17bd38ccec1e7220
SHA51273b62df70cfb770b454a12b4015aab6fa21aab8e8102aaa50a53c040832d5dcfd89589d43cc3aad91a37925aee9c7344a8830c85ce459ba3ea792b01e0a6e01b
-
Filesize
1.0MB
MD58e5d294501aba2bb44f69b3a25ef14ae
SHA14aad0b3c84299346f348c053ada168c6f6d86e66
SHA25676858caa9bde961c9c100b5603096730c03b4b3848199afe17bd38ccec1e7220
SHA51273b62df70cfb770b454a12b4015aab6fa21aab8e8102aaa50a53c040832d5dcfd89589d43cc3aad91a37925aee9c7344a8830c85ce459ba3ea792b01e0a6e01b
-
Filesize
764KB
MD58d84805181f94fc17c6966fc2669bf19
SHA108335302d537b610cfdaae3441d09b0afec946ec
SHA2568f51bdb793054460eb03ae4a7abc306774cf34a073a9e478ede769b96a8d47bb
SHA512d3d9c2b0231b19ce6c6c3958d421a6cc3a3be52143e6c9af9dc861d75f7ee38d80c757f764151c8524f7a6ce8bd6a7b284db9845f0c2c6edc02b533d6bcbfa2a
-
Filesize
764KB
MD58d84805181f94fc17c6966fc2669bf19
SHA108335302d537b610cfdaae3441d09b0afec946ec
SHA2568f51bdb793054460eb03ae4a7abc306774cf34a073a9e478ede769b96a8d47bb
SHA512d3d9c2b0231b19ce6c6c3958d421a6cc3a3be52143e6c9af9dc861d75f7ee38d80c757f764151c8524f7a6ce8bd6a7b284db9845f0c2c6edc02b533d6bcbfa2a
-
Filesize
582KB
MD52b788e55abc9ae9e1972a0f797f64f7b
SHA1e8c0a20aa5698e892ddd766e054e1637818aa0e8
SHA2568ffa021f6dddbc97dab175ec87fea33e7c733d3fe92ee9f273b28f5e882cadf8
SHA512f02e81fbc0da42c58cba25561c4cbe7c7935892f6fa90684118708b54fe4a5e4c2b411984adbcb30e0e47238363f0acb74c5447d11d38f7e12c40eba055f2bb0
-
Filesize
582KB
MD52b788e55abc9ae9e1972a0f797f64f7b
SHA1e8c0a20aa5698e892ddd766e054e1637818aa0e8
SHA2568ffa021f6dddbc97dab175ec87fea33e7c733d3fe92ee9f273b28f5e882cadf8
SHA512f02e81fbc0da42c58cba25561c4cbe7c7935892f6fa90684118708b54fe4a5e4c2b411984adbcb30e0e47238363f0acb74c5447d11d38f7e12c40eba055f2bb0
-
Filesize
582KB
MD5d71b4e3ce87a69c089b26241de9b266f
SHA1ce8fd7b2be7f7595f54686339408e4e1ee6c1fb2
SHA2563c899aaaa29ca527e37b2728b1fe4a203438b4d676d78d08b930d80014e19c86
SHA5123c91153b8d7d43d199b484b34c79a37155d55895de7f61faa4b13350d88cd54dffd2bf8cc9825e276e3372fce76aa9e503e29c3806ae380ba93aa7c46c80fffa
-
Filesize
582KB
MD5d71b4e3ce87a69c089b26241de9b266f
SHA1ce8fd7b2be7f7595f54686339408e4e1ee6c1fb2
SHA2563c899aaaa29ca527e37b2728b1fe4a203438b4d676d78d08b930d80014e19c86
SHA5123c91153b8d7d43d199b484b34c79a37155d55895de7f61faa4b13350d88cd54dffd2bf8cc9825e276e3372fce76aa9e503e29c3806ae380ba93aa7c46c80fffa
-
Filesize
582KB
MD5d71b4e3ce87a69c089b26241de9b266f
SHA1ce8fd7b2be7f7595f54686339408e4e1ee6c1fb2
SHA2563c899aaaa29ca527e37b2728b1fe4a203438b4d676d78d08b930d80014e19c86
SHA5123c91153b8d7d43d199b484b34c79a37155d55895de7f61faa4b13350d88cd54dffd2bf8cc9825e276e3372fce76aa9e503e29c3806ae380ba93aa7c46c80fffa
-
Filesize
169KB
MD5794f259b300ed3bb56d8560893548773
SHA1848d56403cf25643bcc20af0f500fd803cc6d664
SHA25685ebf9809cd97164c26d612870f3add40ace7c1a77efdb2e86dd43906c1989b4
SHA512025794063a45eafb18118d6875a446ad44a0d323e6c8b92dcd88f4d6ce341b1c674b0172b79cd99e1997443289ab40550d17dd52fac8e10fc962a4f02bc47bca
-
Filesize
169KB
MD5794f259b300ed3bb56d8560893548773
SHA1848d56403cf25643bcc20af0f500fd803cc6d664
SHA25685ebf9809cd97164c26d612870f3add40ace7c1a77efdb2e86dd43906c1989b4
SHA512025794063a45eafb18118d6875a446ad44a0d323e6c8b92dcd88f4d6ce341b1c674b0172b79cd99e1997443289ab40550d17dd52fac8e10fc962a4f02bc47bca
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD58e5d294501aba2bb44f69b3a25ef14ae
SHA14aad0b3c84299346f348c053ada168c6f6d86e66
SHA25676858caa9bde961c9c100b5603096730c03b4b3848199afe17bd38ccec1e7220
SHA51273b62df70cfb770b454a12b4015aab6fa21aab8e8102aaa50a53c040832d5dcfd89589d43cc3aad91a37925aee9c7344a8830c85ce459ba3ea792b01e0a6e01b
-
Filesize
1.0MB
MD58e5d294501aba2bb44f69b3a25ef14ae
SHA14aad0b3c84299346f348c053ada168c6f6d86e66
SHA25676858caa9bde961c9c100b5603096730c03b4b3848199afe17bd38ccec1e7220
SHA51273b62df70cfb770b454a12b4015aab6fa21aab8e8102aaa50a53c040832d5dcfd89589d43cc3aad91a37925aee9c7344a8830c85ce459ba3ea792b01e0a6e01b
-
Filesize
764KB
MD58d84805181f94fc17c6966fc2669bf19
SHA108335302d537b610cfdaae3441d09b0afec946ec
SHA2568f51bdb793054460eb03ae4a7abc306774cf34a073a9e478ede769b96a8d47bb
SHA512d3d9c2b0231b19ce6c6c3958d421a6cc3a3be52143e6c9af9dc861d75f7ee38d80c757f764151c8524f7a6ce8bd6a7b284db9845f0c2c6edc02b533d6bcbfa2a
-
Filesize
764KB
MD58d84805181f94fc17c6966fc2669bf19
SHA108335302d537b610cfdaae3441d09b0afec946ec
SHA2568f51bdb793054460eb03ae4a7abc306774cf34a073a9e478ede769b96a8d47bb
SHA512d3d9c2b0231b19ce6c6c3958d421a6cc3a3be52143e6c9af9dc861d75f7ee38d80c757f764151c8524f7a6ce8bd6a7b284db9845f0c2c6edc02b533d6bcbfa2a
-
Filesize
582KB
MD52b788e55abc9ae9e1972a0f797f64f7b
SHA1e8c0a20aa5698e892ddd766e054e1637818aa0e8
SHA2568ffa021f6dddbc97dab175ec87fea33e7c733d3fe92ee9f273b28f5e882cadf8
SHA512f02e81fbc0da42c58cba25561c4cbe7c7935892f6fa90684118708b54fe4a5e4c2b411984adbcb30e0e47238363f0acb74c5447d11d38f7e12c40eba055f2bb0
-
Filesize
582KB
MD52b788e55abc9ae9e1972a0f797f64f7b
SHA1e8c0a20aa5698e892ddd766e054e1637818aa0e8
SHA2568ffa021f6dddbc97dab175ec87fea33e7c733d3fe92ee9f273b28f5e882cadf8
SHA512f02e81fbc0da42c58cba25561c4cbe7c7935892f6fa90684118708b54fe4a5e4c2b411984adbcb30e0e47238363f0acb74c5447d11d38f7e12c40eba055f2bb0
-
Filesize
582KB
MD5d71b4e3ce87a69c089b26241de9b266f
SHA1ce8fd7b2be7f7595f54686339408e4e1ee6c1fb2
SHA2563c899aaaa29ca527e37b2728b1fe4a203438b4d676d78d08b930d80014e19c86
SHA5123c91153b8d7d43d199b484b34c79a37155d55895de7f61faa4b13350d88cd54dffd2bf8cc9825e276e3372fce76aa9e503e29c3806ae380ba93aa7c46c80fffa
-
Filesize
582KB
MD5d71b4e3ce87a69c089b26241de9b266f
SHA1ce8fd7b2be7f7595f54686339408e4e1ee6c1fb2
SHA2563c899aaaa29ca527e37b2728b1fe4a203438b4d676d78d08b930d80014e19c86
SHA5123c91153b8d7d43d199b484b34c79a37155d55895de7f61faa4b13350d88cd54dffd2bf8cc9825e276e3372fce76aa9e503e29c3806ae380ba93aa7c46c80fffa
-
Filesize
582KB
MD5d71b4e3ce87a69c089b26241de9b266f
SHA1ce8fd7b2be7f7595f54686339408e4e1ee6c1fb2
SHA2563c899aaaa29ca527e37b2728b1fe4a203438b4d676d78d08b930d80014e19c86
SHA5123c91153b8d7d43d199b484b34c79a37155d55895de7f61faa4b13350d88cd54dffd2bf8cc9825e276e3372fce76aa9e503e29c3806ae380ba93aa7c46c80fffa
-
Filesize
169KB
MD5794f259b300ed3bb56d8560893548773
SHA1848d56403cf25643bcc20af0f500fd803cc6d664
SHA25685ebf9809cd97164c26d612870f3add40ace7c1a77efdb2e86dd43906c1989b4
SHA512025794063a45eafb18118d6875a446ad44a0d323e6c8b92dcd88f4d6ce341b1c674b0172b79cd99e1997443289ab40550d17dd52fac8e10fc962a4f02bc47bca
-
Filesize
169KB
MD5794f259b300ed3bb56d8560893548773
SHA1848d56403cf25643bcc20af0f500fd803cc6d664
SHA25685ebf9809cd97164c26d612870f3add40ace7c1a77efdb2e86dd43906c1989b4
SHA512025794063a45eafb18118d6875a446ad44a0d323e6c8b92dcd88f4d6ce341b1c674b0172b79cd99e1997443289ab40550d17dd52fac8e10fc962a4f02bc47bca
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf