Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 20:44

General

  • Target

    IContratoQK.msi

  • Size

    6.9MB

  • MD5

    923ec566997f9c002d9cf7397c79eb4a

  • SHA1

    2bea51e5e6ab96a4669e34a903e30a4b97580e46

  • SHA256

    9fb4b0494ce8e71c1af8bc538895731ea6da666d8efe405182baa3328aff9966

  • SHA512

    79b1f04d66d1a2b237d57c2f341dbec2e2c41df8089ef38f1f402e6b77d91224a620b6c6c424742d7f7460f5fe60aaaaaed3e3020376d514eb49df2b56eb6e35

  • SSDEEP

    196608:vSc73CzEFE2cseSF2fFpuUaMo8zcdKmGZA+:KI3CzSE2BXFBUaw9/

Malware Config

Signatures

  • Detects Redline Stealer samples 8 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\IContratoQK.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1560
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 763C42B227205FD0D0D49F43A5248971
      2⤵
      • Loads dropped DLL
      PID:808
    • C:\Users\Admin\Desktop\Quiz Press\Glys.exe
      "C:\Users\Admin\Desktop\Quiz Press\Glys.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      PID:1788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\6c1597.rbs

    Filesize

    2KB

    MD5

    d0a508c91d144b54b7b0852150902f80

    SHA1

    ad523050856490be29e8c32a2478752ec7621d22

    SHA256

    20e36118b64ca24f3dad208be14447b9e2d9826d9e187ff4ce5510661e43347e

    SHA512

    a8ee820875ca1988f6d22eb307ca0aa1cb484b1585c6398b8f07c3666af387c22c7a63d6097175a9c83ab2194773e0e679dcd8b51ae1e5628970991eceda2591

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    c24ee168284b22e37ac28ee395af8835

    SHA1

    2d215c1a50b54ecd9e6f5e2fd48097c5fe223f4c

    SHA256

    f4669a397ac57be9dd61abab4569ce3fd57aae44d76568c8dd5df1216ca0a61a

    SHA512

    74a01171fd50e2e61c06cf0534d09ccacf82b826bce4fe0fbd2e8d5aabea35bf075f2f909177e4f5f2604ac5a8f17185720d18fad27330492387393010cab661

  • C:\Users\Admin\AppData\Local\Temp\Cab931E.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar95B5.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\Desktop\Quiz Press\Appearance Pak.dll

    Filesize

    6.2MB

    MD5

    d18a59943631dc69a000a12bc98bf74a

    SHA1

    9cf5e9646678e23cb35dfe502072abbc01bbc7ad

    SHA256

    8c807ed34e5469717b018547509faaaf458ce95bb09128b09b6eb2dbb233f212

    SHA512

    ae74e1d42688da04b6faab491dad3595dba39daedd8382d39d37297ea0a6477eed12907f745690c376c2b9a80a2748b9c9d1263dfe1c3cb60e599a50b692c2f1

  • C:\Users\Admin\Desktop\Quiz Press\Glys.exe

    Filesize

    11.5MB

    MD5

    a6f635fe42eecac68f9ca5ba3da1f3df

    SHA1

    aa7c90dee2ffc84fc2f4cd741651fa88c3db0c1c

    SHA256

    f7a6dc8bffe41e4aecc20de117d84cc192f8855c332e24a36ff5428d3efad8ad

    SHA512

    3df5c52eafef70d7c5deb6800d00450e34e8846f0f550bcff7cc84ccb21e27977de6d17f1696dacd19c522364cbe266628e43b8df29a221d174556b6bb399b4d

  • C:\Users\Admin\Desktop\Quiz Press\Glys.exe

    Filesize

    11.5MB

    MD5

    a6f635fe42eecac68f9ca5ba3da1f3df

    SHA1

    aa7c90dee2ffc84fc2f4cd741651fa88c3db0c1c

    SHA256

    f7a6dc8bffe41e4aecc20de117d84cc192f8855c332e24a36ff5428d3efad8ad

    SHA512

    3df5c52eafef70d7c5deb6800d00450e34e8846f0f550bcff7cc84ccb21e27977de6d17f1696dacd19c522364cbe266628e43b8df29a221d174556b6bb399b4d

  • C:\Windows\Installer\MSI1630.tmp

    Filesize

    91KB

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • C:\Windows\Installer\MSI1834.tmp

    Filesize

    91KB

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • \Users\Admin\Desktop\Quiz Press\Appearance Pak.dll

    Filesize

    6.2MB

    MD5

    d18a59943631dc69a000a12bc98bf74a

    SHA1

    9cf5e9646678e23cb35dfe502072abbc01bbc7ad

    SHA256

    8c807ed34e5469717b018547509faaaf458ce95bb09128b09b6eb2dbb233f212

    SHA512

    ae74e1d42688da04b6faab491dad3595dba39daedd8382d39d37297ea0a6477eed12907f745690c376c2b9a80a2748b9c9d1263dfe1c3cb60e599a50b692c2f1

  • \Windows\Installer\MSI1630.tmp

    Filesize

    91KB

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • \Windows\Installer\MSI1834.tmp

    Filesize

    91KB

    MD5

    9f1e5d66c2889018daef4aef604eebc4

    SHA1

    b80294261c8a1635e16e14f55a3d76889ff2c857

    SHA256

    02a81aea451cdfa2cd6668e3b814c4e50c6025e36b70ab972a8cc68aba5b3222

    SHA512

    8f8cbba79d2b6541e8b603a4a395cb938d77c358563bd745449bfee107ee64b88254a79ca5dd72fa05798a75c1464e7cca52556829f258009a3d33c9c3c5d39b

  • memory/1788-88-0x0000000003350000-0x0000000003989000-memory.dmp

    Filesize

    6.2MB

  • memory/1788-85-0x0000000003350000-0x0000000003989000-memory.dmp

    Filesize

    6.2MB

  • memory/1788-84-0x0000000002400000-0x0000000002910000-memory.dmp

    Filesize

    5.1MB

  • memory/1788-216-0x0000000003350000-0x0000000003989000-memory.dmp

    Filesize

    6.2MB

  • memory/1788-279-0x0000000003350000-0x0000000003989000-memory.dmp

    Filesize

    6.2MB

  • memory/1788-298-0x0000000003350000-0x0000000003989000-memory.dmp

    Filesize

    6.2MB

  • memory/1788-299-0x0000000003350000-0x0000000003989000-memory.dmp

    Filesize

    6.2MB

  • memory/1788-87-0x0000000000850000-0x0000000000851000-memory.dmp

    Filesize

    4KB