Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
PaymentReciptInvoce00180423.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PaymentReciptInvoce00180423.exe
Resource
win10v2004-20230220-en
General
-
Target
PaymentReciptInvoce00180423.exe
-
Size
1.0MB
-
MD5
b5d151bb4861ef37f6a7196217d219fe
-
SHA1
6dd795268a7f84ad8beda42cc58ce30f02bbd451
-
SHA256
839af94fe56cfd10e4e5e524c5e656170a8f5cb6a285bc1838386f7000b431a9
-
SHA512
6286af0cfee2564cf9ca68067d2f9ed7113d0c042b7bc9206c8b18bd67f94de599a6ee44739cc67f693922426c5f5db803ea3c289160e182f800eabd46da51ec
-
SSDEEP
12288:aq+gtQtCm4yiiguuR3uq+CjCk8feoFgAXuRs2/B6T8H3+H+5CA2G:VIT4i0CkO5HkB6gX+H+57B
Malware Config
Extracted
warzonerat
jeffdfehjhsda.ddns.net:5200
Signatures
-
Detects Redline Stealer samples 2 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3816-142-0x00000000057A0000-0x0000000005DC8000-memory.dmp redline_stealer behavioral2/memory/3816-147-0x0000000005F40000-0x0000000005FA6000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload 5 IoCs
resource yara_rule behavioral2/memory/2296-133-0x00000000033F0000-0x000000000354C000-memory.dmp warzonerat behavioral2/memory/2296-139-0x00000000033F0000-0x000000000354C000-memory.dmp warzonerat behavioral2/memory/2296-140-0x00000000029F0000-0x00000000033F0000-memory.dmp warzonerat behavioral2/memory/2296-158-0x00000000033F0000-0x000000000354C000-memory.dmp warzonerat behavioral2/memory/2296-159-0x00000000033F0000-0x000000000354C000-memory.dmp warzonerat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat PaymentReciptInvoce00180423.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start PaymentReciptInvoce00180423.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Order = "C:\\Users\\Admin\\AppData\\Local\\Temp\\PaymentReciptInvoce00180423.exe" PaymentReciptInvoce00180423.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\Documents\Documents:ApplicationData PaymentReciptInvoce00180423.exe File opened for modification C:\Users\Admin\Documents\Documents:ApplicationData PaymentReciptInvoce00180423.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3816 powershell.exe 3816 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3816 powershell.exe Token: 33 4972 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4972 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2296 wrote to memory of 3816 2296 PaymentReciptInvoce00180423.exe 82 PID 2296 wrote to memory of 3816 2296 PaymentReciptInvoce00180423.exe 82 PID 2296 wrote to memory of 3816 2296 PaymentReciptInvoce00180423.exe 82 PID 2296 wrote to memory of 2308 2296 PaymentReciptInvoce00180423.exe 85 PID 2296 wrote to memory of 2308 2296 PaymentReciptInvoce00180423.exe 85 PID 2296 wrote to memory of 2308 2296 PaymentReciptInvoce00180423.exe 85 PID 2296 wrote to memory of 2308 2296 PaymentReciptInvoce00180423.exe 85 PID 2296 wrote to memory of 2308 2296 PaymentReciptInvoce00180423.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\PaymentReciptInvoce00180423.exe"C:\Users\Admin\AppData\Local\Temp\PaymentReciptInvoce00180423.exe"1⤵
- Drops startup file
- Adds Run key to start application
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"2⤵PID:2308
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2d4 0x4141⤵
- Suspicious use of AdjustPrivilegeToken
PID:4972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82