Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe
Resource
win10v2004-20230220-en
General
-
Target
64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe
-
Size
786KB
-
MD5
2591b97006a4d36ccb4d41d6155a8123
-
SHA1
fc7788662f6dc626331181e882e94cc2f02503be
-
SHA256
64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c
-
SHA512
a68e40428b63919c271defb9d68aa8e20d978e4201450affd4d9e3c481b621ce3c145121521c0859e4e475783cf043c8c95ba8817dc56bab7e0730762b8880dd
-
SSDEEP
12288:Ey90O50uuGlnG9oQsFXcI5ZJSyaskAQ1vD6/ss+isd5INfQ6KJX4g2j7cJA00:Eyj5j/2VuMIwX1M/cbQfQ6kX4g2s200
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1732 x12291274.exe 696 m52447443.exe 1724 1.exe 1760 n12813856.exe -
Loads dropped DLL 9 IoCs
pid Process 1992 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe 1732 x12291274.exe 1732 x12291274.exe 1732 x12291274.exe 696 m52447443.exe 696 m52447443.exe 1724 1.exe 1732 x12291274.exe 1760 n12813856.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x12291274.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x12291274.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 696 m52447443.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1732 1992 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe 27 PID 1992 wrote to memory of 1732 1992 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe 27 PID 1992 wrote to memory of 1732 1992 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe 27 PID 1992 wrote to memory of 1732 1992 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe 27 PID 1992 wrote to memory of 1732 1992 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe 27 PID 1992 wrote to memory of 1732 1992 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe 27 PID 1992 wrote to memory of 1732 1992 64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe 27 PID 1732 wrote to memory of 696 1732 x12291274.exe 28 PID 1732 wrote to memory of 696 1732 x12291274.exe 28 PID 1732 wrote to memory of 696 1732 x12291274.exe 28 PID 1732 wrote to memory of 696 1732 x12291274.exe 28 PID 1732 wrote to memory of 696 1732 x12291274.exe 28 PID 1732 wrote to memory of 696 1732 x12291274.exe 28 PID 1732 wrote to memory of 696 1732 x12291274.exe 28 PID 696 wrote to memory of 1724 696 m52447443.exe 29 PID 696 wrote to memory of 1724 696 m52447443.exe 29 PID 696 wrote to memory of 1724 696 m52447443.exe 29 PID 696 wrote to memory of 1724 696 m52447443.exe 29 PID 696 wrote to memory of 1724 696 m52447443.exe 29 PID 696 wrote to memory of 1724 696 m52447443.exe 29 PID 696 wrote to memory of 1724 696 m52447443.exe 29 PID 1732 wrote to memory of 1760 1732 x12291274.exe 30 PID 1732 wrote to memory of 1760 1732 x12291274.exe 30 PID 1732 wrote to memory of 1760 1732 x12291274.exe 30 PID 1732 wrote to memory of 1760 1732 x12291274.exe 30 PID 1732 wrote to memory of 1760 1732 x12291274.exe 30 PID 1732 wrote to memory of 1760 1732 x12291274.exe 30 PID 1732 wrote to memory of 1760 1732 x12291274.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe"C:\Users\Admin\AppData\Local\Temp\64e6212500724042e98edd7ecf7e376c9bff532a4befbf8d8e6400ab2f4b8a1c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x12291274.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x12291274.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m52447443.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m52447443.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n12813856.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n12813856.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581KB
MD51d720734770f1e83d45e0f895afa041d
SHA10b18a8646e16211d48824cf6846ee3970695339b
SHA256f0305bf1751927a472e7af5b02f9fc5f82afbe989344ae0ed8e82384915a2228
SHA512898c715c7ec1bacaa67b632355670da775e2aa96225469db25c1ca18c1bbe136eabaaca1b7656e56b72234bcd2b0e5af0e389111b730c19d4b7c576415b8eea1
-
Filesize
581KB
MD51d720734770f1e83d45e0f895afa041d
SHA10b18a8646e16211d48824cf6846ee3970695339b
SHA256f0305bf1751927a472e7af5b02f9fc5f82afbe989344ae0ed8e82384915a2228
SHA512898c715c7ec1bacaa67b632355670da775e2aa96225469db25c1ca18c1bbe136eabaaca1b7656e56b72234bcd2b0e5af0e389111b730c19d4b7c576415b8eea1
-
Filesize
582KB
MD5d66173273a51f7657b9e9ea96140832f
SHA1d28f3a29bd54005a8f06a1b90986a6ac246ea84b
SHA25635496b1ad783fd4c8bbc2780c2c99fa3e753d589fa8cbcba9e439b961fc76b9c
SHA512663998609c2d2c5eb0358353aea944d912e2c09ac0275240987eee58b22afdd27ce1b3917cda4e24288d7f8bce17af21aa00f9e09fb069e49485e350fe8d9d4b
-
Filesize
582KB
MD5d66173273a51f7657b9e9ea96140832f
SHA1d28f3a29bd54005a8f06a1b90986a6ac246ea84b
SHA25635496b1ad783fd4c8bbc2780c2c99fa3e753d589fa8cbcba9e439b961fc76b9c
SHA512663998609c2d2c5eb0358353aea944d912e2c09ac0275240987eee58b22afdd27ce1b3917cda4e24288d7f8bce17af21aa00f9e09fb069e49485e350fe8d9d4b
-
Filesize
582KB
MD5d66173273a51f7657b9e9ea96140832f
SHA1d28f3a29bd54005a8f06a1b90986a6ac246ea84b
SHA25635496b1ad783fd4c8bbc2780c2c99fa3e753d589fa8cbcba9e439b961fc76b9c
SHA512663998609c2d2c5eb0358353aea944d912e2c09ac0275240987eee58b22afdd27ce1b3917cda4e24288d7f8bce17af21aa00f9e09fb069e49485e350fe8d9d4b
-
Filesize
171KB
MD5d66996a22e799b2e867db2788a551962
SHA1d4905d5e9876634187183263850a4c8f66132bc2
SHA256740417a377b57c98e1f711d8d093548135994b0d22077f162e1e4ff658f30d5a
SHA51275d118adce45d37eac6a73b54c8cfd663df5e5809485e6bad6af189381736c8fed79a906f2a55c7f1623732e838b6384d7a3d91ba609e02502edb7c442897b85
-
Filesize
171KB
MD5d66996a22e799b2e867db2788a551962
SHA1d4905d5e9876634187183263850a4c8f66132bc2
SHA256740417a377b57c98e1f711d8d093548135994b0d22077f162e1e4ff658f30d5a
SHA51275d118adce45d37eac6a73b54c8cfd663df5e5809485e6bad6af189381736c8fed79a906f2a55c7f1623732e838b6384d7a3d91ba609e02502edb7c442897b85
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
581KB
MD51d720734770f1e83d45e0f895afa041d
SHA10b18a8646e16211d48824cf6846ee3970695339b
SHA256f0305bf1751927a472e7af5b02f9fc5f82afbe989344ae0ed8e82384915a2228
SHA512898c715c7ec1bacaa67b632355670da775e2aa96225469db25c1ca18c1bbe136eabaaca1b7656e56b72234bcd2b0e5af0e389111b730c19d4b7c576415b8eea1
-
Filesize
581KB
MD51d720734770f1e83d45e0f895afa041d
SHA10b18a8646e16211d48824cf6846ee3970695339b
SHA256f0305bf1751927a472e7af5b02f9fc5f82afbe989344ae0ed8e82384915a2228
SHA512898c715c7ec1bacaa67b632355670da775e2aa96225469db25c1ca18c1bbe136eabaaca1b7656e56b72234bcd2b0e5af0e389111b730c19d4b7c576415b8eea1
-
Filesize
582KB
MD5d66173273a51f7657b9e9ea96140832f
SHA1d28f3a29bd54005a8f06a1b90986a6ac246ea84b
SHA25635496b1ad783fd4c8bbc2780c2c99fa3e753d589fa8cbcba9e439b961fc76b9c
SHA512663998609c2d2c5eb0358353aea944d912e2c09ac0275240987eee58b22afdd27ce1b3917cda4e24288d7f8bce17af21aa00f9e09fb069e49485e350fe8d9d4b
-
Filesize
582KB
MD5d66173273a51f7657b9e9ea96140832f
SHA1d28f3a29bd54005a8f06a1b90986a6ac246ea84b
SHA25635496b1ad783fd4c8bbc2780c2c99fa3e753d589fa8cbcba9e439b961fc76b9c
SHA512663998609c2d2c5eb0358353aea944d912e2c09ac0275240987eee58b22afdd27ce1b3917cda4e24288d7f8bce17af21aa00f9e09fb069e49485e350fe8d9d4b
-
Filesize
582KB
MD5d66173273a51f7657b9e9ea96140832f
SHA1d28f3a29bd54005a8f06a1b90986a6ac246ea84b
SHA25635496b1ad783fd4c8bbc2780c2c99fa3e753d589fa8cbcba9e439b961fc76b9c
SHA512663998609c2d2c5eb0358353aea944d912e2c09ac0275240987eee58b22afdd27ce1b3917cda4e24288d7f8bce17af21aa00f9e09fb069e49485e350fe8d9d4b
-
Filesize
171KB
MD5d66996a22e799b2e867db2788a551962
SHA1d4905d5e9876634187183263850a4c8f66132bc2
SHA256740417a377b57c98e1f711d8d093548135994b0d22077f162e1e4ff658f30d5a
SHA51275d118adce45d37eac6a73b54c8cfd663df5e5809485e6bad6af189381736c8fed79a906f2a55c7f1623732e838b6384d7a3d91ba609e02502edb7c442897b85
-
Filesize
171KB
MD5d66996a22e799b2e867db2788a551962
SHA1d4905d5e9876634187183263850a4c8f66132bc2
SHA256740417a377b57c98e1f711d8d093548135994b0d22077f162e1e4ff658f30d5a
SHA51275d118adce45d37eac6a73b54c8cfd663df5e5809485e6bad6af189381736c8fed79a906f2a55c7f1623732e838b6384d7a3d91ba609e02502edb7c442897b85
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf