Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
176s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe
Resource
win10v2004-20230220-en
General
-
Target
1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe
-
Size
773KB
-
MD5
aae0ba5fbbcf45050df2c69fa0bc8db4
-
SHA1
851670da2b72626fd55d3ec93f32f48616bd00ca
-
SHA256
1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21
-
SHA512
4c0c43696828a3085f95cfa689fbe9c764d402569917e54b173e30ffe5a481c71f1fc7d6af8b83fcce3cf2f3030571bc38500bb107f8d12502c51dd20527b434
-
SSDEEP
24576:RyNq4JPlKMmB8V63POOCWBolrXjmlvThAKKXnnmU:ENq4Bl3CurQoxj4tOnm
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1764 x31321084.exe 1760 m64302984.exe 1904 1.exe 668 n07050214.exe -
Loads dropped DLL 9 IoCs
pid Process 872 1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe 1764 x31321084.exe 1764 x31321084.exe 1764 x31321084.exe 1760 m64302984.exe 1760 m64302984.exe 1904 1.exe 1764 x31321084.exe 668 n07050214.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x31321084.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x31321084.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1760 m64302984.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 872 wrote to memory of 1764 872 1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe 27 PID 872 wrote to memory of 1764 872 1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe 27 PID 872 wrote to memory of 1764 872 1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe 27 PID 872 wrote to memory of 1764 872 1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe 27 PID 872 wrote to memory of 1764 872 1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe 27 PID 872 wrote to memory of 1764 872 1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe 27 PID 872 wrote to memory of 1764 872 1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe 27 PID 1764 wrote to memory of 1760 1764 x31321084.exe 28 PID 1764 wrote to memory of 1760 1764 x31321084.exe 28 PID 1764 wrote to memory of 1760 1764 x31321084.exe 28 PID 1764 wrote to memory of 1760 1764 x31321084.exe 28 PID 1764 wrote to memory of 1760 1764 x31321084.exe 28 PID 1764 wrote to memory of 1760 1764 x31321084.exe 28 PID 1764 wrote to memory of 1760 1764 x31321084.exe 28 PID 1760 wrote to memory of 1904 1760 m64302984.exe 29 PID 1760 wrote to memory of 1904 1760 m64302984.exe 29 PID 1760 wrote to memory of 1904 1760 m64302984.exe 29 PID 1760 wrote to memory of 1904 1760 m64302984.exe 29 PID 1760 wrote to memory of 1904 1760 m64302984.exe 29 PID 1760 wrote to memory of 1904 1760 m64302984.exe 29 PID 1760 wrote to memory of 1904 1760 m64302984.exe 29 PID 1764 wrote to memory of 668 1764 x31321084.exe 30 PID 1764 wrote to memory of 668 1764 x31321084.exe 30 PID 1764 wrote to memory of 668 1764 x31321084.exe 30 PID 1764 wrote to memory of 668 1764 x31321084.exe 30 PID 1764 wrote to memory of 668 1764 x31321084.exe 30 PID 1764 wrote to memory of 668 1764 x31321084.exe 30 PID 1764 wrote to memory of 668 1764 x31321084.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe"C:\Users\Admin\AppData\Local\Temp\1fb7b32f74c8ee0174b75e7b256026a3399517c37958bc29e8757412606d6b21.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x31321084.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x31321084.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m64302984.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m64302984.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n07050214.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n07050214.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:668
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
569KB
MD5428e391a2fde058dc3736d0c8cdfebaf
SHA1fe4e43aff9217fa79b17e5d172eb785e337bc6d4
SHA256fec15460d84139dcf4bca73ba2d517e4d6f7c56237f8e192d350d61d73f03694
SHA51207644113b6b4ea0b35d8afbfec88c3ebed55cb82dd5edad693212bec3b6d618d99c9440466d562c4533866866859f646c32e473a0adb6c62d0b5f954a3fb2714
-
Filesize
569KB
MD5428e391a2fde058dc3736d0c8cdfebaf
SHA1fe4e43aff9217fa79b17e5d172eb785e337bc6d4
SHA256fec15460d84139dcf4bca73ba2d517e4d6f7c56237f8e192d350d61d73f03694
SHA51207644113b6b4ea0b35d8afbfec88c3ebed55cb82dd5edad693212bec3b6d618d99c9440466d562c4533866866859f646c32e473a0adb6c62d0b5f954a3fb2714
-
Filesize
479KB
MD501ce9847a06b4ddad99eb83ac36b3f1b
SHA1f30bae73d479ddf6c47c0a0bfb7bfea0c1ea7518
SHA2565538a1e8374150491806355365ef2ab5d5f58ef2dc213b59e271e2a63ea5da9c
SHA512a8afd71298feb434338f8895b8de6a842476e75e95766a2cac25cc807fe32a9ba7e007cfb7855791538d86694522be95f0c45279050d65e1b28302ba943d5e5c
-
Filesize
479KB
MD501ce9847a06b4ddad99eb83ac36b3f1b
SHA1f30bae73d479ddf6c47c0a0bfb7bfea0c1ea7518
SHA2565538a1e8374150491806355365ef2ab5d5f58ef2dc213b59e271e2a63ea5da9c
SHA512a8afd71298feb434338f8895b8de6a842476e75e95766a2cac25cc807fe32a9ba7e007cfb7855791538d86694522be95f0c45279050d65e1b28302ba943d5e5c
-
Filesize
479KB
MD501ce9847a06b4ddad99eb83ac36b3f1b
SHA1f30bae73d479ddf6c47c0a0bfb7bfea0c1ea7518
SHA2565538a1e8374150491806355365ef2ab5d5f58ef2dc213b59e271e2a63ea5da9c
SHA512a8afd71298feb434338f8895b8de6a842476e75e95766a2cac25cc807fe32a9ba7e007cfb7855791538d86694522be95f0c45279050d65e1b28302ba943d5e5c
-
Filesize
169KB
MD529c8db909100139c712513193e884c19
SHA19b7f7504744fa6954070630d5113575e0871f79c
SHA256615f1fb03759a706500dd91ea5d58750a6ca06c993f0cd7b08000983a5651c58
SHA512d1b1f7000cca218e793ffc557ff5f09a5147fca86c189aafcdd25dd046d36cd0929dfc41d323c1da1937064d0608047f9f140602be688d34aea778929fd70960
-
Filesize
169KB
MD529c8db909100139c712513193e884c19
SHA19b7f7504744fa6954070630d5113575e0871f79c
SHA256615f1fb03759a706500dd91ea5d58750a6ca06c993f0cd7b08000983a5651c58
SHA512d1b1f7000cca218e793ffc557ff5f09a5147fca86c189aafcdd25dd046d36cd0929dfc41d323c1da1937064d0608047f9f140602be688d34aea778929fd70960
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
569KB
MD5428e391a2fde058dc3736d0c8cdfebaf
SHA1fe4e43aff9217fa79b17e5d172eb785e337bc6d4
SHA256fec15460d84139dcf4bca73ba2d517e4d6f7c56237f8e192d350d61d73f03694
SHA51207644113b6b4ea0b35d8afbfec88c3ebed55cb82dd5edad693212bec3b6d618d99c9440466d562c4533866866859f646c32e473a0adb6c62d0b5f954a3fb2714
-
Filesize
569KB
MD5428e391a2fde058dc3736d0c8cdfebaf
SHA1fe4e43aff9217fa79b17e5d172eb785e337bc6d4
SHA256fec15460d84139dcf4bca73ba2d517e4d6f7c56237f8e192d350d61d73f03694
SHA51207644113b6b4ea0b35d8afbfec88c3ebed55cb82dd5edad693212bec3b6d618d99c9440466d562c4533866866859f646c32e473a0adb6c62d0b5f954a3fb2714
-
Filesize
479KB
MD501ce9847a06b4ddad99eb83ac36b3f1b
SHA1f30bae73d479ddf6c47c0a0bfb7bfea0c1ea7518
SHA2565538a1e8374150491806355365ef2ab5d5f58ef2dc213b59e271e2a63ea5da9c
SHA512a8afd71298feb434338f8895b8de6a842476e75e95766a2cac25cc807fe32a9ba7e007cfb7855791538d86694522be95f0c45279050d65e1b28302ba943d5e5c
-
Filesize
479KB
MD501ce9847a06b4ddad99eb83ac36b3f1b
SHA1f30bae73d479ddf6c47c0a0bfb7bfea0c1ea7518
SHA2565538a1e8374150491806355365ef2ab5d5f58ef2dc213b59e271e2a63ea5da9c
SHA512a8afd71298feb434338f8895b8de6a842476e75e95766a2cac25cc807fe32a9ba7e007cfb7855791538d86694522be95f0c45279050d65e1b28302ba943d5e5c
-
Filesize
479KB
MD501ce9847a06b4ddad99eb83ac36b3f1b
SHA1f30bae73d479ddf6c47c0a0bfb7bfea0c1ea7518
SHA2565538a1e8374150491806355365ef2ab5d5f58ef2dc213b59e271e2a63ea5da9c
SHA512a8afd71298feb434338f8895b8de6a842476e75e95766a2cac25cc807fe32a9ba7e007cfb7855791538d86694522be95f0c45279050d65e1b28302ba943d5e5c
-
Filesize
169KB
MD529c8db909100139c712513193e884c19
SHA19b7f7504744fa6954070630d5113575e0871f79c
SHA256615f1fb03759a706500dd91ea5d58750a6ca06c993f0cd7b08000983a5651c58
SHA512d1b1f7000cca218e793ffc557ff5f09a5147fca86c189aafcdd25dd046d36cd0929dfc41d323c1da1937064d0608047f9f140602be688d34aea778929fd70960
-
Filesize
169KB
MD529c8db909100139c712513193e884c19
SHA19b7f7504744fa6954070630d5113575e0871f79c
SHA256615f1fb03759a706500dd91ea5d58750a6ca06c993f0cd7b08000983a5651c58
SHA512d1b1f7000cca218e793ffc557ff5f09a5147fca86c189aafcdd25dd046d36cd0929dfc41d323c1da1937064d0608047f9f140602be688d34aea778929fd70960
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf