Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe
Resource
win10v2004-20230220-en
General
-
Target
2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe
-
Size
775KB
-
MD5
4d53b8ad04b18d56e3f7f90d64f16547
-
SHA1
a52072ba473f6d01938b3eb654c1386d7fe6d8e9
-
SHA256
2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8
-
SHA512
c9b7af65081cd33ace336ad298a7b7064a80188e439eba248fa0068cab24a274400e44b9e99a72759b8dc3b0f05587a3548c7f6c531eb739914b1b6a134c5364
-
SSDEEP
12288:5y90NVjGiP02zMU71LBU42fgTxsBkseUWdLZrscleOGx+3gW79YNCUU2:5yEVCiP0DKtUJkxSyst3+3jp2
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dante
185.161.248.73:4164
-
auth_value
f4066af6b8a6f23125c8ee48288a3f90
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1788 x36773761.exe 1284 m56353608.exe 1936 1.exe 788 n98936922.exe -
Loads dropped DLL 9 IoCs
pid Process 1116 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe 1788 x36773761.exe 1788 x36773761.exe 1788 x36773761.exe 1284 m56353608.exe 1284 m56353608.exe 1936 1.exe 1788 x36773761.exe 788 n98936922.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x36773761.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x36773761.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1284 m56353608.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1788 1116 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe 28 PID 1116 wrote to memory of 1788 1116 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe 28 PID 1116 wrote to memory of 1788 1116 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe 28 PID 1116 wrote to memory of 1788 1116 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe 28 PID 1116 wrote to memory of 1788 1116 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe 28 PID 1116 wrote to memory of 1788 1116 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe 28 PID 1116 wrote to memory of 1788 1116 2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe 28 PID 1788 wrote to memory of 1284 1788 x36773761.exe 29 PID 1788 wrote to memory of 1284 1788 x36773761.exe 29 PID 1788 wrote to memory of 1284 1788 x36773761.exe 29 PID 1788 wrote to memory of 1284 1788 x36773761.exe 29 PID 1788 wrote to memory of 1284 1788 x36773761.exe 29 PID 1788 wrote to memory of 1284 1788 x36773761.exe 29 PID 1788 wrote to memory of 1284 1788 x36773761.exe 29 PID 1284 wrote to memory of 1936 1284 m56353608.exe 30 PID 1284 wrote to memory of 1936 1284 m56353608.exe 30 PID 1284 wrote to memory of 1936 1284 m56353608.exe 30 PID 1284 wrote to memory of 1936 1284 m56353608.exe 30 PID 1284 wrote to memory of 1936 1284 m56353608.exe 30 PID 1284 wrote to memory of 1936 1284 m56353608.exe 30 PID 1284 wrote to memory of 1936 1284 m56353608.exe 30 PID 1788 wrote to memory of 788 1788 x36773761.exe 31 PID 1788 wrote to memory of 788 1788 x36773761.exe 31 PID 1788 wrote to memory of 788 1788 x36773761.exe 31 PID 1788 wrote to memory of 788 1788 x36773761.exe 31 PID 1788 wrote to memory of 788 1788 x36773761.exe 31 PID 1788 wrote to memory of 788 1788 x36773761.exe 31 PID 1788 wrote to memory of 788 1788 x36773761.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe"C:\Users\Admin\AppData\Local\Temp\2df025b8fa3b0449373392a50b0fa9fdb23c5ee625a425c539b7b6fb97aa1bc8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x36773761.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x36773761.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m56353608.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m56353608.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n98936922.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n98936922.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:788
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
570KB
MD513240711a97ec37015fc66c3f72bcf18
SHA1d0304cff87f7149e726e9c852cad1adc4559a091
SHA256b0e76d869b922664cc23d243b7a4b15e393a930f429d0d3c59f6617a0eb600fe
SHA5120144a444bcef9b49dc737f3538ddd7dfe1002a4129941a2f01de2d908f04d16d9fedb008a5155b3d401c6432609f10e3a83ead88252775c0f5ef01b114c750a7
-
Filesize
570KB
MD513240711a97ec37015fc66c3f72bcf18
SHA1d0304cff87f7149e726e9c852cad1adc4559a091
SHA256b0e76d869b922664cc23d243b7a4b15e393a930f429d0d3c59f6617a0eb600fe
SHA5120144a444bcef9b49dc737f3538ddd7dfe1002a4129941a2f01de2d908f04d16d9fedb008a5155b3d401c6432609f10e3a83ead88252775c0f5ef01b114c750a7
-
Filesize
479KB
MD5389b405e6c294720b1b08156d2555238
SHA159894149c8c0ecfb89898a7743cdececfe5e3539
SHA25619a073b0e50a6d2de72ddc199adfffb0880d3ff276eccb93576f7549b9d6fc96
SHA512911d925cadbbbd7058213fb5e9cbce353f94fcfc9541234652effd61d1eee72d184be21cb6d327e4b7f8fa5e3f66ded2b29af7fbe441bb1d83a890fdbbfcebf1
-
Filesize
479KB
MD5389b405e6c294720b1b08156d2555238
SHA159894149c8c0ecfb89898a7743cdececfe5e3539
SHA25619a073b0e50a6d2de72ddc199adfffb0880d3ff276eccb93576f7549b9d6fc96
SHA512911d925cadbbbd7058213fb5e9cbce353f94fcfc9541234652effd61d1eee72d184be21cb6d327e4b7f8fa5e3f66ded2b29af7fbe441bb1d83a890fdbbfcebf1
-
Filesize
479KB
MD5389b405e6c294720b1b08156d2555238
SHA159894149c8c0ecfb89898a7743cdececfe5e3539
SHA25619a073b0e50a6d2de72ddc199adfffb0880d3ff276eccb93576f7549b9d6fc96
SHA512911d925cadbbbd7058213fb5e9cbce353f94fcfc9541234652effd61d1eee72d184be21cb6d327e4b7f8fa5e3f66ded2b29af7fbe441bb1d83a890fdbbfcebf1
-
Filesize
169KB
MD5a87259ed4808815deb3213735f9d51b3
SHA1eddddbd295a07c2e14a39817a3cef80035aa5a15
SHA256548e3dd7a4a3e3bc5f6bb53f52483e66154776727d8126cb0874c5c076d6073b
SHA51286ae950905876e8b095896bd032b33a9163757d87e1d66674af40efe8abbd2b81bc5cf3a205ab6a89377a5daf8aea8a816d6d914f0d5bb19a713fc215ac11c3c
-
Filesize
169KB
MD5a87259ed4808815deb3213735f9d51b3
SHA1eddddbd295a07c2e14a39817a3cef80035aa5a15
SHA256548e3dd7a4a3e3bc5f6bb53f52483e66154776727d8126cb0874c5c076d6073b
SHA51286ae950905876e8b095896bd032b33a9163757d87e1d66674af40efe8abbd2b81bc5cf3a205ab6a89377a5daf8aea8a816d6d914f0d5bb19a713fc215ac11c3c
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
570KB
MD513240711a97ec37015fc66c3f72bcf18
SHA1d0304cff87f7149e726e9c852cad1adc4559a091
SHA256b0e76d869b922664cc23d243b7a4b15e393a930f429d0d3c59f6617a0eb600fe
SHA5120144a444bcef9b49dc737f3538ddd7dfe1002a4129941a2f01de2d908f04d16d9fedb008a5155b3d401c6432609f10e3a83ead88252775c0f5ef01b114c750a7
-
Filesize
570KB
MD513240711a97ec37015fc66c3f72bcf18
SHA1d0304cff87f7149e726e9c852cad1adc4559a091
SHA256b0e76d869b922664cc23d243b7a4b15e393a930f429d0d3c59f6617a0eb600fe
SHA5120144a444bcef9b49dc737f3538ddd7dfe1002a4129941a2f01de2d908f04d16d9fedb008a5155b3d401c6432609f10e3a83ead88252775c0f5ef01b114c750a7
-
Filesize
479KB
MD5389b405e6c294720b1b08156d2555238
SHA159894149c8c0ecfb89898a7743cdececfe5e3539
SHA25619a073b0e50a6d2de72ddc199adfffb0880d3ff276eccb93576f7549b9d6fc96
SHA512911d925cadbbbd7058213fb5e9cbce353f94fcfc9541234652effd61d1eee72d184be21cb6d327e4b7f8fa5e3f66ded2b29af7fbe441bb1d83a890fdbbfcebf1
-
Filesize
479KB
MD5389b405e6c294720b1b08156d2555238
SHA159894149c8c0ecfb89898a7743cdececfe5e3539
SHA25619a073b0e50a6d2de72ddc199adfffb0880d3ff276eccb93576f7549b9d6fc96
SHA512911d925cadbbbd7058213fb5e9cbce353f94fcfc9541234652effd61d1eee72d184be21cb6d327e4b7f8fa5e3f66ded2b29af7fbe441bb1d83a890fdbbfcebf1
-
Filesize
479KB
MD5389b405e6c294720b1b08156d2555238
SHA159894149c8c0ecfb89898a7743cdececfe5e3539
SHA25619a073b0e50a6d2de72ddc199adfffb0880d3ff276eccb93576f7549b9d6fc96
SHA512911d925cadbbbd7058213fb5e9cbce353f94fcfc9541234652effd61d1eee72d184be21cb6d327e4b7f8fa5e3f66ded2b29af7fbe441bb1d83a890fdbbfcebf1
-
Filesize
169KB
MD5a87259ed4808815deb3213735f9d51b3
SHA1eddddbd295a07c2e14a39817a3cef80035aa5a15
SHA256548e3dd7a4a3e3bc5f6bb53f52483e66154776727d8126cb0874c5c076d6073b
SHA51286ae950905876e8b095896bd032b33a9163757d87e1d66674af40efe8abbd2b81bc5cf3a205ab6a89377a5daf8aea8a816d6d914f0d5bb19a713fc215ac11c3c
-
Filesize
169KB
MD5a87259ed4808815deb3213735f9d51b3
SHA1eddddbd295a07c2e14a39817a3cef80035aa5a15
SHA256548e3dd7a4a3e3bc5f6bb53f52483e66154776727d8126cb0874c5c076d6073b
SHA51286ae950905876e8b095896bd032b33a9163757d87e1d66674af40efe8abbd2b81bc5cf3a205ab6a89377a5daf8aea8a816d6d914f0d5bb19a713fc215ac11c3c
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf