Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04/06/2023, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
b6ceea7ed883d89c2d2031181fbaa690402b2bf122c97a4ffb0e63ec52342938.exe
Resource
win10-20230220-en
General
-
Target
b6ceea7ed883d89c2d2031181fbaa690402b2bf122c97a4ffb0e63ec52342938.exe
-
Size
580KB
-
MD5
eb9e20eebbe1ae66dfa0bb1f6b013a28
-
SHA1
6885766558055686f09800f94cb02adc7ce131a1
-
SHA256
b6ceea7ed883d89c2d2031181fbaa690402b2bf122c97a4ffb0e63ec52342938
-
SHA512
81a211f5bac6b22ef382413bb97afbe878f55d8e8785810dd5d443fd5638af825c4d0b764c85d9ddab8bac026b56782af1a182dac8e05dbced437cef1afe607f
-
SSDEEP
12288:GMruy90Cy3TH3Q9u/rexAYqU1lwQEBJwAX6+/K+gU4yxLMe:MymjHA9uz/ol9AX6Y41e
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1420 x1522164.exe 3360 x1922740.exe 4468 f5810304.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1922740.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1922740.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b6ceea7ed883d89c2d2031181fbaa690402b2bf122c97a4ffb0e63ec52342938.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b6ceea7ed883d89c2d2031181fbaa690402b2bf122c97a4ffb0e63ec52342938.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1522164.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1522164.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe 4468 f5810304.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4468 f5810304.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3200 wrote to memory of 1420 3200 b6ceea7ed883d89c2d2031181fbaa690402b2bf122c97a4ffb0e63ec52342938.exe 66 PID 3200 wrote to memory of 1420 3200 b6ceea7ed883d89c2d2031181fbaa690402b2bf122c97a4ffb0e63ec52342938.exe 66 PID 3200 wrote to memory of 1420 3200 b6ceea7ed883d89c2d2031181fbaa690402b2bf122c97a4ffb0e63ec52342938.exe 66 PID 1420 wrote to memory of 3360 1420 x1522164.exe 67 PID 1420 wrote to memory of 3360 1420 x1522164.exe 67 PID 1420 wrote to memory of 3360 1420 x1522164.exe 67 PID 3360 wrote to memory of 4468 3360 x1922740.exe 68 PID 3360 wrote to memory of 4468 3360 x1922740.exe 68 PID 3360 wrote to memory of 4468 3360 x1922740.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6ceea7ed883d89c2d2031181fbaa690402b2bf122c97a4ffb0e63ec52342938.exe"C:\Users\Admin\AppData\Local\Temp\b6ceea7ed883d89c2d2031181fbaa690402b2bf122c97a4ffb0e63ec52342938.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1522164.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1522164.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1922740.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1922740.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5810304.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5810304.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD511ff695c08f1547c1097b44ada7afbdf
SHA1b28ca4e81701dc5fc925fb3dccd196b60919b546
SHA2563ae2846bdf9f40cc5ef10e316f3003c0ea0c2b5e0f61ac4e7b39787a326240cb
SHA5125bb0f219cdf94bf6d83eb3abeb10b4b7f7e65878c952217c060a8f2515b9a3081a5d7697ef6fda638f5100d77cd07cbec201c7fa8833c9cb3e3ff315452e612c
-
Filesize
377KB
MD511ff695c08f1547c1097b44ada7afbdf
SHA1b28ca4e81701dc5fc925fb3dccd196b60919b546
SHA2563ae2846bdf9f40cc5ef10e316f3003c0ea0c2b5e0f61ac4e7b39787a326240cb
SHA5125bb0f219cdf94bf6d83eb3abeb10b4b7f7e65878c952217c060a8f2515b9a3081a5d7697ef6fda638f5100d77cd07cbec201c7fa8833c9cb3e3ff315452e612c
-
Filesize
206KB
MD55e680abdda8499432902ef50a81d1ece
SHA121f4600248acb1bf4023b2ca17b8a320fa6ccc96
SHA256308286bc7a1e59cc9616f37693a0625ede05199d2b0c727d62226b581ff48091
SHA5122a832c36a7372e86a0eb2cc05b72dee5d7c8c7bbad52a8725147c715d3459775ba6ca9c25d1dfe4f17a94129e108668b74d9b4834251468e15e25c1bff6fd1fe
-
Filesize
206KB
MD55e680abdda8499432902ef50a81d1ece
SHA121f4600248acb1bf4023b2ca17b8a320fa6ccc96
SHA256308286bc7a1e59cc9616f37693a0625ede05199d2b0c727d62226b581ff48091
SHA5122a832c36a7372e86a0eb2cc05b72dee5d7c8c7bbad52a8725147c715d3459775ba6ca9c25d1dfe4f17a94129e108668b74d9b4834251468e15e25c1bff6fd1fe
-
Filesize
172KB
MD52f86770341481ecc4c4bc22bbeec37f4
SHA130a48ec5a8c5bf0c3d8225148fdf582a1d6ac4e0
SHA256b36ffd7cd0e2c4ab53c2cbdce0e69d8ad448acb66162224a60b656f253e228a7
SHA5123f4a6628d75d0801be335b3f5a9a2d1299dae6c9afe6f9851d0b015d8564eebe6c6b54e429c9220542ec8ebe05868534a63c1ac11e171ab9bb491af462390674
-
Filesize
172KB
MD52f86770341481ecc4c4bc22bbeec37f4
SHA130a48ec5a8c5bf0c3d8225148fdf582a1d6ac4e0
SHA256b36ffd7cd0e2c4ab53c2cbdce0e69d8ad448acb66162224a60b656f253e228a7
SHA5123f4a6628d75d0801be335b3f5a9a2d1299dae6c9afe6f9851d0b015d8564eebe6c6b54e429c9220542ec8ebe05868534a63c1ac11e171ab9bb491af462390674