Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2023, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
a3004d6d07609ce6155e0e6f7368a7f4f01551cc955cfe600c7af4f9260db5e9.exe
Resource
win10v2004-20230220-en
General
-
Target
a3004d6d07609ce6155e0e6f7368a7f4f01551cc955cfe600c7af4f9260db5e9.exe
-
Size
579KB
-
MD5
e862af8c7ebee64917ff0e1421111aea
-
SHA1
b54f86e3cd8899030db7523665556a50fd085b7c
-
SHA256
a3004d6d07609ce6155e0e6f7368a7f4f01551cc955cfe600c7af4f9260db5e9
-
SHA512
9295a7b4ee46237cc086226ef9ccc37a0cfd576973577259eee90f5f7786e046cc204f3b95fe4f00a4d033019c4927d5f1d954e6c93c45e62391cb6baac2da09
-
SSDEEP
12288:GMrry90pdzxS9/rvfjnbvHSHXd2sfn0Eml5P7QAD2mcr:Byd9/rXjnjIN2s6l5P7qm4
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4684 x4520650.exe 632 x6788424.exe 2584 f7612335.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a3004d6d07609ce6155e0e6f7368a7f4f01551cc955cfe600c7af4f9260db5e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a3004d6d07609ce6155e0e6f7368a7f4f01551cc955cfe600c7af4f9260db5e9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4520650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4520650.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6788424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6788424.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe 2584 f7612335.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2584 f7612335.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1488 wrote to memory of 4684 1488 a3004d6d07609ce6155e0e6f7368a7f4f01551cc955cfe600c7af4f9260db5e9.exe 83 PID 1488 wrote to memory of 4684 1488 a3004d6d07609ce6155e0e6f7368a7f4f01551cc955cfe600c7af4f9260db5e9.exe 83 PID 1488 wrote to memory of 4684 1488 a3004d6d07609ce6155e0e6f7368a7f4f01551cc955cfe600c7af4f9260db5e9.exe 83 PID 4684 wrote to memory of 632 4684 x4520650.exe 84 PID 4684 wrote to memory of 632 4684 x4520650.exe 84 PID 4684 wrote to memory of 632 4684 x4520650.exe 84 PID 632 wrote to memory of 2584 632 x6788424.exe 85 PID 632 wrote to memory of 2584 632 x6788424.exe 85 PID 632 wrote to memory of 2584 632 x6788424.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3004d6d07609ce6155e0e6f7368a7f4f01551cc955cfe600c7af4f9260db5e9.exe"C:\Users\Admin\AppData\Local\Temp\a3004d6d07609ce6155e0e6f7368a7f4f01551cc955cfe600c7af4f9260db5e9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4520650.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4520650.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6788424.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6788424.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7612335.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7612335.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD555882cbe5ce5cbfdb2a837cbd9ad195f
SHA16429c5dfe3c9e279e08b1224e2bece5e2bb392d5
SHA25648b41c875fdedcc1310723bca799e5165bb649cca082a6e5fb2f6f20089f6ec7
SHA512f993a061c8f226d0adf28afcbbed439d58cdc97fa401e1f7dc759650594e3889dc51345c10aecfec2e1603a371e3d5d96890dc10165deeb802aba0fcea165feb
-
Filesize
378KB
MD555882cbe5ce5cbfdb2a837cbd9ad195f
SHA16429c5dfe3c9e279e08b1224e2bece5e2bb392d5
SHA25648b41c875fdedcc1310723bca799e5165bb649cca082a6e5fb2f6f20089f6ec7
SHA512f993a061c8f226d0adf28afcbbed439d58cdc97fa401e1f7dc759650594e3889dc51345c10aecfec2e1603a371e3d5d96890dc10165deeb802aba0fcea165feb
-
Filesize
206KB
MD59c6af94d3a66c46878f1ec0ddbb209fe
SHA1e87f44041ca54b4d98ca696724868f0374916e50
SHA256717c59491222ae3fb6cefa42e138a7b438f616d8058823aae945969868083d15
SHA512275d37ca11c9123849965a8fe91c622a775244a1a3b4400bf6bdbab528ac8c7ff4abb4c11ccfb2e8b85a6fd1ae058116071b65de6654476e5e265fc585f28b36
-
Filesize
206KB
MD59c6af94d3a66c46878f1ec0ddbb209fe
SHA1e87f44041ca54b4d98ca696724868f0374916e50
SHA256717c59491222ae3fb6cefa42e138a7b438f616d8058823aae945969868083d15
SHA512275d37ca11c9123849965a8fe91c622a775244a1a3b4400bf6bdbab528ac8c7ff4abb4c11ccfb2e8b85a6fd1ae058116071b65de6654476e5e265fc585f28b36
-
Filesize
173KB
MD5a96d10f659c3910571cca0e6d84fb847
SHA1054f4bc63c206804588ecef549a5c81d3f836411
SHA256dcc00e21d555eb7c3fbba01dfddc37332e9d4f8fbfad0e2773fb8a827efdb0f6
SHA512a5b3c4a545e559292290e5e55afaa7450210e14da4bd1f8d830850d1b2d31967e1ac23c0ca50b381091ad599307e56a85329f286ca905ac0d23cc84d5e139c64
-
Filesize
173KB
MD5a96d10f659c3910571cca0e6d84fb847
SHA1054f4bc63c206804588ecef549a5c81d3f836411
SHA256dcc00e21d555eb7c3fbba01dfddc37332e9d4f8fbfad0e2773fb8a827efdb0f6
SHA512a5b3c4a545e559292290e5e55afaa7450210e14da4bd1f8d830850d1b2d31967e1ac23c0ca50b381091ad599307e56a85329f286ca905ac0d23cc84d5e139c64