Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/06/2023, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
01631899.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
01631899.exe
Resource
win10v2004-20230220-en
General
-
Target
01631899.exe
-
Size
579KB
-
MD5
e57bd800c2b9b6f8c5c3324fe024c3ae
-
SHA1
b8fd5b38b20f8cfdf4a008cea73e16f67cf116b7
-
SHA256
dc0c2afadac0b53ac6bd604a4975a2c67fc55a3e0db84b6f4b8c877035cf703e
-
SHA512
391b238c2eae9d176f0d5ac48864574b8d53655b8901cde0411a16a76662e120a527d7d8755fa8529da9b3f7cfc0def1e35ea548ca1e0442577874a26a8ca4c6
-
SSDEEP
12288:eMrUy90yhscc2tsay19JXhfeTrMYzNIJYZbUjqf1JU1us1sdl:Gyucrty19JXh2T4LwbQGJoLSD
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1124 x8653931.exe 1468 x2855363.exe 1308 f3594472.exe -
Loads dropped DLL 6 IoCs
pid Process 1772 01631899.exe 1124 x8653931.exe 1124 x8653931.exe 1468 x2855363.exe 1468 x2855363.exe 1308 f3594472.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2855363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2855363.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 01631899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 01631899.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8653931.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8653931.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1308 f3594472.exe 1308 f3594472.exe 1308 f3594472.exe 1308 f3594472.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1308 f3594472.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1124 1772 01631899.exe 28 PID 1772 wrote to memory of 1124 1772 01631899.exe 28 PID 1772 wrote to memory of 1124 1772 01631899.exe 28 PID 1772 wrote to memory of 1124 1772 01631899.exe 28 PID 1772 wrote to memory of 1124 1772 01631899.exe 28 PID 1772 wrote to memory of 1124 1772 01631899.exe 28 PID 1772 wrote to memory of 1124 1772 01631899.exe 28 PID 1124 wrote to memory of 1468 1124 x8653931.exe 29 PID 1124 wrote to memory of 1468 1124 x8653931.exe 29 PID 1124 wrote to memory of 1468 1124 x8653931.exe 29 PID 1124 wrote to memory of 1468 1124 x8653931.exe 29 PID 1124 wrote to memory of 1468 1124 x8653931.exe 29 PID 1124 wrote to memory of 1468 1124 x8653931.exe 29 PID 1124 wrote to memory of 1468 1124 x8653931.exe 29 PID 1468 wrote to memory of 1308 1468 x2855363.exe 30 PID 1468 wrote to memory of 1308 1468 x2855363.exe 30 PID 1468 wrote to memory of 1308 1468 x2855363.exe 30 PID 1468 wrote to memory of 1308 1468 x2855363.exe 30 PID 1468 wrote to memory of 1308 1468 x2855363.exe 30 PID 1468 wrote to memory of 1308 1468 x2855363.exe 30 PID 1468 wrote to memory of 1308 1468 x2855363.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\01631899.exe"C:\Users\Admin\AppData\Local\Temp\01631899.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8653931.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8653931.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2855363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2855363.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3594472.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3594472.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD590370b71de6d5bb7c0b2aa7de45a43fe
SHA1976a1504023e7642faeb8cc536e072d6a582eab5
SHA2560b9ace78167f765bc039f553ebad87328d1049e0c64370613331f3ea4f43d40d
SHA51223ef907c0c6e015baeda1a6fdad105c55e3c9ffb15a06f1250ead5711b658a78f54c261062dae2ef120a83a23efac8b757df13160414fca83997a127edd40c0e
-
Filesize
377KB
MD590370b71de6d5bb7c0b2aa7de45a43fe
SHA1976a1504023e7642faeb8cc536e072d6a582eab5
SHA2560b9ace78167f765bc039f553ebad87328d1049e0c64370613331f3ea4f43d40d
SHA51223ef907c0c6e015baeda1a6fdad105c55e3c9ffb15a06f1250ead5711b658a78f54c261062dae2ef120a83a23efac8b757df13160414fca83997a127edd40c0e
-
Filesize
206KB
MD5cd99fea0ef621a4a4646e6305f3654d9
SHA1d870371404ecd4d2ca1b2007ef41888d11985df7
SHA256313eed3e2edecc98e67208d0f59f2bc50b46590a04e3443f9e6bc3b01517557c
SHA5125c5bb71eddde9c41b6604687141bc0033647fc75cc311d1ea67648460dc702ca13c739858fe658e21a47b6fd112ee3fbfd9fe4177c7fcf53b543c0a9e912bd2a
-
Filesize
206KB
MD5cd99fea0ef621a4a4646e6305f3654d9
SHA1d870371404ecd4d2ca1b2007ef41888d11985df7
SHA256313eed3e2edecc98e67208d0f59f2bc50b46590a04e3443f9e6bc3b01517557c
SHA5125c5bb71eddde9c41b6604687141bc0033647fc75cc311d1ea67648460dc702ca13c739858fe658e21a47b6fd112ee3fbfd9fe4177c7fcf53b543c0a9e912bd2a
-
Filesize
173KB
MD5822e1095a45947051150f1b645c1965c
SHA1cb869809d65cd23cc55a73e39e79cbcacfa6e692
SHA256ed5824f85bf64f28466a405b09df3bbb005dc90a7153f26b4a4e6d290ec4ed61
SHA5127cb1b3e044e8578e19afb2eaf6b082fdb30067de1bf53f186cd421c89baabdbf8eca0880cad1d0531c747a1144ee0f9c9915ea88a92380e4d33bf7b9fac59b0d
-
Filesize
173KB
MD5822e1095a45947051150f1b645c1965c
SHA1cb869809d65cd23cc55a73e39e79cbcacfa6e692
SHA256ed5824f85bf64f28466a405b09df3bbb005dc90a7153f26b4a4e6d290ec4ed61
SHA5127cb1b3e044e8578e19afb2eaf6b082fdb30067de1bf53f186cd421c89baabdbf8eca0880cad1d0531c747a1144ee0f9c9915ea88a92380e4d33bf7b9fac59b0d
-
Filesize
377KB
MD590370b71de6d5bb7c0b2aa7de45a43fe
SHA1976a1504023e7642faeb8cc536e072d6a582eab5
SHA2560b9ace78167f765bc039f553ebad87328d1049e0c64370613331f3ea4f43d40d
SHA51223ef907c0c6e015baeda1a6fdad105c55e3c9ffb15a06f1250ead5711b658a78f54c261062dae2ef120a83a23efac8b757df13160414fca83997a127edd40c0e
-
Filesize
377KB
MD590370b71de6d5bb7c0b2aa7de45a43fe
SHA1976a1504023e7642faeb8cc536e072d6a582eab5
SHA2560b9ace78167f765bc039f553ebad87328d1049e0c64370613331f3ea4f43d40d
SHA51223ef907c0c6e015baeda1a6fdad105c55e3c9ffb15a06f1250ead5711b658a78f54c261062dae2ef120a83a23efac8b757df13160414fca83997a127edd40c0e
-
Filesize
206KB
MD5cd99fea0ef621a4a4646e6305f3654d9
SHA1d870371404ecd4d2ca1b2007ef41888d11985df7
SHA256313eed3e2edecc98e67208d0f59f2bc50b46590a04e3443f9e6bc3b01517557c
SHA5125c5bb71eddde9c41b6604687141bc0033647fc75cc311d1ea67648460dc702ca13c739858fe658e21a47b6fd112ee3fbfd9fe4177c7fcf53b543c0a9e912bd2a
-
Filesize
206KB
MD5cd99fea0ef621a4a4646e6305f3654d9
SHA1d870371404ecd4d2ca1b2007ef41888d11985df7
SHA256313eed3e2edecc98e67208d0f59f2bc50b46590a04e3443f9e6bc3b01517557c
SHA5125c5bb71eddde9c41b6604687141bc0033647fc75cc311d1ea67648460dc702ca13c739858fe658e21a47b6fd112ee3fbfd9fe4177c7fcf53b543c0a9e912bd2a
-
Filesize
173KB
MD5822e1095a45947051150f1b645c1965c
SHA1cb869809d65cd23cc55a73e39e79cbcacfa6e692
SHA256ed5824f85bf64f28466a405b09df3bbb005dc90a7153f26b4a4e6d290ec4ed61
SHA5127cb1b3e044e8578e19afb2eaf6b082fdb30067de1bf53f186cd421c89baabdbf8eca0880cad1d0531c747a1144ee0f9c9915ea88a92380e4d33bf7b9fac59b0d
-
Filesize
173KB
MD5822e1095a45947051150f1b645c1965c
SHA1cb869809d65cd23cc55a73e39e79cbcacfa6e692
SHA256ed5824f85bf64f28466a405b09df3bbb005dc90a7153f26b4a4e6d290ec4ed61
SHA5127cb1b3e044e8578e19afb2eaf6b082fdb30067de1bf53f186cd421c89baabdbf8eca0880cad1d0531c747a1144ee0f9c9915ea88a92380e4d33bf7b9fac59b0d