Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
63aff83d91305d59d98f5e251f143456.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
63aff83d91305d59d98f5e251f143456.exe
Resource
win10v2004-20230220-en
General
-
Target
63aff83d91305d59d98f5e251f143456.exe
-
Size
584KB
-
MD5
63aff83d91305d59d98f5e251f143456
-
SHA1
4b546039570c29e6080345427defead0453cd875
-
SHA256
e788ec61549dfb2a7e09ee105e86cd1fe6e62a514597aee43918c97353b5758b
-
SHA512
8c8a1d836aa29af61818204505a7975932f03193a8d3c57fca243102d6c59407252a8309cb72995181c742539dc20b541a29ed43854b3a59e052812d4cd02889
-
SSDEEP
12288:QMr6y90W1tqx0pfJZmeAmMXI6vpFxwn9F/+1brJIs0x:6y/5vmeAmMXI0pPw9N+brOs0x
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1084 x5550945.exe 4736 x6580525.exe 4852 f3540635.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6580525.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 63aff83d91305d59d98f5e251f143456.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63aff83d91305d59d98f5e251f143456.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5550945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5550945.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6580525.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe 4852 f3540635.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4852 f3540635.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4964 wrote to memory of 1084 4964 63aff83d91305d59d98f5e251f143456.exe 82 PID 4964 wrote to memory of 1084 4964 63aff83d91305d59d98f5e251f143456.exe 82 PID 4964 wrote to memory of 1084 4964 63aff83d91305d59d98f5e251f143456.exe 82 PID 1084 wrote to memory of 4736 1084 x5550945.exe 83 PID 1084 wrote to memory of 4736 1084 x5550945.exe 83 PID 1084 wrote to memory of 4736 1084 x5550945.exe 83 PID 4736 wrote to memory of 4852 4736 x6580525.exe 84 PID 4736 wrote to memory of 4852 4736 x6580525.exe 84 PID 4736 wrote to memory of 4852 4736 x6580525.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\63aff83d91305d59d98f5e251f143456.exe"C:\Users\Admin\AppData\Local\Temp\63aff83d91305d59d98f5e251f143456.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5550945.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5550945.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6580525.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6580525.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3540635.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3540635.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5d9542b0559cb92d2c8251012ee4a466f
SHA1bc88e3c95d467cb6a9366997aba30fb007724a4b
SHA2565439b097e5a61c8017810278ca3e14ccf64fe79594d4f27890b09a0cd44d5432
SHA512651ee05d60624f34cc0aa7cb08a3557976429c52df549f095ce31313708b84ae5a9da51fd6753b14534a938dc828895a673ae898aa072ba7f27bed21435289fe
-
Filesize
377KB
MD5d9542b0559cb92d2c8251012ee4a466f
SHA1bc88e3c95d467cb6a9366997aba30fb007724a4b
SHA2565439b097e5a61c8017810278ca3e14ccf64fe79594d4f27890b09a0cd44d5432
SHA512651ee05d60624f34cc0aa7cb08a3557976429c52df549f095ce31313708b84ae5a9da51fd6753b14534a938dc828895a673ae898aa072ba7f27bed21435289fe
-
Filesize
206KB
MD5422c1ac20ced1882c3b3e0b305d177b7
SHA10963a625dca3e997dbfc68428d3439d4f453df72
SHA256d9e5fb374ac50cabd3258f4d63e54fc6413084c08c7e9a614177f7c49e4ffa4b
SHA512eed2d95c779748fa382a88faebbc8b3f982a65a39fe323bcbb9a1c92ac687dc882b9db6c1a76cdbab3c26272c659082402a5195753afb05f787893bf04e14eee
-
Filesize
206KB
MD5422c1ac20ced1882c3b3e0b305d177b7
SHA10963a625dca3e997dbfc68428d3439d4f453df72
SHA256d9e5fb374ac50cabd3258f4d63e54fc6413084c08c7e9a614177f7c49e4ffa4b
SHA512eed2d95c779748fa382a88faebbc8b3f982a65a39fe323bcbb9a1c92ac687dc882b9db6c1a76cdbab3c26272c659082402a5195753afb05f787893bf04e14eee
-
Filesize
172KB
MD5cb38cca0b90578b4bf2c461fecf90e5c
SHA1fb32960bbbb47be6cced724b3c3916ef95e4d345
SHA25673813b7a113a4ccbed20a4535ddb72a2dff9110487ecf584a6a5219e79650bcb
SHA512820662d65e4c2414d5e69c746071e551b2948c262a96b0dad7c88703e7b750a3a73d579c5076582e994869b53a3ee451ac3c8f84e8aea558c54827dfbd58d3e3
-
Filesize
172KB
MD5cb38cca0b90578b4bf2c461fecf90e5c
SHA1fb32960bbbb47be6cced724b3c3916ef95e4d345
SHA25673813b7a113a4ccbed20a4535ddb72a2dff9110487ecf584a6a5219e79650bcb
SHA512820662d65e4c2414d5e69c746071e551b2948c262a96b0dad7c88703e7b750a3a73d579c5076582e994869b53a3ee451ac3c8f84e8aea558c54827dfbd58d3e3