Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe
Resource
win10v2004-20230220-en
General
-
Target
10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe
-
Size
586KB
-
MD5
c05ca9d5f37d8ba919b3eb9bc77178fc
-
SHA1
f183f68e9a6face1e6a901f13ac5be04e51f7b00
-
SHA256
10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a
-
SHA512
bd14c2dc1d809d2340e5340bda719efbad2bcc2a3b3cc1ab7eae1f410e0ececa87264040eb9ba304e23bbe9e3a0e6b23c8c67bb9f8178f8fce2ff47d6ed9363b
-
SSDEEP
12288:GMr8y901ekO9PYktrHtsrlPLijZxG4Ej4r42Z1nO/x2Pv4:GybkurNWwYV2Z1yx2H4
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4248 x2280627.exe 2356 x7106867.exe 4512 f0969513.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2280627.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2280627.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7106867.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7106867.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe 4512 f0969513.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4512 f0969513.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 932 wrote to memory of 4248 932 10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe 84 PID 932 wrote to memory of 4248 932 10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe 84 PID 932 wrote to memory of 4248 932 10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe 84 PID 4248 wrote to memory of 2356 4248 x2280627.exe 85 PID 4248 wrote to memory of 2356 4248 x2280627.exe 85 PID 4248 wrote to memory of 2356 4248 x2280627.exe 85 PID 2356 wrote to memory of 4512 2356 x7106867.exe 86 PID 2356 wrote to memory of 4512 2356 x7106867.exe 86 PID 2356 wrote to memory of 4512 2356 x7106867.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe"C:\Users\Admin\AppData\Local\Temp\10d03d5174433227767300196836c7812e66f20732031e604e1032abe591a47a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2280627.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2280627.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7106867.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7106867.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0969513.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0969513.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD50f6e2c891404e4e5f49d9b40c82692b5
SHA123fa9dc0a45ff1a7b57210e3539d28ec127ef7e1
SHA2569c409cc422fe4adfc1a43716d6936100929cbdf99714f481e9aba3cc3d9b04a5
SHA5123b81f44b0333c542bd67300813adb1dd44ddf5d42cec5feb1724761970728fb43f94fbf261fa709cb0c33b8067bafefaca1cc91066649e9860aa8ff37fdf8879
-
Filesize
378KB
MD50f6e2c891404e4e5f49d9b40c82692b5
SHA123fa9dc0a45ff1a7b57210e3539d28ec127ef7e1
SHA2569c409cc422fe4adfc1a43716d6936100929cbdf99714f481e9aba3cc3d9b04a5
SHA5123b81f44b0333c542bd67300813adb1dd44ddf5d42cec5feb1724761970728fb43f94fbf261fa709cb0c33b8067bafefaca1cc91066649e9860aa8ff37fdf8879
-
Filesize
206KB
MD5c59e00146c4b04f5c4677c79f90bfc40
SHA1fea121d04ec40f6e9d2437796ee785b89ef7fb52
SHA256c91e17f13a43634405235d4b317e8804b13fad263112b7d6f798e35404bf7c74
SHA512c666f2fbb0f8d61d529ee6f6b99f2c4e23102d1a4afc25b85a25eefb2af9f008732177e6a0f2857153b3bcb68817bc136e1422a6768f4888603013539c8c2a03
-
Filesize
206KB
MD5c59e00146c4b04f5c4677c79f90bfc40
SHA1fea121d04ec40f6e9d2437796ee785b89ef7fb52
SHA256c91e17f13a43634405235d4b317e8804b13fad263112b7d6f798e35404bf7c74
SHA512c666f2fbb0f8d61d529ee6f6b99f2c4e23102d1a4afc25b85a25eefb2af9f008732177e6a0f2857153b3bcb68817bc136e1422a6768f4888603013539c8c2a03
-
Filesize
172KB
MD59f15030df6d5bb00f9f01841e70daafa
SHA1dd81f227302edc2e4d99acbdd1ad2ed7b9edd1a3
SHA256f4386e422e57ad6368e78178f4e6383c8ec4a14d55cf40ed4568f04b86fc4342
SHA512ea75486dc058e6c1acd0f036bcf536988baaf64b4b967607e6efa7286927911c72912c76770f3aeebfc65f41e68722dde72ec8e21b4d018f278df38c0b673a4f
-
Filesize
172KB
MD59f15030df6d5bb00f9f01841e70daafa
SHA1dd81f227302edc2e4d99acbdd1ad2ed7b9edd1a3
SHA256f4386e422e57ad6368e78178f4e6383c8ec4a14d55cf40ed4568f04b86fc4342
SHA512ea75486dc058e6c1acd0f036bcf536988baaf64b4b967607e6efa7286927911c72912c76770f3aeebfc65f41e68722dde72ec8e21b4d018f278df38c0b673a4f