Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
8417123e4a038a3b16346babc5269a0a931f8577e6be41f88e75137af33c43e0.exe
Resource
win10v2004-20230220-en
General
-
Target
8417123e4a038a3b16346babc5269a0a931f8577e6be41f88e75137af33c43e0.exe
-
Size
585KB
-
MD5
0383ffddee8dc923b2b96c80a4efd011
-
SHA1
2926ae6f85cbdeb1a7ec96d1e4ec5371dd95843b
-
SHA256
8417123e4a038a3b16346babc5269a0a931f8577e6be41f88e75137af33c43e0
-
SHA512
3c155c185947aba29630932080af01640d4d3bb4364bc706cd1692b8090b938595b35325bf9bf77a2f65fa610f64af3bf3916edb455a8414a11c1a25625ec3b6
-
SSDEEP
12288:JMryy90KPzMSkQLob3jSsa2SIBUhfUonUJM3TENWUEIrrl:jyJzkQLozSN2XqhfPVYNXl
Malware Config
Extracted
redline
diza
83.97.73.126:19048
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2020 x3181102.exe 3820 x3653828.exe 400 f1604289.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3653828.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8417123e4a038a3b16346babc5269a0a931f8577e6be41f88e75137af33c43e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8417123e4a038a3b16346babc5269a0a931f8577e6be41f88e75137af33c43e0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3181102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3181102.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3653828.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 400 f1604289.exe 400 f1604289.exe 400 f1604289.exe 400 f1604289.exe 400 f1604289.exe 400 f1604289.exe 400 f1604289.exe 400 f1604289.exe 400 f1604289.exe 400 f1604289.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 400 f1604289.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2020 1764 8417123e4a038a3b16346babc5269a0a931f8577e6be41f88e75137af33c43e0.exe 84 PID 1764 wrote to memory of 2020 1764 8417123e4a038a3b16346babc5269a0a931f8577e6be41f88e75137af33c43e0.exe 84 PID 1764 wrote to memory of 2020 1764 8417123e4a038a3b16346babc5269a0a931f8577e6be41f88e75137af33c43e0.exe 84 PID 2020 wrote to memory of 3820 2020 x3181102.exe 85 PID 2020 wrote to memory of 3820 2020 x3181102.exe 85 PID 2020 wrote to memory of 3820 2020 x3181102.exe 85 PID 3820 wrote to memory of 400 3820 x3653828.exe 86 PID 3820 wrote to memory of 400 3820 x3653828.exe 86 PID 3820 wrote to memory of 400 3820 x3653828.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8417123e4a038a3b16346babc5269a0a931f8577e6be41f88e75137af33c43e0.exe"C:\Users\Admin\AppData\Local\Temp\8417123e4a038a3b16346babc5269a0a931f8577e6be41f88e75137af33c43e0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3181102.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3181102.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3653828.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3653828.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1604289.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1604289.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5ea61aead2b99b3aaf9285249e1cac4ac
SHA1b482f32a361577458e278b69b7d2d826a08d4b5f
SHA256c1309f958ccc00c4bf7e4b2638f06eb3c0c95cf51d1b519243493a1075e2f0cc
SHA512ebe67176ac6a4f760faa7b64327f3b3c1bfbc441e319b9b49fb343d0d4183bc16cce154470d53b39365f746c507d8c4299f8b5e9302e4448d2cbe6096ec18aac
-
Filesize
377KB
MD5ea61aead2b99b3aaf9285249e1cac4ac
SHA1b482f32a361577458e278b69b7d2d826a08d4b5f
SHA256c1309f958ccc00c4bf7e4b2638f06eb3c0c95cf51d1b519243493a1075e2f0cc
SHA512ebe67176ac6a4f760faa7b64327f3b3c1bfbc441e319b9b49fb343d0d4183bc16cce154470d53b39365f746c507d8c4299f8b5e9302e4448d2cbe6096ec18aac
-
Filesize
206KB
MD595945ed5e0f9de6391c4fc6b8c8f9699
SHA1915e5e2ddd0af4f1c1459b587681a6f15fa1084d
SHA2562565bcaa973ddf5c3f86a55bcd4b5c88eeeaff902156fa731a7f5896f3eb4e60
SHA512cdb0835e04904f243ad45a34737a927ccabde3fd9546cbd399940addde5fad101db6e3ee9ec479c43def0531666b825fc85c4d46d5650207187ac50093332461
-
Filesize
206KB
MD595945ed5e0f9de6391c4fc6b8c8f9699
SHA1915e5e2ddd0af4f1c1459b587681a6f15fa1084d
SHA2562565bcaa973ddf5c3f86a55bcd4b5c88eeeaff902156fa731a7f5896f3eb4e60
SHA512cdb0835e04904f243ad45a34737a927ccabde3fd9546cbd399940addde5fad101db6e3ee9ec479c43def0531666b825fc85c4d46d5650207187ac50093332461
-
Filesize
172KB
MD5e008a87849a90c41ef068d47c3656764
SHA167d95c7b3c6827214c1ce46d58d6fca9d8afb979
SHA25695702b84e1078055cb8cd720af41d797e9fb3dab9bc5a2d7b3f7f993a5d98736
SHA5124ae9c920544e2e55e5190a02654c0c0e576f880010430cd90ad41903638df8abafe3b29e238a5785841140d59ce3f1d578b3e2344f9c027143a468af0dd77e78
-
Filesize
172KB
MD5e008a87849a90c41ef068d47c3656764
SHA167d95c7b3c6827214c1ce46d58d6fca9d8afb979
SHA25695702b84e1078055cb8cd720af41d797e9fb3dab9bc5a2d7b3f7f993a5d98736
SHA5124ae9c920544e2e55e5190a02654c0c0e576f880010430cd90ad41903638df8abafe3b29e238a5785841140d59ce3f1d578b3e2344f9c027143a468af0dd77e78