Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
13/06/2023, 07:00
230613-hs3zbafg3w 1013/06/2023, 06:39
230613-heq3lafg2t 1013/06/2023, 03:28
230613-d1sq4aee98 1013/06/2023, 03:07
230613-dmpghsfb3z 10Analysis
-
max time kernel
263s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2023, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
Resource
win10v2004-20230220-en
General
-
Target
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
-
Size
693.0MB
-
MD5
fb757b3c077ec1976a8079ca0925e330
-
SHA1
a8a3c03094572e007b867b5bb9c26acfb182c509
-
SHA256
f2c3ec6f9869bb611d264d0a4a0dd0ba68b84d17672f07db44e90254b429a667
-
SHA512
6fe3c5aebf1e576215ebd283f967aa35d73339df82c8d06e54fcee6fd33dc4d98408d3916c1a683a71b41a4d2dfe54d18883538bd3f7933d857b72e7dd911502
-
SSDEEP
1572864:NphKtrquc1CVrmamaH0Zxz6RILY6/noAuKFiAC2J2:Npg+Z0VTmVxz1d/noAB72
Malware Config
Extracted
redline
@hendrolas
94.142.138.4:80
-
auth_value
71d16d25eddbb4fd3b98070432f1a757
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 60 4152 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2940 Installer-Expert_v7g.1.7b.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4152 set thread context of 3844 4152 powershell.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe 4152 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4152 powershell.exe Token: SeShutdownPrivilege 4152 powershell.exe Token: SeCreatePagefilePrivilege 4152 powershell.exe Token: SeDebugPrivilege 3844 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2940 2716 InstallerExpress_v3v.0u.6s.exe 91 PID 2716 wrote to memory of 2940 2716 InstallerExpress_v3v.0u.6s.exe 91 PID 2716 wrote to memory of 2940 2716 InstallerExpress_v3v.0u.6s.exe 91 PID 2940 wrote to memory of 4152 2940 Installer-Expert_v7g.1.7b.exe 93 PID 2940 wrote to memory of 4152 2940 Installer-Expert_v7g.1.7b.exe 93 PID 2940 wrote to memory of 4152 2940 Installer-Expert_v7g.1.7b.exe 93 PID 4152 wrote to memory of 3844 4152 powershell.exe 95 PID 4152 wrote to memory of 3844 4152 powershell.exe 95 PID 4152 wrote to memory of 3844 4152 powershell.exe 95 PID 4152 wrote to memory of 3844 4152 powershell.exe 95 PID 4152 wrote to memory of 3844 4152 powershell.exe 95 PID 4152 wrote to memory of 3844 4152 powershell.exe 95 PID 4152 wrote to memory of 3844 4152 powershell.exe 95 PID 4152 wrote to memory of 3844 4152 powershell.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe"C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe"C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
761.8MB
MD5469b4eb3d9e71ace8bc01d46fe8ec6f3
SHA1489aa9ab8aa9a3f20eacdd418c9c91c1326edac4
SHA2560cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562
SHA512207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c
-
Filesize
761.8MB
MD5469b4eb3d9e71ace8bc01d46fe8ec6f3
SHA1489aa9ab8aa9a3f20eacdd418c9c91c1326edac4
SHA2560cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562
SHA512207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82