Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2023, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
575KB
-
MD5
7e1c47ca9cef11631ddd096c1d3639c7
-
SHA1
4e8d9b1efb8b4b7b316e5a7fd3fb808e2da759a8
-
SHA256
02c640ef3ac9d7fa8c919b0f72bb85413ef3e9803d2d091277b9a7c41f52e9d9
-
SHA512
fa029905bf1921ab433f949167e64874e5da3e98908da38c92ae8e4db987a6ab786f68942993e34c92f713d7bf701e4d066da9abde7b88b6ff018663ba79490a
-
SSDEEP
6144:qTov37S4OHn8MDIYKReFMjkyI/VYXVhUYbjDyVlQBCVTI:qcv37SajRVjziVq3gVlsCVT
Malware Config
Extracted
redline
2
95.216.249.153:81
-
auth_value
101013a5e99e0857595aae297a11351d
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Extracted
laplas
http://45.159.189.105
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 4948 p5zl9bq82kjf7.exe 2828 ClipperDoej4oa.exe 4820 Upshotox64.exe 3604 ntlhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" ClipperDoej4oa.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Windows\CurrentVersion\Run AppLaunch.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe'\"" AppLaunch.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1996 set thread context of 4532 1996 file.exe 84 PID 4948 set thread context of 5052 4948 p5zl9bq82kjf7.exe 95 PID 4820 set thread context of 1292 4820 Upshotox64.exe 102 -
Program crash 3 IoCs
pid pid_target Process procid_target 2436 1996 WerFault.exe 82 1816 4948 WerFault.exe 93 2672 4820 WerFault.exe 100 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 36 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4532 AppLaunch.exe 4532 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4532 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1996 wrote to memory of 4532 1996 file.exe 84 PID 1996 wrote to memory of 4532 1996 file.exe 84 PID 1996 wrote to memory of 4532 1996 file.exe 84 PID 1996 wrote to memory of 4532 1996 file.exe 84 PID 1996 wrote to memory of 4532 1996 file.exe 84 PID 4532 wrote to memory of 4948 4532 AppLaunch.exe 93 PID 4532 wrote to memory of 4948 4532 AppLaunch.exe 93 PID 4532 wrote to memory of 4948 4532 AppLaunch.exe 93 PID 4948 wrote to memory of 3364 4948 p5zl9bq82kjf7.exe 96 PID 4948 wrote to memory of 3364 4948 p5zl9bq82kjf7.exe 96 PID 4948 wrote to memory of 3364 4948 p5zl9bq82kjf7.exe 96 PID 4948 wrote to memory of 5052 4948 p5zl9bq82kjf7.exe 95 PID 4948 wrote to memory of 5052 4948 p5zl9bq82kjf7.exe 95 PID 4948 wrote to memory of 5052 4948 p5zl9bq82kjf7.exe 95 PID 4948 wrote to memory of 5052 4948 p5zl9bq82kjf7.exe 95 PID 4948 wrote to memory of 5052 4948 p5zl9bq82kjf7.exe 95 PID 4532 wrote to memory of 2828 4532 AppLaunch.exe 99 PID 4532 wrote to memory of 2828 4532 AppLaunch.exe 99 PID 4532 wrote to memory of 2828 4532 AppLaunch.exe 99 PID 4532 wrote to memory of 4820 4532 AppLaunch.exe 100 PID 4532 wrote to memory of 4820 4532 AppLaunch.exe 100 PID 4532 wrote to memory of 4820 4532 AppLaunch.exe 100 PID 4820 wrote to memory of 1292 4820 Upshotox64.exe 102 PID 4820 wrote to memory of 1292 4820 Upshotox64.exe 102 PID 4820 wrote to memory of 1292 4820 Upshotox64.exe 102 PID 4820 wrote to memory of 1292 4820 Upshotox64.exe 102 PID 4820 wrote to memory of 1292 4820 Upshotox64.exe 102 PID 2828 wrote to memory of 3604 2828 ClipperDoej4oa.exe 106 PID 2828 wrote to memory of 3604 2828 ClipperDoej4oa.exe 106 PID 2828 wrote to memory of 3604 2828 ClipperDoej4oa.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe"C:\Users\Admin\AppData\Local\Temp\p5zl9bq82kjf7.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:5052
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 2964⤵
- Program crash
PID:1816
-
-
-
C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe"C:\Users\Admin\AppData\Local\Temp\ClipperDoej4oa.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Executes dropped EXE
PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe"C:\Users\Admin\AppData\Local\Temp\Upshotox64.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Adds Run key to start application
PID:1292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 2964⤵
- Program crash
PID:2672
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 2922⤵
- Program crash
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1996 -ip 19961⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4948 -ip 49481⤵PID:416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4820 -ip 48201⤵PID:4640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
3.8MB
MD568be007bd3fa09d26fcee584a9157770
SHA16f191c0587c8055f26367f25ce0f7787ca272714
SHA25671acc9e68e019bd99d89f1bc2efa859bdb16b13cb69abb02dba8b993265aed6e
SHA512f6c774453eae56e95761951315d37700e44b6c04ea07e0e6b46fe4a87943f051206a5dd618b4f632ff926fbb4be94fe7925c46d115a25941c084cb8fb513a245
-
Filesize
412KB
MD542851869d2ed62806999dd416ff9f45b
SHA146333b2f7ddf326a774b43ea2d66ed681486fd34
SHA256a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6
SHA51243e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f
-
Filesize
412KB
MD542851869d2ed62806999dd416ff9f45b
SHA146333b2f7ddf326a774b43ea2d66ed681486fd34
SHA256a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6
SHA51243e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f
-
Filesize
412KB
MD542851869d2ed62806999dd416ff9f45b
SHA146333b2f7ddf326a774b43ea2d66ed681486fd34
SHA256a6734f7888870bb71002eb528eb1b175b6bcaaf77d216dddd54b13ca967bdfb6
SHA51243e563a64ef0e85c21bb491666f0ef97392563d40bb3f570c08a3d79affc202ff2b2dd58e5288a80a3e558e711e875d8232d9c0732bdfeb216c49cfc16be0a7f
-
Filesize
2.9MB
MD573e4eccfbd36690b22434b8edaeab4bf
SHA1dd7f7c0577149ddc9302998c00ac9846498c973b
SHA256ef543bf69789486fc724e0c42f2a09a0318af27f6a3bb1889bf7db6d89fd1b9a
SHA512a5fef4cfdf400e953eab0604e41de44d0b8f9cd4f1b89401cbab77f5e0c8bcb5c41538d0772492065d59b6f24d54fee21e669aa34931c26fa4ae0aeed27df127
-
Filesize
2.9MB
MD573e4eccfbd36690b22434b8edaeab4bf
SHA1dd7f7c0577149ddc9302998c00ac9846498c973b
SHA256ef543bf69789486fc724e0c42f2a09a0318af27f6a3bb1889bf7db6d89fd1b9a
SHA512a5fef4cfdf400e953eab0604e41de44d0b8f9cd4f1b89401cbab77f5e0c8bcb5c41538d0772492065d59b6f24d54fee21e669aa34931c26fa4ae0aeed27df127
-
Filesize
2.9MB
MD573e4eccfbd36690b22434b8edaeab4bf
SHA1dd7f7c0577149ddc9302998c00ac9846498c973b
SHA256ef543bf69789486fc724e0c42f2a09a0318af27f6a3bb1889bf7db6d89fd1b9a
SHA512a5fef4cfdf400e953eab0604e41de44d0b8f9cd4f1b89401cbab77f5e0c8bcb5c41538d0772492065d59b6f24d54fee21e669aa34931c26fa4ae0aeed27df127
-
Filesize
809.8MB
MD50c729ed30f6d5a31a3601d93968b0856
SHA172983b3cbba12cdd953c499d8acf99e2beb75c05
SHA256a042eb231b414b2d4bbd0ab97a64a33f5b29a64ef2b980144c346732bf936e98
SHA512649bc4abed9e089cfc14bf160202b87b3ceafe4186bf4349ab255f2e34361cf37fcf1b401e3656e250e60a4ac37a19d4d4c82078b93f23ad57bfc4577c90b798
-
Filesize
809.8MB
MD50c729ed30f6d5a31a3601d93968b0856
SHA172983b3cbba12cdd953c499d8acf99e2beb75c05
SHA256a042eb231b414b2d4bbd0ab97a64a33f5b29a64ef2b980144c346732bf936e98
SHA512649bc4abed9e089cfc14bf160202b87b3ceafe4186bf4349ab255f2e34361cf37fcf1b401e3656e250e60a4ac37a19d4d4c82078b93f23ad57bfc4577c90b798