Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
282s -
max time network
296s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 23:45
Static task
static1
Behavioral task
behavioral1
Sample
x4696713.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
x4696713.exe
Resource
win10-20230703-en
General
-
Target
x4696713.exe
-
Size
319KB
-
MD5
3441e6317cd6e42af1c6cd1f260d991a
-
SHA1
2b5ca51394ccfd915f3407860a664ac78987ba1c
-
SHA256
91a9b37a13cb7f8ee0a566939b846009f6bd14a71c7b66d2c333348e86907f87
-
SHA512
b3c5be466b826f7e05fe1babb16092a53126cec4f84cd38eb73a69d9935b856216cf3dbcb00f84b5f8b042252220ae8812fb0dc3c0c31673f17b7680f33fca9a
-
SSDEEP
6144:Key+bnr+2p0yN90QEUP54pcOnBJneBbFLxarfFpcvXEJ:+Mryy90+GpbBJnu5xsfFOs
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 1 IoCs
pid Process 1780 f3830351.exe -
Loads dropped DLL 3 IoCs
pid Process 2864 x4696713.exe 2864 x4696713.exe 1780 f3830351.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4696713.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x4696713.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2864 wrote to memory of 1780 2864 x4696713.exe 29 PID 2864 wrote to memory of 1780 2864 x4696713.exe 29 PID 2864 wrote to memory of 1780 2864 x4696713.exe 29 PID 2864 wrote to memory of 1780 2864 x4696713.exe 29 PID 2864 wrote to memory of 1780 2864 x4696713.exe 29 PID 2864 wrote to memory of 1780 2864 x4696713.exe 29 PID 2864 wrote to memory of 1780 2864 x4696713.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\x4696713.exe"C:\Users\Admin\AppData\Local\Temp\x4696713.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f3830351.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f3830351.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5eaf2a9ac494cf1e48654930517dd8636
SHA13efede98a8724690feb9ce18e8f99fe6cca1ac13
SHA256ecbd8c0ff0ea5e877684e11ba09a0777023124688608a84492734625a4785e0c
SHA512c4456109b24ceb7147fe864ad971da50f37b7609fe1139c4b9584c6c5dd52ab8f317ced1e513d2f1a55c5c72fd67a1f346ee235af8c817d84aa7a0a11659bff2
-
Filesize
265KB
MD5eaf2a9ac494cf1e48654930517dd8636
SHA13efede98a8724690feb9ce18e8f99fe6cca1ac13
SHA256ecbd8c0ff0ea5e877684e11ba09a0777023124688608a84492734625a4785e0c
SHA512c4456109b24ceb7147fe864ad971da50f37b7609fe1139c4b9584c6c5dd52ab8f317ced1e513d2f1a55c5c72fd67a1f346ee235af8c817d84aa7a0a11659bff2
-
Filesize
265KB
MD5eaf2a9ac494cf1e48654930517dd8636
SHA13efede98a8724690feb9ce18e8f99fe6cca1ac13
SHA256ecbd8c0ff0ea5e877684e11ba09a0777023124688608a84492734625a4785e0c
SHA512c4456109b24ceb7147fe864ad971da50f37b7609fe1139c4b9584c6c5dd52ab8f317ced1e513d2f1a55c5c72fd67a1f346ee235af8c817d84aa7a0a11659bff2
-
Filesize
265KB
MD5eaf2a9ac494cf1e48654930517dd8636
SHA13efede98a8724690feb9ce18e8f99fe6cca1ac13
SHA256ecbd8c0ff0ea5e877684e11ba09a0777023124688608a84492734625a4785e0c
SHA512c4456109b24ceb7147fe864ad971da50f37b7609fe1139c4b9584c6c5dd52ab8f317ced1e513d2f1a55c5c72fd67a1f346ee235af8c817d84aa7a0a11659bff2
-
Filesize
265KB
MD5eaf2a9ac494cf1e48654930517dd8636
SHA13efede98a8724690feb9ce18e8f99fe6cca1ac13
SHA256ecbd8c0ff0ea5e877684e11ba09a0777023124688608a84492734625a4785e0c
SHA512c4456109b24ceb7147fe864ad971da50f37b7609fe1139c4b9584c6c5dd52ab8f317ced1e513d2f1a55c5c72fd67a1f346ee235af8c817d84aa7a0a11659bff2
-
Filesize
265KB
MD5eaf2a9ac494cf1e48654930517dd8636
SHA13efede98a8724690feb9ce18e8f99fe6cca1ac13
SHA256ecbd8c0ff0ea5e877684e11ba09a0777023124688608a84492734625a4785e0c
SHA512c4456109b24ceb7147fe864ad971da50f37b7609fe1139c4b9584c6c5dd52ab8f317ced1e513d2f1a55c5c72fd67a1f346ee235af8c817d84aa7a0a11659bff2