Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
c03b7492e75c731fe6c3ad134.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
c03b7492e75c731fe6c3ad134.exe
Resource
win10v2004-20230703-en
General
-
Target
c03b7492e75c731fe6c3ad134.exe
-
Size
513KB
-
MD5
c03b7492e75c731fe6c3ad1349bf568e
-
SHA1
beb374b968b11084952499b9d3f570069bdb08e9
-
SHA256
9d4035a327dafaed0a688d2ecde747fcfe6c92ee05bd83b0f4020a1f8040f4f7
-
SHA512
15d60ec52f8886fcdb3b7dbe90076dafc64432dde325f489051e978cc535cb2de09bfc6b9eb57d39a6895bb488a70db399e4d64503a66ea05fbfab26e92abfa1
-
SSDEEP
12288:qfrlfv/aRdnQgnvtT8jCJyizL/ivKjIph:qfrBv/82gnvxGCUh
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 2224 x9918193.exe 1704 f9017522.exe -
Loads dropped DLL 5 IoCs
pid Process 2108 c03b7492e75c731fe6c3ad134.exe 2224 x9918193.exe 2224 x9918193.exe 2224 x9918193.exe 1704 f9017522.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce c03b7492e75c731fe6c3ad134.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c03b7492e75c731fe6c3ad134.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9918193.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9918193.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2224 2108 c03b7492e75c731fe6c3ad134.exe 30 PID 2108 wrote to memory of 2224 2108 c03b7492e75c731fe6c3ad134.exe 30 PID 2108 wrote to memory of 2224 2108 c03b7492e75c731fe6c3ad134.exe 30 PID 2108 wrote to memory of 2224 2108 c03b7492e75c731fe6c3ad134.exe 30 PID 2108 wrote to memory of 2224 2108 c03b7492e75c731fe6c3ad134.exe 30 PID 2108 wrote to memory of 2224 2108 c03b7492e75c731fe6c3ad134.exe 30 PID 2108 wrote to memory of 2224 2108 c03b7492e75c731fe6c3ad134.exe 30 PID 2224 wrote to memory of 1704 2224 x9918193.exe 31 PID 2224 wrote to memory of 1704 2224 x9918193.exe 31 PID 2224 wrote to memory of 1704 2224 x9918193.exe 31 PID 2224 wrote to memory of 1704 2224 x9918193.exe 31 PID 2224 wrote to memory of 1704 2224 x9918193.exe 31 PID 2224 wrote to memory of 1704 2224 x9918193.exe 31 PID 2224 wrote to memory of 1704 2224 x9918193.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c03b7492e75c731fe6c3ad134.exe"C:\Users\Admin\AppData\Local\Temp\c03b7492e75c731fe6c3ad134.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9918193.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9918193.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f9017522.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f9017522.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329KB
MD58db1f51e12653d709afa70b38c945af3
SHA19b01a113bd71867441599ad0fd1a2063eb5c7798
SHA2562e5074d9c1a70e559518a558c5ada98247d67325fcc09acf98814db8ba789774
SHA51223b99782c8966dccdddfb4e50e6df50337e913811008d1d5fb7758a92cc8532cae635511436a7d5566dad78be45c6bc6c30f81b21c76da38fe3f40aa1d52f3c7
-
Filesize
329KB
MD58db1f51e12653d709afa70b38c945af3
SHA19b01a113bd71867441599ad0fd1a2063eb5c7798
SHA2562e5074d9c1a70e559518a558c5ada98247d67325fcc09acf98814db8ba789774
SHA51223b99782c8966dccdddfb4e50e6df50337e913811008d1d5fb7758a92cc8532cae635511436a7d5566dad78be45c6bc6c30f81b21c76da38fe3f40aa1d52f3c7
-
Filesize
255KB
MD502f3efaacaafb3536da0f9b3900cee2a
SHA18f626639ad7eecef176c4003f719daeafa3ee2de
SHA256d29f79e0ec31573af961fc6ca988d758ec0bd912fd33f93020f252e1986c98dd
SHA5128a778c0ea923524fbec1c35298604b91ca834bea080047532b4a041ba06d9b7f7a4155be979a28d8918ad0e41319e7a01531ff663c097a3586ccf897a681726c
-
Filesize
255KB
MD502f3efaacaafb3536da0f9b3900cee2a
SHA18f626639ad7eecef176c4003f719daeafa3ee2de
SHA256d29f79e0ec31573af961fc6ca988d758ec0bd912fd33f93020f252e1986c98dd
SHA5128a778c0ea923524fbec1c35298604b91ca834bea080047532b4a041ba06d9b7f7a4155be979a28d8918ad0e41319e7a01531ff663c097a3586ccf897a681726c
-
Filesize
255KB
MD502f3efaacaafb3536da0f9b3900cee2a
SHA18f626639ad7eecef176c4003f719daeafa3ee2de
SHA256d29f79e0ec31573af961fc6ca988d758ec0bd912fd33f93020f252e1986c98dd
SHA5128a778c0ea923524fbec1c35298604b91ca834bea080047532b4a041ba06d9b7f7a4155be979a28d8918ad0e41319e7a01531ff663c097a3586ccf897a681726c
-
Filesize
329KB
MD58db1f51e12653d709afa70b38c945af3
SHA19b01a113bd71867441599ad0fd1a2063eb5c7798
SHA2562e5074d9c1a70e559518a558c5ada98247d67325fcc09acf98814db8ba789774
SHA51223b99782c8966dccdddfb4e50e6df50337e913811008d1d5fb7758a92cc8532cae635511436a7d5566dad78be45c6bc6c30f81b21c76da38fe3f40aa1d52f3c7
-
Filesize
329KB
MD58db1f51e12653d709afa70b38c945af3
SHA19b01a113bd71867441599ad0fd1a2063eb5c7798
SHA2562e5074d9c1a70e559518a558c5ada98247d67325fcc09acf98814db8ba789774
SHA51223b99782c8966dccdddfb4e50e6df50337e913811008d1d5fb7758a92cc8532cae635511436a7d5566dad78be45c6bc6c30f81b21c76da38fe3f40aa1d52f3c7
-
Filesize
255KB
MD502f3efaacaafb3536da0f9b3900cee2a
SHA18f626639ad7eecef176c4003f719daeafa3ee2de
SHA256d29f79e0ec31573af961fc6ca988d758ec0bd912fd33f93020f252e1986c98dd
SHA5128a778c0ea923524fbec1c35298604b91ca834bea080047532b4a041ba06d9b7f7a4155be979a28d8918ad0e41319e7a01531ff663c097a3586ccf897a681726c
-
Filesize
255KB
MD502f3efaacaafb3536da0f9b3900cee2a
SHA18f626639ad7eecef176c4003f719daeafa3ee2de
SHA256d29f79e0ec31573af961fc6ca988d758ec0bd912fd33f93020f252e1986c98dd
SHA5128a778c0ea923524fbec1c35298604b91ca834bea080047532b4a041ba06d9b7f7a4155be979a28d8918ad0e41319e7a01531ff663c097a3586ccf897a681726c
-
Filesize
255KB
MD502f3efaacaafb3536da0f9b3900cee2a
SHA18f626639ad7eecef176c4003f719daeafa3ee2de
SHA256d29f79e0ec31573af961fc6ca988d758ec0bd912fd33f93020f252e1986c98dd
SHA5128a778c0ea923524fbec1c35298604b91ca834bea080047532b4a041ba06d9b7f7a4155be979a28d8918ad0e41319e7a01531ff663c097a3586ccf897a681726c