Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2023, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
a2f47badc0b0db8e08ca23952f65ce6f5f9d02f7927a0b4e82b38014853bc856.exe
Resource
win10v2004-20230703-en
General
-
Target
a2f47badc0b0db8e08ca23952f65ce6f5f9d02f7927a0b4e82b38014853bc856.exe
-
Size
1014KB
-
MD5
087d9eb4a4a7ab1f79923d350455cc90
-
SHA1
bb022ec55269982ef9cf48578fe58deddad6a089
-
SHA256
a2f47badc0b0db8e08ca23952f65ce6f5f9d02f7927a0b4e82b38014853bc856
-
SHA512
3278fc5d05721bac47f33711a7d181f92c0eb0f1376b58655f4d94c1294c38e9195eb4eaaf90aab4728a99af84a07487ddf22e020fa70c1d0ab4179a562b0222
-
SSDEEP
12288:SMrYy905v816+DVKGcsQdJAxsJG3prsBsSQiKda1X15tbjLcvCopFWnNf3b2f9Ss:Oy7DosQDA2JG3prsBDp1fjLNopZShM3
Malware Config
Extracted
redline
masha
77.91.68.48:19071
-
auth_value
55b9b39a0dae383196a4b8d79e5bb805
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3320 x1851176.exe 1532 x8450758.exe 1132 f1547013.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1851176.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1851176.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8450758.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8450758.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a2f47badc0b0db8e08ca23952f65ce6f5f9d02f7927a0b4e82b38014853bc856.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a2f47badc0b0db8e08ca23952f65ce6f5f9d02f7927a0b4e82b38014853bc856.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1304 wrote to memory of 3320 1304 a2f47badc0b0db8e08ca23952f65ce6f5f9d02f7927a0b4e82b38014853bc856.exe 84 PID 1304 wrote to memory of 3320 1304 a2f47badc0b0db8e08ca23952f65ce6f5f9d02f7927a0b4e82b38014853bc856.exe 84 PID 1304 wrote to memory of 3320 1304 a2f47badc0b0db8e08ca23952f65ce6f5f9d02f7927a0b4e82b38014853bc856.exe 84 PID 3320 wrote to memory of 1532 3320 x1851176.exe 85 PID 3320 wrote to memory of 1532 3320 x1851176.exe 85 PID 3320 wrote to memory of 1532 3320 x1851176.exe 85 PID 1532 wrote to memory of 1132 1532 x8450758.exe 87 PID 1532 wrote to memory of 1132 1532 x8450758.exe 87 PID 1532 wrote to memory of 1132 1532 x8450758.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2f47badc0b0db8e08ca23952f65ce6f5f9d02f7927a0b4e82b38014853bc856.exe"C:\Users\Admin\AppData\Local\Temp\a2f47badc0b0db8e08ca23952f65ce6f5f9d02f7927a0b4e82b38014853bc856.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1851176.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1851176.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8450758.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8450758.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1547013.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1547013.exe4⤵
- Executes dropped EXE
PID:1132
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
858KB
MD5722f2b2fcdfa6d70035cb96339b3ce97
SHA1d4d14c42ca43b33b68b25e1bd1a6e68cf40d1237
SHA256b8640296d367f21322ebb1ffaaf8fbd619385a715b235a42966755988d6f5f4c
SHA5120d237e8b6568904f23749e27ba5afa73faf8d41f676e2624d881141145997b0dbd21010a66200299d492a05122521cf8ebfd59ccf2f537a83635039520975954
-
Filesize
858KB
MD5722f2b2fcdfa6d70035cb96339b3ce97
SHA1d4d14c42ca43b33b68b25e1bd1a6e68cf40d1237
SHA256b8640296d367f21322ebb1ffaaf8fbd619385a715b235a42966755988d6f5f4c
SHA5120d237e8b6568904f23749e27ba5afa73faf8d41f676e2624d881141145997b0dbd21010a66200299d492a05122521cf8ebfd59ccf2f537a83635039520975954
-
Filesize
757KB
MD5e30b3ca64b2d19e7829128b54e169285
SHA1a8761cfe787b868b1d1119379c92a78ca5fbc43a
SHA256fc3f079799ac5ae2812c034dcfc99c9f32b7d04fb2d3c631fd5aff7a5f7569ee
SHA512f7901e439ebda132e905e13ce42e7f188213c6ad07b9d2a07a12588591f3e7e6817ca0cde910ca62518e7e02c7c355ae6c09f8d833404ddaa44e7775362463c8
-
Filesize
757KB
MD5e30b3ca64b2d19e7829128b54e169285
SHA1a8761cfe787b868b1d1119379c92a78ca5fbc43a
SHA256fc3f079799ac5ae2812c034dcfc99c9f32b7d04fb2d3c631fd5aff7a5f7569ee
SHA512f7901e439ebda132e905e13ce42e7f188213c6ad07b9d2a07a12588591f3e7e6817ca0cde910ca62518e7e02c7c355ae6c09f8d833404ddaa44e7775362463c8
-
Filesize
729KB
MD594200ab299dfc5049524a399a8a48ce4
SHA131782944ba5aa80de5601d6c8738ae99b865a7c8
SHA256adbc73cf9ede1526e0411279f67147d913e2ec9a4e765e9243ebdfdd649139e6
SHA5125670fd6ba8c752bad158e3dd4ceb9c79b94dc87aeb510ca2a177d841d7e9e797a041b98b340c524e19f4095c1907a654530765747028e3529fbd994f226f91ec
-
Filesize
729KB
MD594200ab299dfc5049524a399a8a48ce4
SHA131782944ba5aa80de5601d6c8738ae99b865a7c8
SHA256adbc73cf9ede1526e0411279f67147d913e2ec9a4e765e9243ebdfdd649139e6
SHA5125670fd6ba8c752bad158e3dd4ceb9c79b94dc87aeb510ca2a177d841d7e9e797a041b98b340c524e19f4095c1907a654530765747028e3529fbd994f226f91ec