Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2023, 07:48

General

  • Target

    c14f785a7001b3ede5b9e0c337bd2675a45c63b7cf9fa.exe

  • Size

    771KB

  • MD5

    9deafb4e1006795e7f23f944063caf96

  • SHA1

    d2ce67d027581be78b59a68fb581a98f03313c73

  • SHA256

    c14f785a7001b3ede5b9e0c337bd2675a45c63b7cf9faf801ce1675455496ad7

  • SHA512

    e0464358ba5239de749204078e3000449e69aafe004640ea04bf2f034a01a5715740dcab40622f65af1583a84705d7b53c40bb7e1c2162b7437003204ca801f1

  • SSDEEP

    12288:UMrIy90duxg2th7O233mLTdoQOdfKDTKrxQTbZsYjvoAh/jBqHz5NMbfZ6wy2UL:EyMux37Oi4ajIurImYboAh7ItN1wyb

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c14f785a7001b3ede5b9e0c337bd2675a45c63b7cf9fa.exe
    "C:\Users\Admin\AppData\Local\Temp\c14f785a7001b3ede5b9e0c337bd2675a45c63b7cf9fa.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7964700.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7964700.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4653168.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4653168.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2484
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6734722.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6734722.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2152

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7964700.exe

    Filesize

    615KB

    MD5

    8e3a8c69a7ceedb5e640f44fb1340159

    SHA1

    cf2d755bdaeeabc15ce7e5520358e44c54aa99f8

    SHA256

    a96c6eeaf07c7031832cc9ea9a59821dde73c3fbcc1cd04df7afc4cd037b7738

    SHA512

    8d69b84fe665f27952654eec7b5ebae371bc7e51c7ffeb8102d826918419699c40a4658a06a90cb404b3a7d7567da7ca22fcd8a3a9fead836e600e100efee952

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7964700.exe

    Filesize

    615KB

    MD5

    8e3a8c69a7ceedb5e640f44fb1340159

    SHA1

    cf2d755bdaeeabc15ce7e5520358e44c54aa99f8

    SHA256

    a96c6eeaf07c7031832cc9ea9a59821dde73c3fbcc1cd04df7afc4cd037b7738

    SHA512

    8d69b84fe665f27952654eec7b5ebae371bc7e51c7ffeb8102d826918419699c40a4658a06a90cb404b3a7d7567da7ca22fcd8a3a9fead836e600e100efee952

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4653168.exe

    Filesize

    513KB

    MD5

    7762eea827a15e70be414a45515238ab

    SHA1

    4f33e691aee301cef0db955d6514d3c24045a08c

    SHA256

    1016dad96e6bb08265354aeb8f981dcb5e99784b666f4bcfddc349347b23458e

    SHA512

    f677ffc67f919370792da7407b64e87f65d6dd2bd9fc865c6918c8794c601eb065db7925610bc1716ffa602e4810252e68b5c4a64abbf1f1c32f0c9899063d35

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4653168.exe

    Filesize

    513KB

    MD5

    7762eea827a15e70be414a45515238ab

    SHA1

    4f33e691aee301cef0db955d6514d3c24045a08c

    SHA256

    1016dad96e6bb08265354aeb8f981dcb5e99784b666f4bcfddc349347b23458e

    SHA512

    f677ffc67f919370792da7407b64e87f65d6dd2bd9fc865c6918c8794c601eb065db7925610bc1716ffa602e4810252e68b5c4a64abbf1f1c32f0c9899063d35

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6734722.exe

    Filesize

    491KB

    MD5

    ac037ce9986a5fcb7d3a837b4bfc7bc9

    SHA1

    ba0022ec0d933756bccdf99b6f3a8ee547d25cfd

    SHA256

    a4b805fc3956dc55aab8d8776377851e57b0256e3ba9e4ddbd6ed52c28bdf5e9

    SHA512

    f3b87090225ef7b03ff8fdb8e819b8c64aa832696dfa664c106b5df16d700a60c36c0379b92343d33f988e4b2523aba817733f9d276ed016671d0a55fa992308

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6734722.exe

    Filesize

    491KB

    MD5

    ac037ce9986a5fcb7d3a837b4bfc7bc9

    SHA1

    ba0022ec0d933756bccdf99b6f3a8ee547d25cfd

    SHA256

    a4b805fc3956dc55aab8d8776377851e57b0256e3ba9e4ddbd6ed52c28bdf5e9

    SHA512

    f3b87090225ef7b03ff8fdb8e819b8c64aa832696dfa664c106b5df16d700a60c36c0379b92343d33f988e4b2523aba817733f9d276ed016671d0a55fa992308

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6734722.exe

    Filesize

    491KB

    MD5

    ac037ce9986a5fcb7d3a837b4bfc7bc9

    SHA1

    ba0022ec0d933756bccdf99b6f3a8ee547d25cfd

    SHA256

    a4b805fc3956dc55aab8d8776377851e57b0256e3ba9e4ddbd6ed52c28bdf5e9

    SHA512

    f3b87090225ef7b03ff8fdb8e819b8c64aa832696dfa664c106b5df16d700a60c36c0379b92343d33f988e4b2523aba817733f9d276ed016671d0a55fa992308

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7964700.exe

    Filesize

    615KB

    MD5

    8e3a8c69a7ceedb5e640f44fb1340159

    SHA1

    cf2d755bdaeeabc15ce7e5520358e44c54aa99f8

    SHA256

    a96c6eeaf07c7031832cc9ea9a59821dde73c3fbcc1cd04df7afc4cd037b7738

    SHA512

    8d69b84fe665f27952654eec7b5ebae371bc7e51c7ffeb8102d826918419699c40a4658a06a90cb404b3a7d7567da7ca22fcd8a3a9fead836e600e100efee952

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7964700.exe

    Filesize

    615KB

    MD5

    8e3a8c69a7ceedb5e640f44fb1340159

    SHA1

    cf2d755bdaeeabc15ce7e5520358e44c54aa99f8

    SHA256

    a96c6eeaf07c7031832cc9ea9a59821dde73c3fbcc1cd04df7afc4cd037b7738

    SHA512

    8d69b84fe665f27952654eec7b5ebae371bc7e51c7ffeb8102d826918419699c40a4658a06a90cb404b3a7d7567da7ca22fcd8a3a9fead836e600e100efee952

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4653168.exe

    Filesize

    513KB

    MD5

    7762eea827a15e70be414a45515238ab

    SHA1

    4f33e691aee301cef0db955d6514d3c24045a08c

    SHA256

    1016dad96e6bb08265354aeb8f981dcb5e99784b666f4bcfddc349347b23458e

    SHA512

    f677ffc67f919370792da7407b64e87f65d6dd2bd9fc865c6918c8794c601eb065db7925610bc1716ffa602e4810252e68b5c4a64abbf1f1c32f0c9899063d35

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4653168.exe

    Filesize

    513KB

    MD5

    7762eea827a15e70be414a45515238ab

    SHA1

    4f33e691aee301cef0db955d6514d3c24045a08c

    SHA256

    1016dad96e6bb08265354aeb8f981dcb5e99784b666f4bcfddc349347b23458e

    SHA512

    f677ffc67f919370792da7407b64e87f65d6dd2bd9fc865c6918c8794c601eb065db7925610bc1716ffa602e4810252e68b5c4a64abbf1f1c32f0c9899063d35

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\g6734722.exe

    Filesize

    491KB

    MD5

    ac037ce9986a5fcb7d3a837b4bfc7bc9

    SHA1

    ba0022ec0d933756bccdf99b6f3a8ee547d25cfd

    SHA256

    a4b805fc3956dc55aab8d8776377851e57b0256e3ba9e4ddbd6ed52c28bdf5e9

    SHA512

    f3b87090225ef7b03ff8fdb8e819b8c64aa832696dfa664c106b5df16d700a60c36c0379b92343d33f988e4b2523aba817733f9d276ed016671d0a55fa992308

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\g6734722.exe

    Filesize

    491KB

    MD5

    ac037ce9986a5fcb7d3a837b4bfc7bc9

    SHA1

    ba0022ec0d933756bccdf99b6f3a8ee547d25cfd

    SHA256

    a4b805fc3956dc55aab8d8776377851e57b0256e3ba9e4ddbd6ed52c28bdf5e9

    SHA512

    f3b87090225ef7b03ff8fdb8e819b8c64aa832696dfa664c106b5df16d700a60c36c0379b92343d33f988e4b2523aba817733f9d276ed016671d0a55fa992308

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\g6734722.exe

    Filesize

    491KB

    MD5

    ac037ce9986a5fcb7d3a837b4bfc7bc9

    SHA1

    ba0022ec0d933756bccdf99b6f3a8ee547d25cfd

    SHA256

    a4b805fc3956dc55aab8d8776377851e57b0256e3ba9e4ddbd6ed52c28bdf5e9

    SHA512

    f3b87090225ef7b03ff8fdb8e819b8c64aa832696dfa664c106b5df16d700a60c36c0379b92343d33f988e4b2523aba817733f9d276ed016671d0a55fa992308

  • memory/2152-87-0x0000000000340000-0x00000000003CC000-memory.dmp

    Filesize

    560KB

  • memory/2152-88-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB

  • memory/2152-94-0x0000000000340000-0x00000000003CC000-memory.dmp

    Filesize

    560KB

  • memory/2152-95-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

    Filesize

    4KB

  • memory/2152-96-0x0000000000A40000-0x0000000000A46000-memory.dmp

    Filesize

    24KB

  • memory/2152-97-0x0000000000400000-0x000000000047F000-memory.dmp

    Filesize

    508KB