Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
26/08/2023, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
a0b33824a0fd5088fee3061fa79dc143331b05fcc7a3201b1d0d191d1bd8bb5c.exe
Resource
win10-20230703-en
General
-
Target
a0b33824a0fd5088fee3061fa79dc143331b05fcc7a3201b1d0d191d1bd8bb5c.exe
-
Size
514KB
-
MD5
8bfc6ea2f5daffb1da6de7b92fdfbc0b
-
SHA1
41ff36ed63936446e8165b96ac2d2f2514e6c353
-
SHA256
a0b33824a0fd5088fee3061fa79dc143331b05fcc7a3201b1d0d191d1bd8bb5c
-
SHA512
854ebdb2006f53a1ba6d59bd614ccdd01f77bcb8a7de74dafcf41f3eba3aebc94972def9ab3229827270126149fc2d06bb0a536348bd9c1d3be4a750e9af467b
-
SSDEEP
6144:DahOFNURwDa61k2qHkZTMEgh8DuayuK6ShAZ169bkKZKG1SPXwDfotM5yoObMEKo:DiuH1E78jK6SPRgG1SPUotxQEbz1B
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1952-17-0x0000000000400000-0x000000000045A000-memory.dmp family_redline -
Executes dropped EXE 1 IoCs
pid Process 800 civiltransfer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a0b33824a0fd5088fee3061fa79dc143331b05fcc7a3201b1d0d191d1bd8bb5c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 800 set thread context of 1952 800 civiltransfer.exe 72 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 800 civiltransfer.exe 800 civiltransfer.exe 800 civiltransfer.exe 1952 InstallUtil.exe 1952 InstallUtil.exe 1952 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 800 civiltransfer.exe Token: SeDebugPrivilege 1952 InstallUtil.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 944 wrote to memory of 800 944 a0b33824a0fd5088fee3061fa79dc143331b05fcc7a3201b1d0d191d1bd8bb5c.exe 70 PID 944 wrote to memory of 800 944 a0b33824a0fd5088fee3061fa79dc143331b05fcc7a3201b1d0d191d1bd8bb5c.exe 70 PID 944 wrote to memory of 800 944 a0b33824a0fd5088fee3061fa79dc143331b05fcc7a3201b1d0d191d1bd8bb5c.exe 70 PID 800 wrote to memory of 5004 800 civiltransfer.exe 71 PID 800 wrote to memory of 5004 800 civiltransfer.exe 71 PID 800 wrote to memory of 5004 800 civiltransfer.exe 71 PID 800 wrote to memory of 5004 800 civiltransfer.exe 71 PID 800 wrote to memory of 5004 800 civiltransfer.exe 71 PID 800 wrote to memory of 5004 800 civiltransfer.exe 71 PID 800 wrote to memory of 5004 800 civiltransfer.exe 71 PID 800 wrote to memory of 5004 800 civiltransfer.exe 71 PID 800 wrote to memory of 1952 800 civiltransfer.exe 72 PID 800 wrote to memory of 1952 800 civiltransfer.exe 72 PID 800 wrote to memory of 1952 800 civiltransfer.exe 72 PID 800 wrote to memory of 1952 800 civiltransfer.exe 72 PID 800 wrote to memory of 1952 800 civiltransfer.exe 72 PID 800 wrote to memory of 1952 800 civiltransfer.exe 72 PID 800 wrote to memory of 1952 800 civiltransfer.exe 72 PID 800 wrote to memory of 1952 800 civiltransfer.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0b33824a0fd5088fee3061fa79dc143331b05fcc7a3201b1d0d191d1bd8bb5c.exe"C:\Users\Admin\AppData\Local\Temp\a0b33824a0fd5088fee3061fa79dc143331b05fcc7a3201b1d0d191d1bd8bb5c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\civiltransfer.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\civiltransfer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:5004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
761KB
MD57170a66154dde65a296fe35408bcb368
SHA14add9106a0ed29b5300666f86883fdd1005b2af7
SHA256101bd9564d1c0a9f0c186476985ce1e837a69c3ec405ce15fd7b52327073fab6
SHA512503f2ec31700456aa7386dbe941e61c3584574370a2afa134c0bd5082603ee6caa3d0e644f1530e8e9a29bc3aca1545b1096604ac09b144a74abbef93df65ce7
-
Filesize
761KB
MD57170a66154dde65a296fe35408bcb368
SHA14add9106a0ed29b5300666f86883fdd1005b2af7
SHA256101bd9564d1c0a9f0c186476985ce1e837a69c3ec405ce15fd7b52327073fab6
SHA512503f2ec31700456aa7386dbe941e61c3584574370a2afa134c0bd5082603ee6caa3d0e644f1530e8e9a29bc3aca1545b1096604ac09b144a74abbef93df65ce7