Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
27/08/2023, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
5002d8a5fbf06bf729af4bee75456b9c24227db27ce1c7cf650f26748385ea47.exe
Resource
win10-20230703-en
General
-
Target
5002d8a5fbf06bf729af4bee75456b9c24227db27ce1c7cf650f26748385ea47.exe
-
Size
1.4MB
-
MD5
b9e98f431fa0cd4bd89c854a31d4dd3d
-
SHA1
6caa85907ea022c6f65fea193225c061aedeb45e
-
SHA256
5002d8a5fbf06bf729af4bee75456b9c24227db27ce1c7cf650f26748385ea47
-
SHA512
472c2206e79d4cb6c96f87d440e32c230abac3922e50e77982c4197d928ed1b5dc89ccf986639a454ebd9f1490f58d9fe6a44e8ce670f3c68a73b86a724fa148
-
SSDEEP
24576:zyIPf8botxH5sKchAQIRk+irFlPRL5EwgoxDrvcQ1A2tTNXUKX8p87t:GIPJtXsKchAQuirFlZL5DD11A2r1X8p8
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 3340 y3464838.exe 4992 y4782324.exe 4116 y8846281.exe 4448 l3152794.exe 5104 saves.exe 4368 m4522404.exe 2940 n2829197.exe 4320 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 5044 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5002d8a5fbf06bf729af4bee75456b9c24227db27ce1c7cf650f26748385ea47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3464838.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4782324.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y8846281.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1636 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 704 wrote to memory of 3340 704 5002d8a5fbf06bf729af4bee75456b9c24227db27ce1c7cf650f26748385ea47.exe 70 PID 704 wrote to memory of 3340 704 5002d8a5fbf06bf729af4bee75456b9c24227db27ce1c7cf650f26748385ea47.exe 70 PID 704 wrote to memory of 3340 704 5002d8a5fbf06bf729af4bee75456b9c24227db27ce1c7cf650f26748385ea47.exe 70 PID 3340 wrote to memory of 4992 3340 y3464838.exe 71 PID 3340 wrote to memory of 4992 3340 y3464838.exe 71 PID 3340 wrote to memory of 4992 3340 y3464838.exe 71 PID 4992 wrote to memory of 4116 4992 y4782324.exe 72 PID 4992 wrote to memory of 4116 4992 y4782324.exe 72 PID 4992 wrote to memory of 4116 4992 y4782324.exe 72 PID 4116 wrote to memory of 4448 4116 y8846281.exe 73 PID 4116 wrote to memory of 4448 4116 y8846281.exe 73 PID 4116 wrote to memory of 4448 4116 y8846281.exe 73 PID 4448 wrote to memory of 5104 4448 l3152794.exe 74 PID 4448 wrote to memory of 5104 4448 l3152794.exe 74 PID 4448 wrote to memory of 5104 4448 l3152794.exe 74 PID 4116 wrote to memory of 4368 4116 y8846281.exe 75 PID 4116 wrote to memory of 4368 4116 y8846281.exe 75 PID 4116 wrote to memory of 4368 4116 y8846281.exe 75 PID 5104 wrote to memory of 1636 5104 saves.exe 76 PID 5104 wrote to memory of 1636 5104 saves.exe 76 PID 5104 wrote to memory of 1636 5104 saves.exe 76 PID 5104 wrote to memory of 4144 5104 saves.exe 78 PID 5104 wrote to memory of 4144 5104 saves.exe 78 PID 5104 wrote to memory of 4144 5104 saves.exe 78 PID 4144 wrote to memory of 4360 4144 cmd.exe 80 PID 4144 wrote to memory of 4360 4144 cmd.exe 80 PID 4144 wrote to memory of 4360 4144 cmd.exe 80 PID 4992 wrote to memory of 2940 4992 y4782324.exe 81 PID 4992 wrote to memory of 2940 4992 y4782324.exe 81 PID 4992 wrote to memory of 2940 4992 y4782324.exe 81 PID 4144 wrote to memory of 1532 4144 cmd.exe 82 PID 4144 wrote to memory of 1532 4144 cmd.exe 82 PID 4144 wrote to memory of 1532 4144 cmd.exe 82 PID 4144 wrote to memory of 2160 4144 cmd.exe 83 PID 4144 wrote to memory of 2160 4144 cmd.exe 83 PID 4144 wrote to memory of 2160 4144 cmd.exe 83 PID 4144 wrote to memory of 4108 4144 cmd.exe 84 PID 4144 wrote to memory of 4108 4144 cmd.exe 84 PID 4144 wrote to memory of 4108 4144 cmd.exe 84 PID 4144 wrote to memory of 4340 4144 cmd.exe 85 PID 4144 wrote to memory of 4340 4144 cmd.exe 85 PID 4144 wrote to memory of 4340 4144 cmd.exe 85 PID 4144 wrote to memory of 2936 4144 cmd.exe 86 PID 4144 wrote to memory of 2936 4144 cmd.exe 86 PID 4144 wrote to memory of 2936 4144 cmd.exe 86 PID 5104 wrote to memory of 5044 5104 saves.exe 88 PID 5104 wrote to memory of 5044 5104 saves.exe 88 PID 5104 wrote to memory of 5044 5104 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5002d8a5fbf06bf729af4bee75456b9c24227db27ce1c7cf650f26748385ea47.exe"C:\Users\Admin\AppData\Local\Temp\5002d8a5fbf06bf729af4bee75456b9c24227db27ce1c7cf650f26748385ea47.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3464838.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3464838.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4782324.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4782324.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y8846281.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y8846281.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3152794.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3152794.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:1532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2936
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:5044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m4522404.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m4522404.exe5⤵
- Executes dropped EXE
PID:4368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2829197.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2829197.exe4⤵
- Executes dropped EXE
PID:2940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5cdc36b30f3162feab2ad1ba3131b4ff2
SHA11d90eb09f6be960193e3cc408f7d80be5abc5af5
SHA2563c336dc702c4a8999610d1ef1c2ad4e4766566cff351026508a489c9e73bbcde
SHA512d00be5a1e588dcefc2c86fd51ce7049883e139c780a7ac3c7014981bbf9843f13b9967e244ed1337f0369e4b26e7e545a0db2c60264cc6932caf47eb9b7e9426
-
Filesize
1.3MB
MD5cdc36b30f3162feab2ad1ba3131b4ff2
SHA11d90eb09f6be960193e3cc408f7d80be5abc5af5
SHA2563c336dc702c4a8999610d1ef1c2ad4e4766566cff351026508a489c9e73bbcde
SHA512d00be5a1e588dcefc2c86fd51ce7049883e139c780a7ac3c7014981bbf9843f13b9967e244ed1337f0369e4b26e7e545a0db2c60264cc6932caf47eb9b7e9426
-
Filesize
476KB
MD5b186985bfc01b0278369a230d4de5c17
SHA1581c950fea20074937324b9116dcbd1f8f9db95c
SHA256f623561d32068da590dd83b06fc5a67a0b347e50c2be2c4e6c2e9bb535af78a8
SHA512d1858a7c835bb2ff6429d2463234fecb6831238056b2623fb90f3e072d4d77807d5701850d07c5a23b8c1080f0e0f1f7b02c4764247c2fde054f251be469829d
-
Filesize
476KB
MD5b186985bfc01b0278369a230d4de5c17
SHA1581c950fea20074937324b9116dcbd1f8f9db95c
SHA256f623561d32068da590dd83b06fc5a67a0b347e50c2be2c4e6c2e9bb535af78a8
SHA512d1858a7c835bb2ff6429d2463234fecb6831238056b2623fb90f3e072d4d77807d5701850d07c5a23b8c1080f0e0f1f7b02c4764247c2fde054f251be469829d
-
Filesize
174KB
MD5284c871778f93f7e4a95f9d41b5a4b36
SHA12467aa05cac5adfbc5c4551d9dc14ecfbc9ff969
SHA256b07bbffba755ac2a8c8147ad83fe83d66878b7173cdcc5870237b70d38075a12
SHA512bd523f53adff4cfb486088508d88b7f40f8fb2614ecb18a6bef560a86ad151dcb710015480e5a9177daedad10571b582e044d26df14f0249397c75048db9397c
-
Filesize
174KB
MD5284c871778f93f7e4a95f9d41b5a4b36
SHA12467aa05cac5adfbc5c4551d9dc14ecfbc9ff969
SHA256b07bbffba755ac2a8c8147ad83fe83d66878b7173cdcc5870237b70d38075a12
SHA512bd523f53adff4cfb486088508d88b7f40f8fb2614ecb18a6bef560a86ad151dcb710015480e5a9177daedad10571b582e044d26df14f0249397c75048db9397c
-
Filesize
320KB
MD5276a908795124036efcf454fdd8e9c76
SHA1785994412e6a5541848f2eaa4726230336a57bbb
SHA256c1d7ed4a008d263c0abfdd0abc0dd920532c35544c99172b19507536b05a3e8c
SHA5125d1e477642069c1bb08e9478eb3aef6a9278a1e774f431f2d34ffcc5453ad7473e3f4ccb9a757d52e5ad51d7b7c73182c0729eb0de2a5db4d821b601974e09ba
-
Filesize
320KB
MD5276a908795124036efcf454fdd8e9c76
SHA1785994412e6a5541848f2eaa4726230336a57bbb
SHA256c1d7ed4a008d263c0abfdd0abc0dd920532c35544c99172b19507536b05a3e8c
SHA5125d1e477642069c1bb08e9478eb3aef6a9278a1e774f431f2d34ffcc5453ad7473e3f4ccb9a757d52e5ad51d7b7c73182c0729eb0de2a5db4d821b601974e09ba
-
Filesize
322KB
MD5966baae10fc32973a4395ef70ce5cc1a
SHA19d58b7eb05420efeeee434d7badb3ef86ce59fee
SHA2569f75d9b05f51654a9ae0e2c2e8fce99b5ab748f76431ec87c650b4552f15b916
SHA512d339ec034e63186d93d001d1e13421bce7840531f14b32a3d1db181c9a48e051f9b51f799e6d5056d5c90d605a3a463707e812fb6c889f33297eb8ce6dc09c5d
-
Filesize
322KB
MD5966baae10fc32973a4395ef70ce5cc1a
SHA19d58b7eb05420efeeee434d7badb3ef86ce59fee
SHA2569f75d9b05f51654a9ae0e2c2e8fce99b5ab748f76431ec87c650b4552f15b916
SHA512d339ec034e63186d93d001d1e13421bce7840531f14b32a3d1db181c9a48e051f9b51f799e6d5056d5c90d605a3a463707e812fb6c889f33297eb8ce6dc09c5d
-
Filesize
140KB
MD55ac5b329a8731187f1e95508bd9fa390
SHA129495e1fc763c11dfa7cfe9862f173d4ea4f9228
SHA2566bd8d9828870d2d44e20cc33eef9b01f87b9988170e7077bb7bf261b40c1b5ab
SHA512dfd010030a18a7c09a226516cc8a51107be9787d75a6cbd508e7ec2d9265a370c71bddd9ca7772d106884baf795dc5bf4c2deddffc6c55a2791e6eb3cd3a6aa3
-
Filesize
140KB
MD55ac5b329a8731187f1e95508bd9fa390
SHA129495e1fc763c11dfa7cfe9862f173d4ea4f9228
SHA2566bd8d9828870d2d44e20cc33eef9b01f87b9988170e7077bb7bf261b40c1b5ab
SHA512dfd010030a18a7c09a226516cc8a51107be9787d75a6cbd508e7ec2d9265a370c71bddd9ca7772d106884baf795dc5bf4c2deddffc6c55a2791e6eb3cd3a6aa3
-
Filesize
322KB
MD5966baae10fc32973a4395ef70ce5cc1a
SHA19d58b7eb05420efeeee434d7badb3ef86ce59fee
SHA2569f75d9b05f51654a9ae0e2c2e8fce99b5ab748f76431ec87c650b4552f15b916
SHA512d339ec034e63186d93d001d1e13421bce7840531f14b32a3d1db181c9a48e051f9b51f799e6d5056d5c90d605a3a463707e812fb6c889f33297eb8ce6dc09c5d
-
Filesize
322KB
MD5966baae10fc32973a4395ef70ce5cc1a
SHA19d58b7eb05420efeeee434d7badb3ef86ce59fee
SHA2569f75d9b05f51654a9ae0e2c2e8fce99b5ab748f76431ec87c650b4552f15b916
SHA512d339ec034e63186d93d001d1e13421bce7840531f14b32a3d1db181c9a48e051f9b51f799e6d5056d5c90d605a3a463707e812fb6c889f33297eb8ce6dc09c5d
-
Filesize
322KB
MD5966baae10fc32973a4395ef70ce5cc1a
SHA19d58b7eb05420efeeee434d7badb3ef86ce59fee
SHA2569f75d9b05f51654a9ae0e2c2e8fce99b5ab748f76431ec87c650b4552f15b916
SHA512d339ec034e63186d93d001d1e13421bce7840531f14b32a3d1db181c9a48e051f9b51f799e6d5056d5c90d605a3a463707e812fb6c889f33297eb8ce6dc09c5d
-
Filesize
322KB
MD5966baae10fc32973a4395ef70ce5cc1a
SHA19d58b7eb05420efeeee434d7badb3ef86ce59fee
SHA2569f75d9b05f51654a9ae0e2c2e8fce99b5ab748f76431ec87c650b4552f15b916
SHA512d339ec034e63186d93d001d1e13421bce7840531f14b32a3d1db181c9a48e051f9b51f799e6d5056d5c90d605a3a463707e812fb6c889f33297eb8ce6dc09c5d
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b