Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
27/08/2023, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
067a0c14115103009c563e7b0b2864f10fbc38e174ab1e7dc3aee987940e978d.exe
Resource
win10-20230703-en
General
-
Target
067a0c14115103009c563e7b0b2864f10fbc38e174ab1e7dc3aee987940e978d.exe
-
Size
1.4MB
-
MD5
dafe4dd43f3f1d2bd942eff128043baf
-
SHA1
f1f90e84f06d2bbabdb78f87669a6070ee0da59d
-
SHA256
067a0c14115103009c563e7b0b2864f10fbc38e174ab1e7dc3aee987940e978d
-
SHA512
3144ab13bec1f1e1cea28cf845d3c277f2c5055f5597ac1876247bb2c00b3e7396ea32505dc6443a8ad2116484a1ddbd9b0c56cb7374c8aefe1c23145cbfc4e4
-
SSDEEP
24576:lynq2owKSr122SqvJMOGbaVQrOgKv/aiFOnF5oQ+/wtXichYd7zXm:AnhJKSr122SKebaVQrtKnnFOFfGWichw
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4876 y4284985.exe 2712 y7800558.exe 4484 y7404803.exe 4544 l1883157.exe 3408 saves.exe 4468 m1314337.exe 4604 n8763851.exe 4948 saves.exe 824 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3016 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 067a0c14115103009c563e7b0b2864f10fbc38e174ab1e7dc3aee987940e978d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4284985.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y7800558.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y7404803.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3272 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4924 wrote to memory of 4876 4924 067a0c14115103009c563e7b0b2864f10fbc38e174ab1e7dc3aee987940e978d.exe 70 PID 4924 wrote to memory of 4876 4924 067a0c14115103009c563e7b0b2864f10fbc38e174ab1e7dc3aee987940e978d.exe 70 PID 4924 wrote to memory of 4876 4924 067a0c14115103009c563e7b0b2864f10fbc38e174ab1e7dc3aee987940e978d.exe 70 PID 4876 wrote to memory of 2712 4876 y4284985.exe 71 PID 4876 wrote to memory of 2712 4876 y4284985.exe 71 PID 4876 wrote to memory of 2712 4876 y4284985.exe 71 PID 2712 wrote to memory of 4484 2712 y7800558.exe 72 PID 2712 wrote to memory of 4484 2712 y7800558.exe 72 PID 2712 wrote to memory of 4484 2712 y7800558.exe 72 PID 4484 wrote to memory of 4544 4484 y7404803.exe 73 PID 4484 wrote to memory of 4544 4484 y7404803.exe 73 PID 4484 wrote to memory of 4544 4484 y7404803.exe 73 PID 4544 wrote to memory of 3408 4544 l1883157.exe 74 PID 4544 wrote to memory of 3408 4544 l1883157.exe 74 PID 4544 wrote to memory of 3408 4544 l1883157.exe 74 PID 4484 wrote to memory of 4468 4484 y7404803.exe 75 PID 4484 wrote to memory of 4468 4484 y7404803.exe 75 PID 4484 wrote to memory of 4468 4484 y7404803.exe 75 PID 3408 wrote to memory of 3272 3408 saves.exe 76 PID 3408 wrote to memory of 3272 3408 saves.exe 76 PID 3408 wrote to memory of 3272 3408 saves.exe 76 PID 3408 wrote to memory of 4792 3408 saves.exe 78 PID 3408 wrote to memory of 4792 3408 saves.exe 78 PID 3408 wrote to memory of 4792 3408 saves.exe 78 PID 4792 wrote to memory of 5052 4792 cmd.exe 80 PID 4792 wrote to memory of 5052 4792 cmd.exe 80 PID 4792 wrote to memory of 5052 4792 cmd.exe 80 PID 4792 wrote to memory of 4480 4792 cmd.exe 81 PID 4792 wrote to memory of 4480 4792 cmd.exe 81 PID 4792 wrote to memory of 4480 4792 cmd.exe 81 PID 4792 wrote to memory of 4576 4792 cmd.exe 82 PID 4792 wrote to memory of 4576 4792 cmd.exe 82 PID 4792 wrote to memory of 4576 4792 cmd.exe 82 PID 4792 wrote to memory of 5008 4792 cmd.exe 83 PID 4792 wrote to memory of 5008 4792 cmd.exe 83 PID 4792 wrote to memory of 5008 4792 cmd.exe 83 PID 4792 wrote to memory of 4032 4792 cmd.exe 84 PID 4792 wrote to memory of 4032 4792 cmd.exe 84 PID 4792 wrote to memory of 4032 4792 cmd.exe 84 PID 4792 wrote to memory of 4936 4792 cmd.exe 85 PID 4792 wrote to memory of 4936 4792 cmd.exe 85 PID 4792 wrote to memory of 4936 4792 cmd.exe 85 PID 2712 wrote to memory of 4604 2712 y7800558.exe 86 PID 2712 wrote to memory of 4604 2712 y7800558.exe 86 PID 2712 wrote to memory of 4604 2712 y7800558.exe 86 PID 3408 wrote to memory of 3016 3408 saves.exe 88 PID 3408 wrote to memory of 3016 3408 saves.exe 88 PID 3408 wrote to memory of 3016 3408 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\067a0c14115103009c563e7b0b2864f10fbc38e174ab1e7dc3aee987940e978d.exe"C:\Users\Admin\AppData\Local\Temp\067a0c14115103009c563e7b0b2864f10fbc38e174ab1e7dc3aee987940e978d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4284985.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4284985.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7800558.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7800558.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7404803.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7404803.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1883157.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1883157.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:3272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:5052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4480
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:5008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4936
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1314337.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1314337.exe5⤵
- Executes dropped EXE
PID:4468
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n8763851.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n8763851.exe4⤵
- Executes dropped EXE
PID:4604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4948
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD54927724cf622fc0e6cddfb19b6c127f5
SHA1135e22eb007af2d86c961c2addcad5b7c053c4d4
SHA256574411c62dfc14d92510fde001062fdaaa665da3c41c6356fa6c5d625cfab981
SHA5128d33f470375956d924cfbc8f73681285e26033e12680e6c09a0c7d05d200b1b2f13d342e5c67b90ccdd6c8ceb66be8adb5689d561138cde196e233c7d540964c
-
Filesize
1.3MB
MD54927724cf622fc0e6cddfb19b6c127f5
SHA1135e22eb007af2d86c961c2addcad5b7c053c4d4
SHA256574411c62dfc14d92510fde001062fdaaa665da3c41c6356fa6c5d625cfab981
SHA5128d33f470375956d924cfbc8f73681285e26033e12680e6c09a0c7d05d200b1b2f13d342e5c67b90ccdd6c8ceb66be8adb5689d561138cde196e233c7d540964c
-
Filesize
475KB
MD53b14ecac179d0cbeb356aef444faf39b
SHA1d84f8331b8694c05420fcb836b49efa3e9807040
SHA256326c88b88ddccd0bef993742f008ff50bb2c0e1ccd407866066f9a4bc5927fa9
SHA512e0e50dfb0f37630a97c81106a649ca7b9e1585f0b8e48ae291a95232d915f1b44906e3de950eaf9c96676d6bb4814338185e09ed4b631e9eefd9ba28dd0779a7
-
Filesize
475KB
MD53b14ecac179d0cbeb356aef444faf39b
SHA1d84f8331b8694c05420fcb836b49efa3e9807040
SHA256326c88b88ddccd0bef993742f008ff50bb2c0e1ccd407866066f9a4bc5927fa9
SHA512e0e50dfb0f37630a97c81106a649ca7b9e1585f0b8e48ae291a95232d915f1b44906e3de950eaf9c96676d6bb4814338185e09ed4b631e9eefd9ba28dd0779a7
-
Filesize
174KB
MD5cc426a66fa6d289a13562c57f465b268
SHA1bfaf32f508e3ee7e9c1f592717cb87ad81d5faeb
SHA2563c2b4747b454a52c4382b0df100470111993124d90149f5345cc3930be91572b
SHA512bf06825090637f7842ac78fea8e5916e6c1c741c1be6c9f77bac89cf146143c4c60041e84fa0275a3576c959ff9ff27debad56f5a9ecd8f7de42a2efeabc039f
-
Filesize
174KB
MD5cc426a66fa6d289a13562c57f465b268
SHA1bfaf32f508e3ee7e9c1f592717cb87ad81d5faeb
SHA2563c2b4747b454a52c4382b0df100470111993124d90149f5345cc3930be91572b
SHA512bf06825090637f7842ac78fea8e5916e6c1c741c1be6c9f77bac89cf146143c4c60041e84fa0275a3576c959ff9ff27debad56f5a9ecd8f7de42a2efeabc039f
-
Filesize
319KB
MD5a3c6ef58d55b5201e1b20f6aa3d8e6d0
SHA1e27d7d5ce96483cfdcab7b0001fea185eb1fd628
SHA25626cfc137dd6af2f966dc8b5d752c55b8b3961c003699fc7af4b90ceb4cd5b8ff
SHA51292dd728ab956e4feed96c3378e270b304aef5a665a3bec499119cf7e4a1955d9c2e8c11c1de757acb30a1a109e412f2dbdc6ca6871eb3a9591478c6093d293dd
-
Filesize
319KB
MD5a3c6ef58d55b5201e1b20f6aa3d8e6d0
SHA1e27d7d5ce96483cfdcab7b0001fea185eb1fd628
SHA25626cfc137dd6af2f966dc8b5d752c55b8b3961c003699fc7af4b90ceb4cd5b8ff
SHA51292dd728ab956e4feed96c3378e270b304aef5a665a3bec499119cf7e4a1955d9c2e8c11c1de757acb30a1a109e412f2dbdc6ca6871eb3a9591478c6093d293dd
-
Filesize
322KB
MD5db1a6809dc34322f34dd5b2a82193372
SHA1aaf3549c0664c5c71c212c448831009aaa422dbf
SHA256eb59ae99ce2156fe28aae9acf0dd04fcaf2d0e40a421a6f6990104656852bd02
SHA512f011996560632b08d58bd29f22b6dce0cedb07a82f1218434a85688144794a7089126c701bd4a2f3e23cdd6094f2746b76509051081bcb6e320d1a185f36b5ba
-
Filesize
322KB
MD5db1a6809dc34322f34dd5b2a82193372
SHA1aaf3549c0664c5c71c212c448831009aaa422dbf
SHA256eb59ae99ce2156fe28aae9acf0dd04fcaf2d0e40a421a6f6990104656852bd02
SHA512f011996560632b08d58bd29f22b6dce0cedb07a82f1218434a85688144794a7089126c701bd4a2f3e23cdd6094f2746b76509051081bcb6e320d1a185f36b5ba
-
Filesize
140KB
MD50928f8617e412b6f37404effd132acff
SHA18f254007deacf983acc8ed469b60de7bee9cd190
SHA256b6ed590a91be534029593d3633db83015412b2d7eed7a96a021ef045c356ecab
SHA5123fc8cc169ea19912ad00b1da3d310b9aa9cf3e425a2a80f4de133b72fd429b38ef36d4ea551f80192bbae9546c02bb593ba8d0be51270264bac1b6b2efc835d0
-
Filesize
140KB
MD50928f8617e412b6f37404effd132acff
SHA18f254007deacf983acc8ed469b60de7bee9cd190
SHA256b6ed590a91be534029593d3633db83015412b2d7eed7a96a021ef045c356ecab
SHA5123fc8cc169ea19912ad00b1da3d310b9aa9cf3e425a2a80f4de133b72fd429b38ef36d4ea551f80192bbae9546c02bb593ba8d0be51270264bac1b6b2efc835d0
-
Filesize
322KB
MD5db1a6809dc34322f34dd5b2a82193372
SHA1aaf3549c0664c5c71c212c448831009aaa422dbf
SHA256eb59ae99ce2156fe28aae9acf0dd04fcaf2d0e40a421a6f6990104656852bd02
SHA512f011996560632b08d58bd29f22b6dce0cedb07a82f1218434a85688144794a7089126c701bd4a2f3e23cdd6094f2746b76509051081bcb6e320d1a185f36b5ba
-
Filesize
322KB
MD5db1a6809dc34322f34dd5b2a82193372
SHA1aaf3549c0664c5c71c212c448831009aaa422dbf
SHA256eb59ae99ce2156fe28aae9acf0dd04fcaf2d0e40a421a6f6990104656852bd02
SHA512f011996560632b08d58bd29f22b6dce0cedb07a82f1218434a85688144794a7089126c701bd4a2f3e23cdd6094f2746b76509051081bcb6e320d1a185f36b5ba
-
Filesize
322KB
MD5db1a6809dc34322f34dd5b2a82193372
SHA1aaf3549c0664c5c71c212c448831009aaa422dbf
SHA256eb59ae99ce2156fe28aae9acf0dd04fcaf2d0e40a421a6f6990104656852bd02
SHA512f011996560632b08d58bd29f22b6dce0cedb07a82f1218434a85688144794a7089126c701bd4a2f3e23cdd6094f2746b76509051081bcb6e320d1a185f36b5ba
-
Filesize
322KB
MD5db1a6809dc34322f34dd5b2a82193372
SHA1aaf3549c0664c5c71c212c448831009aaa422dbf
SHA256eb59ae99ce2156fe28aae9acf0dd04fcaf2d0e40a421a6f6990104656852bd02
SHA512f011996560632b08d58bd29f22b6dce0cedb07a82f1218434a85688144794a7089126c701bd4a2f3e23cdd6094f2746b76509051081bcb6e320d1a185f36b5ba
-
Filesize
322KB
MD5db1a6809dc34322f34dd5b2a82193372
SHA1aaf3549c0664c5c71c212c448831009aaa422dbf
SHA256eb59ae99ce2156fe28aae9acf0dd04fcaf2d0e40a421a6f6990104656852bd02
SHA512f011996560632b08d58bd29f22b6dce0cedb07a82f1218434a85688144794a7089126c701bd4a2f3e23cdd6094f2746b76509051081bcb6e320d1a185f36b5ba
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b