Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
31/08/2023, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
695124598544f99154609f1f7abdb6a2fe5235f933d14a5142352bae56a2fc86.exe
Resource
win10-20230831-en
General
-
Target
695124598544f99154609f1f7abdb6a2fe5235f933d14a5142352bae56a2fc86.exe
-
Size
1.4MB
-
MD5
6bac56a23b8de3a3a10993ea8a486b7f
-
SHA1
fb5b7c2c0d58a4c7a7931a16f57346900adaaeaa
-
SHA256
695124598544f99154609f1f7abdb6a2fe5235f933d14a5142352bae56a2fc86
-
SHA512
840792110f59ae06a83d0df9471ddb6c5e1467f1f54798ffc2553cc4cb66bf46c31b06eaca4820025cdbc1cb560026a8e1aa86b22646ba557fcd930cf2f8fdf8
-
SSDEEP
24576:cyM7SY0NItXKUE05KhLEs9Qy+qYtcGtGE6Yzw9Voy5WPa3su:LBNIpB5KhLEsmEks9VoAG
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 4224 y4448439.exe 2080 y4044588.exe 3080 y3555168.exe 3996 l3682072.exe 2500 saves.exe 4512 m6197357.exe 3164 n6705874.exe 4580 saves.exe 1360 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3928 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 695124598544f99154609f1f7abdb6a2fe5235f933d14a5142352bae56a2fc86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4448439.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4044588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y3555168.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4220 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3016 wrote to memory of 4224 3016 695124598544f99154609f1f7abdb6a2fe5235f933d14a5142352bae56a2fc86.exe 70 PID 3016 wrote to memory of 4224 3016 695124598544f99154609f1f7abdb6a2fe5235f933d14a5142352bae56a2fc86.exe 70 PID 3016 wrote to memory of 4224 3016 695124598544f99154609f1f7abdb6a2fe5235f933d14a5142352bae56a2fc86.exe 70 PID 4224 wrote to memory of 2080 4224 y4448439.exe 71 PID 4224 wrote to memory of 2080 4224 y4448439.exe 71 PID 4224 wrote to memory of 2080 4224 y4448439.exe 71 PID 2080 wrote to memory of 3080 2080 y4044588.exe 72 PID 2080 wrote to memory of 3080 2080 y4044588.exe 72 PID 2080 wrote to memory of 3080 2080 y4044588.exe 72 PID 3080 wrote to memory of 3996 3080 y3555168.exe 73 PID 3080 wrote to memory of 3996 3080 y3555168.exe 73 PID 3080 wrote to memory of 3996 3080 y3555168.exe 73 PID 3996 wrote to memory of 2500 3996 l3682072.exe 74 PID 3996 wrote to memory of 2500 3996 l3682072.exe 74 PID 3996 wrote to memory of 2500 3996 l3682072.exe 74 PID 3080 wrote to memory of 4512 3080 y3555168.exe 75 PID 3080 wrote to memory of 4512 3080 y3555168.exe 75 PID 3080 wrote to memory of 4512 3080 y3555168.exe 75 PID 2500 wrote to memory of 4220 2500 saves.exe 76 PID 2500 wrote to memory of 4220 2500 saves.exe 76 PID 2500 wrote to memory of 4220 2500 saves.exe 76 PID 2500 wrote to memory of 1348 2500 saves.exe 78 PID 2500 wrote to memory of 1348 2500 saves.exe 78 PID 2500 wrote to memory of 1348 2500 saves.exe 78 PID 1348 wrote to memory of 3584 1348 cmd.exe 80 PID 1348 wrote to memory of 3584 1348 cmd.exe 80 PID 1348 wrote to memory of 3584 1348 cmd.exe 80 PID 1348 wrote to memory of 4352 1348 cmd.exe 81 PID 1348 wrote to memory of 4352 1348 cmd.exe 81 PID 1348 wrote to memory of 4352 1348 cmd.exe 81 PID 1348 wrote to memory of 2308 1348 cmd.exe 82 PID 1348 wrote to memory of 2308 1348 cmd.exe 82 PID 1348 wrote to memory of 2308 1348 cmd.exe 82 PID 1348 wrote to memory of 3480 1348 cmd.exe 83 PID 1348 wrote to memory of 3480 1348 cmd.exe 83 PID 1348 wrote to memory of 3480 1348 cmd.exe 83 PID 1348 wrote to memory of 1760 1348 cmd.exe 84 PID 1348 wrote to memory of 1760 1348 cmd.exe 84 PID 1348 wrote to memory of 1760 1348 cmd.exe 84 PID 2080 wrote to memory of 3164 2080 y4044588.exe 85 PID 2080 wrote to memory of 3164 2080 y4044588.exe 85 PID 2080 wrote to memory of 3164 2080 y4044588.exe 85 PID 1348 wrote to memory of 1288 1348 cmd.exe 86 PID 1348 wrote to memory of 1288 1348 cmd.exe 86 PID 1348 wrote to memory of 1288 1348 cmd.exe 86 PID 2500 wrote to memory of 3928 2500 saves.exe 87 PID 2500 wrote to memory of 3928 2500 saves.exe 87 PID 2500 wrote to memory of 3928 2500 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\695124598544f99154609f1f7abdb6a2fe5235f933d14a5142352bae56a2fc86.exe"C:\Users\Admin\AppData\Local\Temp\695124598544f99154609f1f7abdb6a2fe5235f933d14a5142352bae56a2fc86.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4448439.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4448439.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4044588.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4044588.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3555168.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3555168.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3682072.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l3682072.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3584
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2308
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3480
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1288
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6197357.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m6197357.exe5⤵
- Executes dropped EXE
PID:4512
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6705874.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6705874.exe4⤵
- Executes dropped EXE
PID:3164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4580
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD54587147f373a08595f7a2e62495ea4c0
SHA1ca77f9fa4af83704eb95e55f6d7f219ac0bf205f
SHA256f378ec28461a436967572ea66dbf7d34de2f4badc49a17590f4293ac108a7d6d
SHA512adf19ddd4db16e65cdae58b53f0d94b0353506939bf2c118cac75945e76f097aa8f6d81cedb3b4214c93eedcb322aaeef784bb3c506f40a00d1f031a80ce9f7d
-
Filesize
1.3MB
MD54587147f373a08595f7a2e62495ea4c0
SHA1ca77f9fa4af83704eb95e55f6d7f219ac0bf205f
SHA256f378ec28461a436967572ea66dbf7d34de2f4badc49a17590f4293ac108a7d6d
SHA512adf19ddd4db16e65cdae58b53f0d94b0353506939bf2c118cac75945e76f097aa8f6d81cedb3b4214c93eedcb322aaeef784bb3c506f40a00d1f031a80ce9f7d
-
Filesize
475KB
MD51ff1a67027d7f5ebb69267b454e9e78d
SHA1033f78569f9e184ccf8d28570b1ea91501adb2aa
SHA256b40b253ec83b97762350a1acd29a998ca1a6181bd5488c01686b5272e74d64f5
SHA5128e7c1cb2955cd4da1395c05cfde7494756ace41314aa7ca4ad41bca20a18fad76bc4c30b28d4f54e7189145df323a824cb2e236d9dd8f4809bacf806b491a797
-
Filesize
475KB
MD51ff1a67027d7f5ebb69267b454e9e78d
SHA1033f78569f9e184ccf8d28570b1ea91501adb2aa
SHA256b40b253ec83b97762350a1acd29a998ca1a6181bd5488c01686b5272e74d64f5
SHA5128e7c1cb2955cd4da1395c05cfde7494756ace41314aa7ca4ad41bca20a18fad76bc4c30b28d4f54e7189145df323a824cb2e236d9dd8f4809bacf806b491a797
-
Filesize
174KB
MD54fa1b9b58690c91176c4c1be96f0f31c
SHA1313e88a888f91954bb09450374bc138865abd71e
SHA256020066e13ebec3f3e18b01d6afc52a76a258bb259a745b482cfd64ffb08e9e1b
SHA512c4bee2690927ea8f29feaaea7acdb1eacef4f1b98ae4410aa738216aa87c0274f077983293b697a8ab3848e6fad3383d99f340c19e324f0f36d00dc2f1eceb32
-
Filesize
174KB
MD54fa1b9b58690c91176c4c1be96f0f31c
SHA1313e88a888f91954bb09450374bc138865abd71e
SHA256020066e13ebec3f3e18b01d6afc52a76a258bb259a745b482cfd64ffb08e9e1b
SHA512c4bee2690927ea8f29feaaea7acdb1eacef4f1b98ae4410aa738216aa87c0274f077983293b697a8ab3848e6fad3383d99f340c19e324f0f36d00dc2f1eceb32
-
Filesize
319KB
MD51f487f7770e0950786e07fe39a1e5257
SHA1629bf39c0d1b37104415d3aaa3533546382790ce
SHA2564e8e7fccdb132ba3c75f9f5c4fdb62276f77992e2f1d0d97e7a3e86edae3645b
SHA512c6d83b46a5bd1481f7b0d4188375e2d2c1d545e228fb28fa37ee96f9305ed5c01a019f2a711f3d3998c02f69a4f72518687750ca759565861785f29863d145cb
-
Filesize
319KB
MD51f487f7770e0950786e07fe39a1e5257
SHA1629bf39c0d1b37104415d3aaa3533546382790ce
SHA2564e8e7fccdb132ba3c75f9f5c4fdb62276f77992e2f1d0d97e7a3e86edae3645b
SHA512c6d83b46a5bd1481f7b0d4188375e2d2c1d545e228fb28fa37ee96f9305ed5c01a019f2a711f3d3998c02f69a4f72518687750ca759565861785f29863d145cb
-
Filesize
329KB
MD5d8551e78c40d71236a69baceaf5f6959
SHA18837f6462599f99dc3010accc1737c9d48d65845
SHA256ff0814726c2e8b392fed115423d35ca246a9d9b49dcc48b2fed29c340cdce5b6
SHA512ce7c8464707e5fd84db7e0f8f8d8d11674f72978107f04d9ed29b0888b838b7591feceda6ba9be938e6539230f6687b0daa01abc9d7a6c53d9766bcdc352c3b2
-
Filesize
329KB
MD5d8551e78c40d71236a69baceaf5f6959
SHA18837f6462599f99dc3010accc1737c9d48d65845
SHA256ff0814726c2e8b392fed115423d35ca246a9d9b49dcc48b2fed29c340cdce5b6
SHA512ce7c8464707e5fd84db7e0f8f8d8d11674f72978107f04d9ed29b0888b838b7591feceda6ba9be938e6539230f6687b0daa01abc9d7a6c53d9766bcdc352c3b2
-
Filesize
140KB
MD50f34b85c9a6a650554adc75a3f97a9a1
SHA104ff90acd463327dcd020dd6702149ec78ce9f96
SHA256bb55fc5171cf23193e3c879d77c7a034656bf5d94a649b898e54ad934125f2ef
SHA512c14bd952379e424407798f7a0a25900f8755b16b3981565bffe100b4fee7cb933b43e455097564bb99bcf27e42164fb916722a971fcebeabc8957b3fd29091d5
-
Filesize
140KB
MD50f34b85c9a6a650554adc75a3f97a9a1
SHA104ff90acd463327dcd020dd6702149ec78ce9f96
SHA256bb55fc5171cf23193e3c879d77c7a034656bf5d94a649b898e54ad934125f2ef
SHA512c14bd952379e424407798f7a0a25900f8755b16b3981565bffe100b4fee7cb933b43e455097564bb99bcf27e42164fb916722a971fcebeabc8957b3fd29091d5
-
Filesize
329KB
MD5d8551e78c40d71236a69baceaf5f6959
SHA18837f6462599f99dc3010accc1737c9d48d65845
SHA256ff0814726c2e8b392fed115423d35ca246a9d9b49dcc48b2fed29c340cdce5b6
SHA512ce7c8464707e5fd84db7e0f8f8d8d11674f72978107f04d9ed29b0888b838b7591feceda6ba9be938e6539230f6687b0daa01abc9d7a6c53d9766bcdc352c3b2
-
Filesize
329KB
MD5d8551e78c40d71236a69baceaf5f6959
SHA18837f6462599f99dc3010accc1737c9d48d65845
SHA256ff0814726c2e8b392fed115423d35ca246a9d9b49dcc48b2fed29c340cdce5b6
SHA512ce7c8464707e5fd84db7e0f8f8d8d11674f72978107f04d9ed29b0888b838b7591feceda6ba9be938e6539230f6687b0daa01abc9d7a6c53d9766bcdc352c3b2
-
Filesize
329KB
MD5d8551e78c40d71236a69baceaf5f6959
SHA18837f6462599f99dc3010accc1737c9d48d65845
SHA256ff0814726c2e8b392fed115423d35ca246a9d9b49dcc48b2fed29c340cdce5b6
SHA512ce7c8464707e5fd84db7e0f8f8d8d11674f72978107f04d9ed29b0888b838b7591feceda6ba9be938e6539230f6687b0daa01abc9d7a6c53d9766bcdc352c3b2
-
Filesize
329KB
MD5d8551e78c40d71236a69baceaf5f6959
SHA18837f6462599f99dc3010accc1737c9d48d65845
SHA256ff0814726c2e8b392fed115423d35ca246a9d9b49dcc48b2fed29c340cdce5b6
SHA512ce7c8464707e5fd84db7e0f8f8d8d11674f72978107f04d9ed29b0888b838b7591feceda6ba9be938e6539230f6687b0daa01abc9d7a6c53d9766bcdc352c3b2
-
Filesize
329KB
MD5d8551e78c40d71236a69baceaf5f6959
SHA18837f6462599f99dc3010accc1737c9d48d65845
SHA256ff0814726c2e8b392fed115423d35ca246a9d9b49dcc48b2fed29c340cdce5b6
SHA512ce7c8464707e5fd84db7e0f8f8d8d11674f72978107f04d9ed29b0888b838b7591feceda6ba9be938e6539230f6687b0daa01abc9d7a6c53d9766bcdc352c3b2
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b