Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
63b3f39469e57b8d03da55b9997b91565016cb6e467a149e3364587b6dd76ff0.exe
Resource
win10v2004-20230703-en
General
-
Target
63b3f39469e57b8d03da55b9997b91565016cb6e467a149e3364587b6dd76ff0.exe
-
Size
1.4MB
-
MD5
590fc514b5dc9e0c993485ca06d3be67
-
SHA1
69aeaa1b81bdacbd74053ab19063234057328bd4
-
SHA256
63b3f39469e57b8d03da55b9997b91565016cb6e467a149e3364587b6dd76ff0
-
SHA512
9778030d0bae37685116f381ff466bdba316ceb245694685e9bfa62acd82a6b63040c5deaa73ff5f0ac307b0866c11ea793d0064321bd87287f4b5a420366dfd
-
SSDEEP
24576:xyafYwzA4pQ7/qKWF/d3dJg7CCrRDNlSOJAwao5QDr9SjuA0aIJR:kPwjpQLqKWF/tdKfrRDNkwx5YBS6QI
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation l8086923.exe Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 9 IoCs
pid Process 3968 y5999078.exe 112 y9933736.exe 4820 y3803845.exe 2572 l8086923.exe 640 saves.exe 4248 m9901681.exe 2416 n4189208.exe 2564 saves.exe 2268 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3800 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63b3f39469e57b8d03da55b9997b91565016cb6e467a149e3364587b6dd76ff0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5999078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9933736.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y3803845.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1912 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3376 wrote to memory of 3968 3376 63b3f39469e57b8d03da55b9997b91565016cb6e467a149e3364587b6dd76ff0.exe 82 PID 3376 wrote to memory of 3968 3376 63b3f39469e57b8d03da55b9997b91565016cb6e467a149e3364587b6dd76ff0.exe 82 PID 3376 wrote to memory of 3968 3376 63b3f39469e57b8d03da55b9997b91565016cb6e467a149e3364587b6dd76ff0.exe 82 PID 3968 wrote to memory of 112 3968 y5999078.exe 83 PID 3968 wrote to memory of 112 3968 y5999078.exe 83 PID 3968 wrote to memory of 112 3968 y5999078.exe 83 PID 112 wrote to memory of 4820 112 y9933736.exe 84 PID 112 wrote to memory of 4820 112 y9933736.exe 84 PID 112 wrote to memory of 4820 112 y9933736.exe 84 PID 4820 wrote to memory of 2572 4820 y3803845.exe 85 PID 4820 wrote to memory of 2572 4820 y3803845.exe 85 PID 4820 wrote to memory of 2572 4820 y3803845.exe 85 PID 2572 wrote to memory of 640 2572 l8086923.exe 86 PID 2572 wrote to memory of 640 2572 l8086923.exe 86 PID 2572 wrote to memory of 640 2572 l8086923.exe 86 PID 4820 wrote to memory of 4248 4820 y3803845.exe 87 PID 4820 wrote to memory of 4248 4820 y3803845.exe 87 PID 4820 wrote to memory of 4248 4820 y3803845.exe 87 PID 640 wrote to memory of 1912 640 saves.exe 88 PID 640 wrote to memory of 1912 640 saves.exe 88 PID 640 wrote to memory of 1912 640 saves.exe 88 PID 640 wrote to memory of 4180 640 saves.exe 90 PID 640 wrote to memory of 4180 640 saves.exe 90 PID 640 wrote to memory of 4180 640 saves.exe 90 PID 4180 wrote to memory of 2940 4180 cmd.exe 92 PID 4180 wrote to memory of 2940 4180 cmd.exe 92 PID 4180 wrote to memory of 2940 4180 cmd.exe 92 PID 112 wrote to memory of 2416 112 y9933736.exe 93 PID 112 wrote to memory of 2416 112 y9933736.exe 93 PID 112 wrote to memory of 2416 112 y9933736.exe 93 PID 4180 wrote to memory of 4944 4180 cmd.exe 94 PID 4180 wrote to memory of 4944 4180 cmd.exe 94 PID 4180 wrote to memory of 4944 4180 cmd.exe 94 PID 4180 wrote to memory of 2544 4180 cmd.exe 95 PID 4180 wrote to memory of 2544 4180 cmd.exe 95 PID 4180 wrote to memory of 2544 4180 cmd.exe 95 PID 4180 wrote to memory of 644 4180 cmd.exe 96 PID 4180 wrote to memory of 644 4180 cmd.exe 96 PID 4180 wrote to memory of 644 4180 cmd.exe 96 PID 4180 wrote to memory of 2908 4180 cmd.exe 97 PID 4180 wrote to memory of 2908 4180 cmd.exe 97 PID 4180 wrote to memory of 2908 4180 cmd.exe 97 PID 4180 wrote to memory of 568 4180 cmd.exe 98 PID 4180 wrote to memory of 568 4180 cmd.exe 98 PID 4180 wrote to memory of 568 4180 cmd.exe 98 PID 640 wrote to memory of 3800 640 saves.exe 108 PID 640 wrote to memory of 3800 640 saves.exe 108 PID 640 wrote to memory of 3800 640 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\63b3f39469e57b8d03da55b9997b91565016cb6e467a149e3364587b6dd76ff0.exe"C:\Users\Admin\AppData\Local\Temp\63b3f39469e57b8d03da55b9997b91565016cb6e467a149e3364587b6dd76ff0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5999078.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5999078.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9933736.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9933736.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3803845.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3803845.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l8086923.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l8086923.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2940
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4944
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:2908
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:568
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9901681.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m9901681.exe5⤵
- Executes dropped EXE
PID:4248
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4189208.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n4189208.exe4⤵
- Executes dropped EXE
PID:2416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2564
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5cbfeef988059401b403335074746877f
SHA125a115319af1c2988d80c3dacb1b1f1e8f914552
SHA256bf163d80392aa4f648ea20371261c61bf9cee3b2433ccb5f167ce60e42644bb9
SHA5122311c1e2121557bba13fc2f1651ecc23c1d127f7cba04ab3f6ddd2496f137f474080557a4c641755d41acc9650595f1865ca682415cf1289ff201e7d76402b88
-
Filesize
1.3MB
MD5cbfeef988059401b403335074746877f
SHA125a115319af1c2988d80c3dacb1b1f1e8f914552
SHA256bf163d80392aa4f648ea20371261c61bf9cee3b2433ccb5f167ce60e42644bb9
SHA5122311c1e2121557bba13fc2f1651ecc23c1d127f7cba04ab3f6ddd2496f137f474080557a4c641755d41acc9650595f1865ca682415cf1289ff201e7d76402b88
-
Filesize
475KB
MD5018e244421556a151c96e9cbcf8ca1b8
SHA1f1e10698c66ba4d95d47c478a569e7cd4b8574cf
SHA25693b7986f131c39ca0ea0f80b177c937de2d3e783bf8e1b67e0a865b207f5cb1c
SHA512bd561ff8b6db0c5000fc233ba84d60d6caed186095b1ff0b5525ec20d80060c2b66e6d4b03e08bf41c2a88d76eb6315047d7f63694919e1373eb43a257504b7c
-
Filesize
475KB
MD5018e244421556a151c96e9cbcf8ca1b8
SHA1f1e10698c66ba4d95d47c478a569e7cd4b8574cf
SHA25693b7986f131c39ca0ea0f80b177c937de2d3e783bf8e1b67e0a865b207f5cb1c
SHA512bd561ff8b6db0c5000fc233ba84d60d6caed186095b1ff0b5525ec20d80060c2b66e6d4b03e08bf41c2a88d76eb6315047d7f63694919e1373eb43a257504b7c
-
Filesize
176KB
MD5e71823ff85245e700733fcf197bf397b
SHA188fdf9131b1f5d0ba2217438a2d3cfab5d56e6b7
SHA256bad740626c35998767927d09d8f857044317d091ab0f236730e46dae95e945fb
SHA512667b4304808629af75da1aca57b0a8365c9a56b1a4cbb939849e363386bb373babf62dd72f7c924128d08119746829bde53fa359b5c69a847cd13534984d9df4
-
Filesize
176KB
MD5e71823ff85245e700733fcf197bf397b
SHA188fdf9131b1f5d0ba2217438a2d3cfab5d56e6b7
SHA256bad740626c35998767927d09d8f857044317d091ab0f236730e46dae95e945fb
SHA512667b4304808629af75da1aca57b0a8365c9a56b1a4cbb939849e363386bb373babf62dd72f7c924128d08119746829bde53fa359b5c69a847cd13534984d9df4
-
Filesize
319KB
MD5ea051abd705043d377bc7117d2192880
SHA106cb24085792e0455eec00ad3753437e3f2a57eb
SHA25659e39a7ecb05ab170f582b85aa8172de0f26e2f403007b11e35e87be65176ca5
SHA512bb4eb0b37d24ca727372b594992a681da21ebb4e5b3b40573511537357073e7cb5c2a5a54250ced23f9d32bfec3c0a1bee79d003caa3258701b457e02866592e
-
Filesize
319KB
MD5ea051abd705043d377bc7117d2192880
SHA106cb24085792e0455eec00ad3753437e3f2a57eb
SHA25659e39a7ecb05ab170f582b85aa8172de0f26e2f403007b11e35e87be65176ca5
SHA512bb4eb0b37d24ca727372b594992a681da21ebb4e5b3b40573511537357073e7cb5c2a5a54250ced23f9d32bfec3c0a1bee79d003caa3258701b457e02866592e
-
Filesize
328KB
MD5a8b18bb203fb15a7e4e341a691f765dc
SHA11ecfe555709bc3e42936f3d6a6ed732830b43679
SHA256c05d0b542d458579dab5bcd98a8befc70028e1cb4a2d692fe59cc0af3848ac53
SHA512d22304dcb919b3b313248ed6e3dae66761a68d94fd19b56f35bd8451e5f4d2d6a4849326884f06bc5bcbb820df5329d3ff9b4aa39fbcd3cb971b43506da7d529
-
Filesize
328KB
MD5a8b18bb203fb15a7e4e341a691f765dc
SHA11ecfe555709bc3e42936f3d6a6ed732830b43679
SHA256c05d0b542d458579dab5bcd98a8befc70028e1cb4a2d692fe59cc0af3848ac53
SHA512d22304dcb919b3b313248ed6e3dae66761a68d94fd19b56f35bd8451e5f4d2d6a4849326884f06bc5bcbb820df5329d3ff9b4aa39fbcd3cb971b43506da7d529
-
Filesize
140KB
MD5f9c91b1b2b182a04b68e62d4f1f475d4
SHA1f84d5d1d3ab27e89edef64af9245b144673794cb
SHA2568717423181267688b8f6693c4cee861afe08ac0155a597b79f85d1530c910e8d
SHA5123635ed7a822ad585ed3252729abe834f1818ee55fe6d4206d94db31a0ce5bcd3fb096eac384cb337028d53ecff40f98cdccdddbae7cc6878077ce95b5d8a92aa
-
Filesize
140KB
MD5f9c91b1b2b182a04b68e62d4f1f475d4
SHA1f84d5d1d3ab27e89edef64af9245b144673794cb
SHA2568717423181267688b8f6693c4cee861afe08ac0155a597b79f85d1530c910e8d
SHA5123635ed7a822ad585ed3252729abe834f1818ee55fe6d4206d94db31a0ce5bcd3fb096eac384cb337028d53ecff40f98cdccdddbae7cc6878077ce95b5d8a92aa
-
Filesize
328KB
MD5a8b18bb203fb15a7e4e341a691f765dc
SHA11ecfe555709bc3e42936f3d6a6ed732830b43679
SHA256c05d0b542d458579dab5bcd98a8befc70028e1cb4a2d692fe59cc0af3848ac53
SHA512d22304dcb919b3b313248ed6e3dae66761a68d94fd19b56f35bd8451e5f4d2d6a4849326884f06bc5bcbb820df5329d3ff9b4aa39fbcd3cb971b43506da7d529
-
Filesize
328KB
MD5a8b18bb203fb15a7e4e341a691f765dc
SHA11ecfe555709bc3e42936f3d6a6ed732830b43679
SHA256c05d0b542d458579dab5bcd98a8befc70028e1cb4a2d692fe59cc0af3848ac53
SHA512d22304dcb919b3b313248ed6e3dae66761a68d94fd19b56f35bd8451e5f4d2d6a4849326884f06bc5bcbb820df5329d3ff9b4aa39fbcd3cb971b43506da7d529
-
Filesize
328KB
MD5a8b18bb203fb15a7e4e341a691f765dc
SHA11ecfe555709bc3e42936f3d6a6ed732830b43679
SHA256c05d0b542d458579dab5bcd98a8befc70028e1cb4a2d692fe59cc0af3848ac53
SHA512d22304dcb919b3b313248ed6e3dae66761a68d94fd19b56f35bd8451e5f4d2d6a4849326884f06bc5bcbb820df5329d3ff9b4aa39fbcd3cb971b43506da7d529
-
Filesize
328KB
MD5a8b18bb203fb15a7e4e341a691f765dc
SHA11ecfe555709bc3e42936f3d6a6ed732830b43679
SHA256c05d0b542d458579dab5bcd98a8befc70028e1cb4a2d692fe59cc0af3848ac53
SHA512d22304dcb919b3b313248ed6e3dae66761a68d94fd19b56f35bd8451e5f4d2d6a4849326884f06bc5bcbb820df5329d3ff9b4aa39fbcd3cb971b43506da7d529
-
Filesize
328KB
MD5a8b18bb203fb15a7e4e341a691f765dc
SHA11ecfe555709bc3e42936f3d6a6ed732830b43679
SHA256c05d0b542d458579dab5bcd98a8befc70028e1cb4a2d692fe59cc0af3848ac53
SHA512d22304dcb919b3b313248ed6e3dae66761a68d94fd19b56f35bd8451e5f4d2d6a4849326884f06bc5bcbb820df5329d3ff9b4aa39fbcd3cb971b43506da7d529
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7