Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
31/08/2023, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
da523634fd307cf829de28b81234033a414c97079f7631aa454cfefc0906d9e4.exe
Resource
win10-20230703-en
General
-
Target
da523634fd307cf829de28b81234033a414c97079f7631aa454cfefc0906d9e4.exe
-
Size
1.4MB
-
MD5
b91d0c67fa7ba8a1532ff88f6dc2d82a
-
SHA1
33785ad5b044fd9a489bed46a02067d25895c22c
-
SHA256
da523634fd307cf829de28b81234033a414c97079f7631aa454cfefc0906d9e4
-
SHA512
dae68f5aa522bd2e038a496a083c353e3a41d6d061e0254f168861a19d91891aad08fbb65b6240d97b9bc7154f7f6f9b7bfc6c8355c2ed0e194adb173ba45d2f
-
SSDEEP
24576:WysIMah48jcHszKd9MuTxQTYpM80aFiAb9UR4RfQxl6qMFWAKR3zY6P:lJh4pcKd9MMxPOav9RQWENR3/
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 4116 y0565669.exe 4032 y6571857.exe 1112 y6199011.exe 2052 l5455002.exe 2044 saves.exe 3056 m8784073.exe 2360 n0826566.exe 2024 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4160 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" da523634fd307cf829de28b81234033a414c97079f7631aa454cfefc0906d9e4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0565669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6571857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y6199011.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1308 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 944 wrote to memory of 4116 944 da523634fd307cf829de28b81234033a414c97079f7631aa454cfefc0906d9e4.exe 70 PID 944 wrote to memory of 4116 944 da523634fd307cf829de28b81234033a414c97079f7631aa454cfefc0906d9e4.exe 70 PID 944 wrote to memory of 4116 944 da523634fd307cf829de28b81234033a414c97079f7631aa454cfefc0906d9e4.exe 70 PID 4116 wrote to memory of 4032 4116 y0565669.exe 71 PID 4116 wrote to memory of 4032 4116 y0565669.exe 71 PID 4116 wrote to memory of 4032 4116 y0565669.exe 71 PID 4032 wrote to memory of 1112 4032 y6571857.exe 72 PID 4032 wrote to memory of 1112 4032 y6571857.exe 72 PID 4032 wrote to memory of 1112 4032 y6571857.exe 72 PID 1112 wrote to memory of 2052 1112 y6199011.exe 73 PID 1112 wrote to memory of 2052 1112 y6199011.exe 73 PID 1112 wrote to memory of 2052 1112 y6199011.exe 73 PID 2052 wrote to memory of 2044 2052 l5455002.exe 74 PID 2052 wrote to memory of 2044 2052 l5455002.exe 74 PID 2052 wrote to memory of 2044 2052 l5455002.exe 74 PID 1112 wrote to memory of 3056 1112 y6199011.exe 75 PID 1112 wrote to memory of 3056 1112 y6199011.exe 75 PID 1112 wrote to memory of 3056 1112 y6199011.exe 75 PID 2044 wrote to memory of 1308 2044 saves.exe 76 PID 2044 wrote to memory of 1308 2044 saves.exe 76 PID 2044 wrote to memory of 1308 2044 saves.exe 76 PID 2044 wrote to memory of 3760 2044 saves.exe 78 PID 2044 wrote to memory of 3760 2044 saves.exe 78 PID 2044 wrote to memory of 3760 2044 saves.exe 78 PID 3760 wrote to memory of 2256 3760 cmd.exe 80 PID 3760 wrote to memory of 2256 3760 cmd.exe 80 PID 3760 wrote to memory of 2256 3760 cmd.exe 80 PID 4032 wrote to memory of 2360 4032 y6571857.exe 81 PID 4032 wrote to memory of 2360 4032 y6571857.exe 81 PID 4032 wrote to memory of 2360 4032 y6571857.exe 81 PID 3760 wrote to memory of 1444 3760 cmd.exe 82 PID 3760 wrote to memory of 1444 3760 cmd.exe 82 PID 3760 wrote to memory of 1444 3760 cmd.exe 82 PID 3760 wrote to memory of 4408 3760 cmd.exe 83 PID 3760 wrote to memory of 4408 3760 cmd.exe 83 PID 3760 wrote to memory of 4408 3760 cmd.exe 83 PID 3760 wrote to memory of 3460 3760 cmd.exe 84 PID 3760 wrote to memory of 3460 3760 cmd.exe 84 PID 3760 wrote to memory of 3460 3760 cmd.exe 84 PID 3760 wrote to memory of 524 3760 cmd.exe 85 PID 3760 wrote to memory of 524 3760 cmd.exe 85 PID 3760 wrote to memory of 524 3760 cmd.exe 85 PID 3760 wrote to memory of 676 3760 cmd.exe 86 PID 3760 wrote to memory of 676 3760 cmd.exe 86 PID 3760 wrote to memory of 676 3760 cmd.exe 86 PID 2044 wrote to memory of 4160 2044 saves.exe 88 PID 2044 wrote to memory of 4160 2044 saves.exe 88 PID 2044 wrote to memory of 4160 2044 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\da523634fd307cf829de28b81234033a414c97079f7631aa454cfefc0906d9e4.exe"C:\Users\Admin\AppData\Local\Temp\da523634fd307cf829de28b81234033a414c97079f7631aa454cfefc0906d9e4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0565669.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0565669.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6571857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6571857.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6199011.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y6199011.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5455002.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l5455002.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1308
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:1444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:676
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m8784073.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m8784073.exe5⤵
- Executes dropped EXE
PID:3056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0826566.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n0826566.exe4⤵
- Executes dropped EXE
PID:2360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD513ab95f8e6a4321e3d20bde2f712044e
SHA1bb1c65b98ad3f51d50e28c6bbe9ff9f27c837583
SHA2562faa1e4f4bc3d0ffb571eae10d054c218a89c7c0cf52a1fdb3d8ed1609ccfdd6
SHA512df95c931db280e85c7bd7036c2d441cc13f74d6e554042ac76e87238a1974f76ec39afb632724848466846329f6c4dccc137b19f5a0c0fdc64b87c224a416b82
-
Filesize
1.3MB
MD513ab95f8e6a4321e3d20bde2f712044e
SHA1bb1c65b98ad3f51d50e28c6bbe9ff9f27c837583
SHA2562faa1e4f4bc3d0ffb571eae10d054c218a89c7c0cf52a1fdb3d8ed1609ccfdd6
SHA512df95c931db280e85c7bd7036c2d441cc13f74d6e554042ac76e87238a1974f76ec39afb632724848466846329f6c4dccc137b19f5a0c0fdc64b87c224a416b82
-
Filesize
475KB
MD55418b9cc72aaf88c1d5fcb84c2a7c88e
SHA133d227564586450195b38062ff0d7df1ae83306d
SHA2561b28ba5e4e4a929e12a4673c1aba62f12e4fc6fabc866fae5a8d5bfbaf74e731
SHA51213be7cbd36c364416b7ba6d7829cecb409a56fcbe96c0d44cc9be0ca8063e9f7514b40795cdec1d3df7bcb1a2d975eeaef978a36c39276c2e2d47b495453c7f7
-
Filesize
475KB
MD55418b9cc72aaf88c1d5fcb84c2a7c88e
SHA133d227564586450195b38062ff0d7df1ae83306d
SHA2561b28ba5e4e4a929e12a4673c1aba62f12e4fc6fabc866fae5a8d5bfbaf74e731
SHA51213be7cbd36c364416b7ba6d7829cecb409a56fcbe96c0d44cc9be0ca8063e9f7514b40795cdec1d3df7bcb1a2d975eeaef978a36c39276c2e2d47b495453c7f7
-
Filesize
174KB
MD545d9091fb5a9a1c37eec340b04023d4f
SHA12afcc298ed345f19e41b277864d45e8c2fa06e35
SHA256361e0ebf31f44da4431559b9b79856d9096f845bc8591ecc424447da47005f58
SHA5124ed4cfe8369cefbd1f756991ab936d2bea024b9385f21d49974a7693c732e59784d6e25f97b0e6d477a70bfdc6787536c5f66f41cdd5604d0855dbfa8c517a91
-
Filesize
174KB
MD545d9091fb5a9a1c37eec340b04023d4f
SHA12afcc298ed345f19e41b277864d45e8c2fa06e35
SHA256361e0ebf31f44da4431559b9b79856d9096f845bc8591ecc424447da47005f58
SHA5124ed4cfe8369cefbd1f756991ab936d2bea024b9385f21d49974a7693c732e59784d6e25f97b0e6d477a70bfdc6787536c5f66f41cdd5604d0855dbfa8c517a91
-
Filesize
319KB
MD5373a2e16f9613ddd51a36cbf9b47a93b
SHA1fa4cfe5abe0217ec286e93e644b0572acd3e889c
SHA256edef88454c4f75b8dfc677014a6152ccb3ad9af62b53e7f3ede81705f4562ca4
SHA512a290129b9a8f66e616b67714bc0ad8fc91084c50aaaeda838fdff788f1d80fb5598d931dabc9cbbac3fb74360498efbd61b4647ca0393f31d3c32a7f535e84bc
-
Filesize
319KB
MD5373a2e16f9613ddd51a36cbf9b47a93b
SHA1fa4cfe5abe0217ec286e93e644b0572acd3e889c
SHA256edef88454c4f75b8dfc677014a6152ccb3ad9af62b53e7f3ede81705f4562ca4
SHA512a290129b9a8f66e616b67714bc0ad8fc91084c50aaaeda838fdff788f1d80fb5598d931dabc9cbbac3fb74360498efbd61b4647ca0393f31d3c32a7f535e84bc
-
Filesize
329KB
MD5f8b7426852eaeed44389177608ba4192
SHA199b1c0ab9ee841eaebe6c2cbf39a6886c39cf044
SHA2568d69024ed8176b7f5a845e74b1b2ab20ea48221bf8c29f0e2832f1a7a697bf31
SHA5122342990bff16b8e14af4f419ed0227d6caf0d2ba84b3b4665a070edbdf7540289f9139b30bf480e8257fbd28c8b8adc58f01b75bc02aa65fd1507a0d5381572b
-
Filesize
329KB
MD5f8b7426852eaeed44389177608ba4192
SHA199b1c0ab9ee841eaebe6c2cbf39a6886c39cf044
SHA2568d69024ed8176b7f5a845e74b1b2ab20ea48221bf8c29f0e2832f1a7a697bf31
SHA5122342990bff16b8e14af4f419ed0227d6caf0d2ba84b3b4665a070edbdf7540289f9139b30bf480e8257fbd28c8b8adc58f01b75bc02aa65fd1507a0d5381572b
-
Filesize
140KB
MD581581e0889dd47d42b74076aff740396
SHA1537cf8bf27ff7bea049debdcfde4fc98ba6c6f90
SHA25625630ef836a221d0fa0f9195a155bf95212adb65173fbf08be1c4e180d7e8fef
SHA512ef45f7d29b2e0c5d83752f7907540f3d6d3d5a59d181cd3a718f2632ec766f48857739ea62665eb3e24c109dd7d7a04335a2f3501cec67776468ef48c454b384
-
Filesize
140KB
MD581581e0889dd47d42b74076aff740396
SHA1537cf8bf27ff7bea049debdcfde4fc98ba6c6f90
SHA25625630ef836a221d0fa0f9195a155bf95212adb65173fbf08be1c4e180d7e8fef
SHA512ef45f7d29b2e0c5d83752f7907540f3d6d3d5a59d181cd3a718f2632ec766f48857739ea62665eb3e24c109dd7d7a04335a2f3501cec67776468ef48c454b384
-
Filesize
329KB
MD5f8b7426852eaeed44389177608ba4192
SHA199b1c0ab9ee841eaebe6c2cbf39a6886c39cf044
SHA2568d69024ed8176b7f5a845e74b1b2ab20ea48221bf8c29f0e2832f1a7a697bf31
SHA5122342990bff16b8e14af4f419ed0227d6caf0d2ba84b3b4665a070edbdf7540289f9139b30bf480e8257fbd28c8b8adc58f01b75bc02aa65fd1507a0d5381572b
-
Filesize
329KB
MD5f8b7426852eaeed44389177608ba4192
SHA199b1c0ab9ee841eaebe6c2cbf39a6886c39cf044
SHA2568d69024ed8176b7f5a845e74b1b2ab20ea48221bf8c29f0e2832f1a7a697bf31
SHA5122342990bff16b8e14af4f419ed0227d6caf0d2ba84b3b4665a070edbdf7540289f9139b30bf480e8257fbd28c8b8adc58f01b75bc02aa65fd1507a0d5381572b
-
Filesize
329KB
MD5f8b7426852eaeed44389177608ba4192
SHA199b1c0ab9ee841eaebe6c2cbf39a6886c39cf044
SHA2568d69024ed8176b7f5a845e74b1b2ab20ea48221bf8c29f0e2832f1a7a697bf31
SHA5122342990bff16b8e14af4f419ed0227d6caf0d2ba84b3b4665a070edbdf7540289f9139b30bf480e8257fbd28c8b8adc58f01b75bc02aa65fd1507a0d5381572b
-
Filesize
329KB
MD5f8b7426852eaeed44389177608ba4192
SHA199b1c0ab9ee841eaebe6c2cbf39a6886c39cf044
SHA2568d69024ed8176b7f5a845e74b1b2ab20ea48221bf8c29f0e2832f1a7a697bf31
SHA5122342990bff16b8e14af4f419ed0227d6caf0d2ba84b3b4665a070edbdf7540289f9139b30bf480e8257fbd28c8b8adc58f01b75bc02aa65fd1507a0d5381572b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b