Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
304s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
04/09/2023, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
afefe85a3dabe89ea3c7595bbd8b90710b99da268433a6654a7bab62a406e108.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
afefe85a3dabe89ea3c7595bbd8b90710b99da268433a6654a7bab62a406e108.exe
Resource
win10-20230831-en
General
-
Target
afefe85a3dabe89ea3c7595bbd8b90710b99da268433a6654a7bab62a406e108.exe
-
Size
1.5MB
-
MD5
77c196d0e0139d38821aafc8b302f357
-
SHA1
df84f14e7458f3fe87aa8ae2f2ba2a827309dfc2
-
SHA256
afefe85a3dabe89ea3c7595bbd8b90710b99da268433a6654a7bab62a406e108
-
SHA512
3d8e5b41f871576cece194c50493292a4c9da411b39f9658c8e83e39a6aa7f4aa57956fcb7cb79d88c60c88a90be58f7556f75d6b874c27a82e128f5ec27ac72
-
SSDEEP
49152:mPa25LTMKrup3xPpL+RkyWIrNhBSFPy7R:kl5LQKrup3z+G4rN6k
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
gena
77.91.124.82:19071
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 2812 y5465669.exe 2336 y5244062.exe 1480 y7085472.exe 1048 l0860318.exe 4184 saves.exe 4576 m3742929.exe 4424 saves.exe 4604 n2431049.exe -
Loads dropped DLL 1 IoCs
pid Process 4596 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5465669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5244062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y7085472.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" afefe85a3dabe89ea3c7595bbd8b90710b99da268433a6654a7bab62a406e108.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3288 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4640 wrote to memory of 2812 4640 afefe85a3dabe89ea3c7595bbd8b90710b99da268433a6654a7bab62a406e108.exe 70 PID 4640 wrote to memory of 2812 4640 afefe85a3dabe89ea3c7595bbd8b90710b99da268433a6654a7bab62a406e108.exe 70 PID 4640 wrote to memory of 2812 4640 afefe85a3dabe89ea3c7595bbd8b90710b99da268433a6654a7bab62a406e108.exe 70 PID 2812 wrote to memory of 2336 2812 y5465669.exe 71 PID 2812 wrote to memory of 2336 2812 y5465669.exe 71 PID 2812 wrote to memory of 2336 2812 y5465669.exe 71 PID 2336 wrote to memory of 1480 2336 y5244062.exe 72 PID 2336 wrote to memory of 1480 2336 y5244062.exe 72 PID 2336 wrote to memory of 1480 2336 y5244062.exe 72 PID 1480 wrote to memory of 1048 1480 y7085472.exe 73 PID 1480 wrote to memory of 1048 1480 y7085472.exe 73 PID 1480 wrote to memory of 1048 1480 y7085472.exe 73 PID 1048 wrote to memory of 4184 1048 l0860318.exe 74 PID 1048 wrote to memory of 4184 1048 l0860318.exe 74 PID 1048 wrote to memory of 4184 1048 l0860318.exe 74 PID 1480 wrote to memory of 4576 1480 y7085472.exe 75 PID 1480 wrote to memory of 4576 1480 y7085472.exe 75 PID 1480 wrote to memory of 4576 1480 y7085472.exe 75 PID 4184 wrote to memory of 3288 4184 saves.exe 76 PID 4184 wrote to memory of 3288 4184 saves.exe 76 PID 4184 wrote to memory of 3288 4184 saves.exe 76 PID 4184 wrote to memory of 4888 4184 saves.exe 78 PID 4184 wrote to memory of 4888 4184 saves.exe 78 PID 4184 wrote to memory of 4888 4184 saves.exe 78 PID 4888 wrote to memory of 4104 4888 cmd.exe 80 PID 4888 wrote to memory of 4104 4888 cmd.exe 80 PID 4888 wrote to memory of 4104 4888 cmd.exe 80 PID 4888 wrote to memory of 3788 4888 cmd.exe 81 PID 4888 wrote to memory of 3788 4888 cmd.exe 81 PID 4888 wrote to memory of 3788 4888 cmd.exe 81 PID 4888 wrote to memory of 4512 4888 cmd.exe 82 PID 4888 wrote to memory of 4512 4888 cmd.exe 82 PID 4888 wrote to memory of 4512 4888 cmd.exe 82 PID 4888 wrote to memory of 4872 4888 cmd.exe 83 PID 4888 wrote to memory of 4872 4888 cmd.exe 83 PID 4888 wrote to memory of 4872 4888 cmd.exe 83 PID 4888 wrote to memory of 4928 4888 cmd.exe 84 PID 4888 wrote to memory of 4928 4888 cmd.exe 84 PID 4888 wrote to memory of 4928 4888 cmd.exe 84 PID 4888 wrote to memory of 3276 4888 cmd.exe 85 PID 4888 wrote to memory of 3276 4888 cmd.exe 85 PID 4888 wrote to memory of 3276 4888 cmd.exe 85 PID 4184 wrote to memory of 4596 4184 saves.exe 87 PID 4184 wrote to memory of 4596 4184 saves.exe 87 PID 4184 wrote to memory of 4596 4184 saves.exe 87 PID 2336 wrote to memory of 4604 2336 y5244062.exe 88 PID 2336 wrote to memory of 4604 2336 y5244062.exe 88 PID 2336 wrote to memory of 4604 2336 y5244062.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\afefe85a3dabe89ea3c7595bbd8b90710b99da268433a6654a7bab62a406e108.exe"C:\Users\Admin\AppData\Local\Temp\afefe85a3dabe89ea3c7595bbd8b90710b99da268433a6654a7bab62a406e108.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5465669.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5465669.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5244062.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5244062.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7085472.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7085472.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0860318.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0860318.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:3288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4928
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3276
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3742929.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3742929.exe5⤵
- Executes dropped EXE
PID:4576
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2431049.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n2431049.exe4⤵
- Executes dropped EXE
PID:4604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c9390b53ea094d2970b0113fd6849632
SHA1c364a383e953bd20ea34cfd3d712020e929fbb47
SHA256594eedca7b8d33209e7b219fcf6b5c7bf90cfa8a8a491c398d940a9031df1542
SHA5125a28d1186221c5eea08bf657f8117957899a05975a5f8cb093990feeb35f5d18a285a39936645d8596e1e2f0fedce0f6e6e661b0f3975431845a951c3a9d45c2
-
Filesize
1.4MB
MD5c9390b53ea094d2970b0113fd6849632
SHA1c364a383e953bd20ea34cfd3d712020e929fbb47
SHA256594eedca7b8d33209e7b219fcf6b5c7bf90cfa8a8a491c398d940a9031df1542
SHA5125a28d1186221c5eea08bf657f8117957899a05975a5f8cb093990feeb35f5d18a285a39936645d8596e1e2f0fedce0f6e6e661b0f3975431845a951c3a9d45c2
-
Filesize
476KB
MD50daa02b97221e447ef7bcff4729d7277
SHA1adbf3e922336ab3a4a891a2762746b7c01dd8a58
SHA2560a16f234f752170e56f7bb7d71c03b9721e421a7db293f4c600b972a2fa79620
SHA5126043176e6d9e30e23993f4a473edb90993f523c6abba4aeabc9dd8ebe5289cb4a1331c1f54ca0a29faab346bb2e4b31fd8cf5fca73c245beb0b5feac29bb47ef
-
Filesize
476KB
MD50daa02b97221e447ef7bcff4729d7277
SHA1adbf3e922336ab3a4a891a2762746b7c01dd8a58
SHA2560a16f234f752170e56f7bb7d71c03b9721e421a7db293f4c600b972a2fa79620
SHA5126043176e6d9e30e23993f4a473edb90993f523c6abba4aeabc9dd8ebe5289cb4a1331c1f54ca0a29faab346bb2e4b31fd8cf5fca73c245beb0b5feac29bb47ef
-
Filesize
174KB
MD512993527b34ebb8968d66a7f48683cec
SHA1661e2cf7ed81cb2cd49bec3c7bfaab39ac751246
SHA25695d5ace27415a17eadea0aacdddab6c6a81971afd538495cc87020c3ccb6f18b
SHA51282332af7139144b751ce4215cd3efd40635f993cb2dc895a96758bec5cb8fd59b949d7f0d03e8113f43097bfc45b7cd48d4cb2aa837e38ca359e27448bd80090
-
Filesize
174KB
MD512993527b34ebb8968d66a7f48683cec
SHA1661e2cf7ed81cb2cd49bec3c7bfaab39ac751246
SHA25695d5ace27415a17eadea0aacdddab6c6a81971afd538495cc87020c3ccb6f18b
SHA51282332af7139144b751ce4215cd3efd40635f993cb2dc895a96758bec5cb8fd59b949d7f0d03e8113f43097bfc45b7cd48d4cb2aa837e38ca359e27448bd80090
-
Filesize
320KB
MD535296c3109dcbdf15205187a592005b7
SHA14d39f1fe028f312fcdfed44d081e248662b9d667
SHA256f2b6c6a12a18da6d01e8e55dece88006fdf3da18095775995f31df2a2fd6a8e5
SHA51248242d324d5de2b6cb0e9a0f999bf0c04eb746b6742744faf47337c9e1b49e7452c3f1ef124cacc2b50223fb473a9750e54965fc67605cd7cf2283dc2e075bfb
-
Filesize
320KB
MD535296c3109dcbdf15205187a592005b7
SHA14d39f1fe028f312fcdfed44d081e248662b9d667
SHA256f2b6c6a12a18da6d01e8e55dece88006fdf3da18095775995f31df2a2fd6a8e5
SHA51248242d324d5de2b6cb0e9a0f999bf0c04eb746b6742744faf47337c9e1b49e7452c3f1ef124cacc2b50223fb473a9750e54965fc67605cd7cf2283dc2e075bfb
-
Filesize
334KB
MD55021b4fda8ea80c1b97f3f384a67e568
SHA101ecd3e6c0e9c8ccac99138370567e50126f33f6
SHA256288dc496e622d7b82536243b9b5b639de6d460ac60346676f691221772282354
SHA5127ce81042bd9a4fe5cb98cb345286a1acd0a29717150f5a11c1d8e2b40032711fb479683e3b9592bc3fcb74514f6d7bfb9170ead983c9195cf8875db82362ef3e
-
Filesize
334KB
MD55021b4fda8ea80c1b97f3f384a67e568
SHA101ecd3e6c0e9c8ccac99138370567e50126f33f6
SHA256288dc496e622d7b82536243b9b5b639de6d460ac60346676f691221772282354
SHA5127ce81042bd9a4fe5cb98cb345286a1acd0a29717150f5a11c1d8e2b40032711fb479683e3b9592bc3fcb74514f6d7bfb9170ead983c9195cf8875db82362ef3e
-
Filesize
140KB
MD5c8c9cf773e013247f3d90e0e0977d516
SHA19efe02f0980bb4ae4d4da1f59cc01afc7f79b704
SHA256ff962031c00c46c832ca3744da0dc51cd6f330d2575267275aa2102afc331183
SHA5121ab75159f946e9a9f56f0c7e8f8a127d7472fee520c0d14e5496bc45f30846cf8e85344027ab9d0fa093da6963f4396a2a73705d488b1ad5b27df81f1aeb0065
-
Filesize
140KB
MD5c8c9cf773e013247f3d90e0e0977d516
SHA19efe02f0980bb4ae4d4da1f59cc01afc7f79b704
SHA256ff962031c00c46c832ca3744da0dc51cd6f330d2575267275aa2102afc331183
SHA5121ab75159f946e9a9f56f0c7e8f8a127d7472fee520c0d14e5496bc45f30846cf8e85344027ab9d0fa093da6963f4396a2a73705d488b1ad5b27df81f1aeb0065
-
Filesize
334KB
MD55021b4fda8ea80c1b97f3f384a67e568
SHA101ecd3e6c0e9c8ccac99138370567e50126f33f6
SHA256288dc496e622d7b82536243b9b5b639de6d460ac60346676f691221772282354
SHA5127ce81042bd9a4fe5cb98cb345286a1acd0a29717150f5a11c1d8e2b40032711fb479683e3b9592bc3fcb74514f6d7bfb9170ead983c9195cf8875db82362ef3e
-
Filesize
334KB
MD55021b4fda8ea80c1b97f3f384a67e568
SHA101ecd3e6c0e9c8ccac99138370567e50126f33f6
SHA256288dc496e622d7b82536243b9b5b639de6d460ac60346676f691221772282354
SHA5127ce81042bd9a4fe5cb98cb345286a1acd0a29717150f5a11c1d8e2b40032711fb479683e3b9592bc3fcb74514f6d7bfb9170ead983c9195cf8875db82362ef3e
-
Filesize
334KB
MD55021b4fda8ea80c1b97f3f384a67e568
SHA101ecd3e6c0e9c8ccac99138370567e50126f33f6
SHA256288dc496e622d7b82536243b9b5b639de6d460ac60346676f691221772282354
SHA5127ce81042bd9a4fe5cb98cb345286a1acd0a29717150f5a11c1d8e2b40032711fb479683e3b9592bc3fcb74514f6d7bfb9170ead983c9195cf8875db82362ef3e
-
Filesize
334KB
MD55021b4fda8ea80c1b97f3f384a67e568
SHA101ecd3e6c0e9c8ccac99138370567e50126f33f6
SHA256288dc496e622d7b82536243b9b5b639de6d460ac60346676f691221772282354
SHA5127ce81042bd9a4fe5cb98cb345286a1acd0a29717150f5a11c1d8e2b40032711fb479683e3b9592bc3fcb74514f6d7bfb9170ead983c9195cf8875db82362ef3e
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b