Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
17/09/2023, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
Setupp.zip
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Setupp.zip
Resource
win10v2004-20230915-en
General
-
Target
Setupp.zip
-
Size
132.8MB
-
MD5
1b05efdd19f4f3f08225bc2329386a32
-
SHA1
dac6df0393b94ff4872f231b4304e27d14ac3f4b
-
SHA256
6ba0530cb54066d2ff66b8d57639542c2f6053f2e3e5cb69e051ab55eadb406f
-
SHA512
bf5c74121bb82e73de691d256ff0adf0413499f7225d610e67abb703bef30b894cdded1fdc230fc145ae2d554e0b381a34f01e4905ebb7cf6b43bbd41ee3442b
-
SSDEEP
3145728:qFChK0NJRkBk96UY4wtc1Tv+iq7vfaFBYNnljoJpwl14moVruNxRIIP8g:qFCK3Bz4wK9qbKBQljewEBANxP
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1924-21-0x0000000000400000-0x0000000000442000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation Setup.exe -
Executes dropped EXE 1 IoCs
pid Process 3468 Setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4948 ipconfig.exe 3884 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4280 7zFM.exe Token: 35 4280 7zFM.exe Token: SeSecurityPrivilege 4280 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4280 7zFM.exe 4280 7zFM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4280 wrote to memory of 3468 4280 7zFM.exe 95 PID 4280 wrote to memory of 3468 4280 7zFM.exe 95 PID 4280 wrote to memory of 3468 4280 7zFM.exe 95 PID 3468 wrote to memory of 4140 3468 Setup.exe 100 PID 3468 wrote to memory of 4140 3468 Setup.exe 100 PID 3468 wrote to memory of 4140 3468 Setup.exe 100
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Setupp.zip1⤵PID:920
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4088
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Setupp.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\7zO8B0EF3F8\Setup.exe"C:\Users\Admin\AppData\Local\Temp\7zO8B0EF3F8\Setup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵PID:4140
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- Gathers network information
PID:3884
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵PID:8
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- Gathers network information
PID:4948
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe3⤵PID:1924
-
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\1f74f6b7102a423c8791567c2f925d2b /t 4324 /p 42801⤵PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306.7MB
MD5f45df155dea6f923023dd7395ef1f37d
SHA1ed598665dd9035363b15c236a95f693cbba602f8
SHA256bd4e73b1392f4513422e4ff570cfd766669fbf10edeb25d6699b90f4c08cf19a
SHA512947ed7f765761e7a9070d01b81e15d5bfc40386194223d3c595208e9fc0a96efb71c55f44b4454f8820d0e4593f6b966c892528973dd5ab0fba4bfac8f16343b
-
Filesize
301.2MB
MD59d10d61b1c7e6c028feb693fe863e12a
SHA132d418b1ca1cd0aa542688a8e67eae60e4539035
SHA2567e5ca1128a7ca8368e5f9ae6c194407736e80d8447f1fce6ded2b7beba7da0fa
SHA5120c01468f9be0204200196863808465bbcb08e90ae65f543cfb34e02e4532b81237436818f7daaf9a54490dd4b2d64cc26cf487e95fb8236ff2c892b6445ece91
-
Filesize
493.2MB
MD5b16f1d822aebc6113e49e0c240a2e45f
SHA14f7ed5e9c984b054cabccab57382f2d222324b9a
SHA2565ca3cf88bf4a8730104be100f6beefe99a58c758744c0f6c142b90cfce7181cc
SHA512eda6e72d110e1119147e87411c47af4612353e3630babe88b9028760c4ee4cbdc374b881c911513991fabf0b0fa5593e027fcf02cdbdd4edd437ffd90a852ddf