Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2023, 15:37

General

  • Target

    598471c286035cefc0e31d3a3f7626e6842d05497155eba7b1483f8a08862b17.exe

  • Size

    1.6MB

  • MD5

    779291f87592584538220c5287542ca0

  • SHA1

    f2e415566f1896f2eb39d0dc80d8d72dcae9ed36

  • SHA256

    598471c286035cefc0e31d3a3f7626e6842d05497155eba7b1483f8a08862b17

  • SHA512

    7a79d2d2b813468470dd2f4c9813f59d8949d11587ad11523212a3d503038cc3c2af56f4cf850e2875fce8f89f30b6ec66a2d0fd68996ce46de3158e9e31421d

  • SSDEEP

    49152:Bplchvxx63aes4b+Yv/bbFugBbpV10wdHmBly:7lchvxxwDXXbbdFV10wU

Malware Config

Extracted

Family

redline

Botnet

gigant

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\598471c286035cefc0e31d3a3f7626e6842d05497155eba7b1483f8a08862b17.exe
    "C:\Users\Admin\AppData\Local\Temp\598471c286035cefc0e31d3a3f7626e6842d05497155eba7b1483f8a08862b17.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dw2bN7rp.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dw2bN7rp.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kG7xM8nI.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kG7xM8nI.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4120
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ad1Fj3XK.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ad1Fj3XK.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3548
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\aH8xz7wB.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\aH8xz7wB.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3736
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1mY22MC8.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1mY22MC8.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1960
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:1708
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 204
                    8⤵
                    • Program crash
                    PID:1100
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 568
                  7⤵
                  • Program crash
                  PID:1864
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2tf567do.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2tf567do.exe
                6⤵
                • Executes dropped EXE
                PID:1236
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1960 -ip 1960
      1⤵
        PID:4044
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1708 -ip 1708
        1⤵
          PID:3856

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dw2bN7rp.exe

          Filesize

          1.5MB

          MD5

          2250122bae011df7291803fa67381c98

          SHA1

          e625752d812f844a94405dedbcdf25a419a97fca

          SHA256

          0fcff74fa3e950845fdc00a77a93a4553098840ce3c144977f1a5fd22fe127cc

          SHA512

          be3717489d36972b146ba7f182618cdb30f770f8abe660acbcf663dd156153cfb37986e95aa69ffcf3550f44c5d3f9716337975bf4765a986d272fb064d61278

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dw2bN7rp.exe

          Filesize

          1.5MB

          MD5

          2250122bae011df7291803fa67381c98

          SHA1

          e625752d812f844a94405dedbcdf25a419a97fca

          SHA256

          0fcff74fa3e950845fdc00a77a93a4553098840ce3c144977f1a5fd22fe127cc

          SHA512

          be3717489d36972b146ba7f182618cdb30f770f8abe660acbcf663dd156153cfb37986e95aa69ffcf3550f44c5d3f9716337975bf4765a986d272fb064d61278

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kG7xM8nI.exe

          Filesize

          1.3MB

          MD5

          5796f40f9aacab4bea63f4a632c82ff2

          SHA1

          a2a9bcc34dc19aa2be0786df61d851ecdc0316b1

          SHA256

          26163795d90da8a98a738615263977ce390f78857ba3376ef4e7ba75eac9baca

          SHA512

          babff3c00eca4b7176a04eb80343cbcce4f2716b3dc8133fdf28a8afddf4cf1f7ff85de915f1a841445f76d35efd9b0913bdadd48027bcaa2dfb5f18634bcebe

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kG7xM8nI.exe

          Filesize

          1.3MB

          MD5

          5796f40f9aacab4bea63f4a632c82ff2

          SHA1

          a2a9bcc34dc19aa2be0786df61d851ecdc0316b1

          SHA256

          26163795d90da8a98a738615263977ce390f78857ba3376ef4e7ba75eac9baca

          SHA512

          babff3c00eca4b7176a04eb80343cbcce4f2716b3dc8133fdf28a8afddf4cf1f7ff85de915f1a841445f76d35efd9b0913bdadd48027bcaa2dfb5f18634bcebe

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ad1Fj3XK.exe

          Filesize

          825KB

          MD5

          4a9d62db08c6f47ccffd087f70baecf7

          SHA1

          f3a55c0f103d806b22cacabf5cfc7d622088c043

          SHA256

          22929f541176a7024926157841be3cb3f9f581de15676a1d9b60f9a6c9be4a75

          SHA512

          d4406eedafa4edf001b76e285d9e3cd93584787879aa141188dd47d5e697c9088b749dcef8d823d85ff1ccfd10e7e59f35cb9349f3bfb4c910e9cfab5d28361e

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ad1Fj3XK.exe

          Filesize

          825KB

          MD5

          4a9d62db08c6f47ccffd087f70baecf7

          SHA1

          f3a55c0f103d806b22cacabf5cfc7d622088c043

          SHA256

          22929f541176a7024926157841be3cb3f9f581de15676a1d9b60f9a6c9be4a75

          SHA512

          d4406eedafa4edf001b76e285d9e3cd93584787879aa141188dd47d5e697c9088b749dcef8d823d85ff1ccfd10e7e59f35cb9349f3bfb4c910e9cfab5d28361e

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\aH8xz7wB.exe

          Filesize

          653KB

          MD5

          952388012f4720b4aafa668a300e4b57

          SHA1

          0c98c78015807f1d7a7afbf1c66299533d5c0995

          SHA256

          b34ba90924afdb8762f1ecd05a03b025be74346a6de4c32fa316bb8f652aeb4f

          SHA512

          44579d418bf1afb4d9db0be0d20756ac6d6597d3094c65a7daa234bcb86f67c6bfb85a7868e8a2cad127e29a223707983a84078bf60176ef7475ac5d4c1aa75d

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\aH8xz7wB.exe

          Filesize

          653KB

          MD5

          952388012f4720b4aafa668a300e4b57

          SHA1

          0c98c78015807f1d7a7afbf1c66299533d5c0995

          SHA256

          b34ba90924afdb8762f1ecd05a03b025be74346a6de4c32fa316bb8f652aeb4f

          SHA512

          44579d418bf1afb4d9db0be0d20756ac6d6597d3094c65a7daa234bcb86f67c6bfb85a7868e8a2cad127e29a223707983a84078bf60176ef7475ac5d4c1aa75d

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1mY22MC8.exe

          Filesize

          1.8MB

          MD5

          e4a6b7c65f05b57051a96cfed910128d

          SHA1

          c4ba101c9efa07283a5b82af2820639852f6f40d

          SHA256

          d171180ac04f5deca1ba57def0a03431bac654429eaa6e0a6a48e9d1a761294f

          SHA512

          981ee577cb00398cb89035ba7b5c18315f4752a1272ee01e3b04b97aef7e115ec4be10453868ed94f174d7b72503538acb1280d1471dec08cbe5a213cc00415c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1mY22MC8.exe

          Filesize

          1.8MB

          MD5

          e4a6b7c65f05b57051a96cfed910128d

          SHA1

          c4ba101c9efa07283a5b82af2820639852f6f40d

          SHA256

          d171180ac04f5deca1ba57def0a03431bac654429eaa6e0a6a48e9d1a761294f

          SHA512

          981ee577cb00398cb89035ba7b5c18315f4752a1272ee01e3b04b97aef7e115ec4be10453868ed94f174d7b72503538acb1280d1471dec08cbe5a213cc00415c

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2tf567do.exe

          Filesize

          230KB

          MD5

          bbe29d23fb446916a96829fe26d0d1b3

          SHA1

          53c498eee6ee26fa86be522d11fca87f2f599547

          SHA256

          50b92357799ae61846da7efe68328eead11f015f6761a99a4e19e76c2c06d4d5

          SHA512

          9143b354da32b6f4ad8d4f42af00a206363c9b2b7da80e6d1c98f499024fffbf5903a84282ef56c2ecb41519270a349e2e52f363c11dd835a56f87d363545115

        • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2tf567do.exe

          Filesize

          230KB

          MD5

          bbe29d23fb446916a96829fe26d0d1b3

          SHA1

          53c498eee6ee26fa86be522d11fca87f2f599547

          SHA256

          50b92357799ae61846da7efe68328eead11f015f6761a99a4e19e76c2c06d4d5

          SHA512

          9143b354da32b6f4ad8d4f42af00a206363c9b2b7da80e6d1c98f499024fffbf5903a84282ef56c2ecb41519270a349e2e52f363c11dd835a56f87d363545115

        • memory/1236-46-0x00000000076B0000-0x0000000007742000-memory.dmp

          Filesize

          584KB

        • memory/1236-48-0x0000000007880000-0x000000000788A000-memory.dmp

          Filesize

          40KB

        • memory/1236-55-0x00000000078B0000-0x00000000078C0000-memory.dmp

          Filesize

          64KB

        • memory/1236-54-0x00000000745F0000-0x0000000074DA0000-memory.dmp

          Filesize

          7.7MB

        • memory/1236-43-0x00000000007D0000-0x000000000080E000-memory.dmp

          Filesize

          248KB

        • memory/1236-44-0x00000000745F0000-0x0000000074DA0000-memory.dmp

          Filesize

          7.7MB

        • memory/1236-45-0x0000000007BC0000-0x0000000008164000-memory.dmp

          Filesize

          5.6MB

        • memory/1236-53-0x0000000007A00000-0x0000000007A4C000-memory.dmp

          Filesize

          304KB

        • memory/1236-52-0x00000000079C0000-0x00000000079FC000-memory.dmp

          Filesize

          240KB

        • memory/1236-49-0x0000000008790000-0x0000000008DA8000-memory.dmp

          Filesize

          6.1MB

        • memory/1236-47-0x00000000078B0000-0x00000000078C0000-memory.dmp

          Filesize

          64KB

        • memory/1236-50-0x0000000008170000-0x000000000827A000-memory.dmp

          Filesize

          1.0MB

        • memory/1236-51-0x0000000007960000-0x0000000007972000-memory.dmp

          Filesize

          72KB

        • memory/1708-39-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1708-36-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1708-37-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1708-35-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB