Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07/10/2023, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.35706e6913d750d2a1d1b11b6a5c919a0a1b55fbe88438d7df42553b09d82c35_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.35706e6913d750d2a1d1b11b6a5c919a0a1b55fbe88438d7df42553b09d82c35_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.35706e6913d750d2a1d1b11b6a5c919a0a1b55fbe88438d7df42553b09d82c35_JC.exe
-
Size
1.2MB
-
MD5
0ce38a1f0d411f9371599fba05bf1b69
-
SHA1
8d436cd3de377e5f064d0d842a78a15a5b3a35d6
-
SHA256
35706e6913d750d2a1d1b11b6a5c919a0a1b55fbe88438d7df42553b09d82c35
-
SHA512
36e01ee5d75c06e8a39cd59604e7ea58abf16bb0c170adb8c22a6230061810fbf3e1668932d8220e49cf476f4ec3315065cb5770049f45e6ed98e4bcd4833bd6
-
SSDEEP
24576:YykdtDvTsF4G5mhXLNSVQfey1+8bqAx8FuJ2YjuiqV7ALhgD09dhn1:fkdtDbsF45h7NSVQfeUPdx8FuJ2YokLd
Malware Config
Extracted
redline
gigant
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/1776-35-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1776-36-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1776-37-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1776-39-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x000900000002302a-41.dat family_redline behavioral2/files/0x000900000002302a-42.dat family_redline behavioral2/memory/4392-44-0x0000000000010000-0x000000000004E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1000 qK1JO8XT.exe 4160 Ck6MS5vw.exe 4708 tQ2Xk3xs.exe 572 BV7uH4TV.exe 436 1MO50UJ4.exe 4392 2Da035Eh.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ck6MS5vw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" tQ2Xk3xs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" BV7uH4TV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.35706e6913d750d2a1d1b11b6a5c919a0a1b55fbe88438d7df42553b09d82c35_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" qK1JO8XT.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 436 set thread context of 1776 436 1MO50UJ4.exe 93 -
Program crash 2 IoCs
pid pid_target Process procid_target 212 436 WerFault.exe 91 216 1776 WerFault.exe 93 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1852 wrote to memory of 1000 1852 NEAS.35706e6913d750d2a1d1b11b6a5c919a0a1b55fbe88438d7df42553b09d82c35_JC.exe 87 PID 1852 wrote to memory of 1000 1852 NEAS.35706e6913d750d2a1d1b11b6a5c919a0a1b55fbe88438d7df42553b09d82c35_JC.exe 87 PID 1852 wrote to memory of 1000 1852 NEAS.35706e6913d750d2a1d1b11b6a5c919a0a1b55fbe88438d7df42553b09d82c35_JC.exe 87 PID 1000 wrote to memory of 4160 1000 qK1JO8XT.exe 88 PID 1000 wrote to memory of 4160 1000 qK1JO8XT.exe 88 PID 1000 wrote to memory of 4160 1000 qK1JO8XT.exe 88 PID 4160 wrote to memory of 4708 4160 Ck6MS5vw.exe 89 PID 4160 wrote to memory of 4708 4160 Ck6MS5vw.exe 89 PID 4160 wrote to memory of 4708 4160 Ck6MS5vw.exe 89 PID 4708 wrote to memory of 572 4708 tQ2Xk3xs.exe 90 PID 4708 wrote to memory of 572 4708 tQ2Xk3xs.exe 90 PID 4708 wrote to memory of 572 4708 tQ2Xk3xs.exe 90 PID 572 wrote to memory of 436 572 BV7uH4TV.exe 91 PID 572 wrote to memory of 436 572 BV7uH4TV.exe 91 PID 572 wrote to memory of 436 572 BV7uH4TV.exe 91 PID 436 wrote to memory of 1776 436 1MO50UJ4.exe 93 PID 436 wrote to memory of 1776 436 1MO50UJ4.exe 93 PID 436 wrote to memory of 1776 436 1MO50UJ4.exe 93 PID 436 wrote to memory of 1776 436 1MO50UJ4.exe 93 PID 436 wrote to memory of 1776 436 1MO50UJ4.exe 93 PID 436 wrote to memory of 1776 436 1MO50UJ4.exe 93 PID 436 wrote to memory of 1776 436 1MO50UJ4.exe 93 PID 436 wrote to memory of 1776 436 1MO50UJ4.exe 93 PID 436 wrote to memory of 1776 436 1MO50UJ4.exe 93 PID 436 wrote to memory of 1776 436 1MO50UJ4.exe 93 PID 572 wrote to memory of 4392 572 BV7uH4TV.exe 98 PID 572 wrote to memory of 4392 572 BV7uH4TV.exe 98 PID 572 wrote to memory of 4392 572 BV7uH4TV.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.35706e6913d750d2a1d1b11b6a5c919a0a1b55fbe88438d7df42553b09d82c35_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.35706e6913d750d2a1d1b11b6a5c919a0a1b55fbe88438d7df42553b09d82c35_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qK1JO8XT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\qK1JO8XT.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ck6MS5vw.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ck6MS5vw.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tQ2Xk3xs.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tQ2Xk3xs.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BV7uH4TV.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\BV7uH4TV.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1MO50UJ4.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1MO50UJ4.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 5408⤵
- Program crash
PID:216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 5927⤵
- Program crash
PID:212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Da035Eh.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Da035Eh.exe6⤵
- Executes dropped EXE
PID:4392
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1776 -ip 17761⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 436 -ip 4361⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD549bdc3fe93a96f942290053b2838e353
SHA116e05a49dcafc3ffcd097293a7b0f6620fd8dce4
SHA25622660f42d86c8e5d8dc40d09d5efa815f736a9a29285f92783c14569922fbe3d
SHA512b8f7ef263fef20f55a159e02b104605f1d365d67c10fc0e88ad2182692d1934b5ebe445a806d8cc46ac22648f1a548c8bff4df70eb89be5623bd95f109b18b8c
-
Filesize
1.0MB
MD549bdc3fe93a96f942290053b2838e353
SHA116e05a49dcafc3ffcd097293a7b0f6620fd8dce4
SHA25622660f42d86c8e5d8dc40d09d5efa815f736a9a29285f92783c14569922fbe3d
SHA512b8f7ef263fef20f55a159e02b104605f1d365d67c10fc0e88ad2182692d1934b5ebe445a806d8cc46ac22648f1a548c8bff4df70eb89be5623bd95f109b18b8c
-
Filesize
884KB
MD5392685fd0e969cff294232f1fa6c42ee
SHA1c14605dc273b5b69571faefaa9efc1d2ef366f60
SHA25615ca54d31707fa63bd976c3341e10e21a9ec75523caf7795cde81e307a97e2ed
SHA51237a9db66a132a6a855e1ee37c4f01e560deff7bd6e24ea010a276e9cf457601bf33cc4655c8a9cd67f8a38614f76267c4322540c99c72a3ac9f9b3024b550ea9
-
Filesize
884KB
MD5392685fd0e969cff294232f1fa6c42ee
SHA1c14605dc273b5b69571faefaa9efc1d2ef366f60
SHA25615ca54d31707fa63bd976c3341e10e21a9ec75523caf7795cde81e307a97e2ed
SHA51237a9db66a132a6a855e1ee37c4f01e560deff7bd6e24ea010a276e9cf457601bf33cc4655c8a9cd67f8a38614f76267c4322540c99c72a3ac9f9b3024b550ea9
-
Filesize
590KB
MD59862bf9623b59844a0ef43e6288686cf
SHA1fd6fd25dc634d54992e31158a95c70dab043c2c4
SHA2562cd2cee1b2632ddf26e9ac8dcbe6c754c358d3b9f7cd92b5ec737f5eaea2b47a
SHA51276db8a56a9f5f2b6f28798aa06f037aae99d48249eabad387f5dca0f74a77e88d2e4b665014fedb656264a332ca185a0e0f99484508a7da10dd1824b397300cd
-
Filesize
590KB
MD59862bf9623b59844a0ef43e6288686cf
SHA1fd6fd25dc634d54992e31158a95c70dab043c2c4
SHA2562cd2cee1b2632ddf26e9ac8dcbe6c754c358d3b9f7cd92b5ec737f5eaea2b47a
SHA51276db8a56a9f5f2b6f28798aa06f037aae99d48249eabad387f5dca0f74a77e88d2e4b665014fedb656264a332ca185a0e0f99484508a7da10dd1824b397300cd
-
Filesize
417KB
MD54255bd8ec2b9999216490f29bc04507a
SHA1969e435d7de1155b0c44906a2d8c5452f43d1e5e
SHA256f24a3a16f5964629ea18ad3883c30f927be2678b3b61ff33c6eff7025e00211b
SHA512faf612c1b10f2fb70632c9115114b74247270d534077ae26d9c90d8587619523c6a655930377b29c1623dde7e84c8831d2626f5a227eefe59368ef9802ae1f4e
-
Filesize
417KB
MD54255bd8ec2b9999216490f29bc04507a
SHA1969e435d7de1155b0c44906a2d8c5452f43d1e5e
SHA256f24a3a16f5964629ea18ad3883c30f927be2678b3b61ff33c6eff7025e00211b
SHA512faf612c1b10f2fb70632c9115114b74247270d534077ae26d9c90d8587619523c6a655930377b29c1623dde7e84c8831d2626f5a227eefe59368ef9802ae1f4e
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
378KB
MD5f0831f173733de08511f3a0739f278a6
SHA106dc809d653c5d2c97386084ae13b50a73eb5b60
SHA2568b00f9dce8ceb2123fba3bc9f88419960d1e661b6287eafeba4f0a2ee4be3d27
SHA51219e3176ce1f154758f685cc4582e93587aa534a251de315473e35758dcd6ff6315880be7602097308dc89c355742be4729bad81de597e8d430a8e868082314e3
-
Filesize
231KB
MD5d58eaf88f212e928f09ccf16d0c21f3c
SHA1ad2c02b7075009567e0d5d7257e48784b8846f28
SHA2560fa165a283db656207e88a76011a7855c74de60ce87cc3c59dd1b8198619bfa4
SHA512778bfa60e18b4b98d0dba5b3a33e787bddf4995172f310b73f11871ba5f55820f8f08953cdf7cf831d9b0bd3d84417958ec1ebe93a568b1ae8323d7ec5f5e125
-
Filesize
231KB
MD5d58eaf88f212e928f09ccf16d0c21f3c
SHA1ad2c02b7075009567e0d5d7257e48784b8846f28
SHA2560fa165a283db656207e88a76011a7855c74de60ce87cc3c59dd1b8198619bfa4
SHA512778bfa60e18b4b98d0dba5b3a33e787bddf4995172f310b73f11871ba5f55820f8f08953cdf7cf831d9b0bd3d84417958ec1ebe93a568b1ae8323d7ec5f5e125