Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
200s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe
Resource
win10v2004-20230915-en
General
-
Target
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe
-
Size
928KB
-
MD5
3b0702d6a6ef1940e5c745a3cd6a9a41
-
SHA1
3b7ecc2c01ead9014d827c368fc197059a0e3200
-
SHA256
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba
-
SHA512
80ae9454fd2bb945daa256dbd29571c528f068a23c9475e3a2ef6c0bcce8522f5caa48bff633905f3cf91bd71c85d7af5449c0a023bb69d7566bb2b88b45f76a
-
SSDEEP
12288:rMrey90rAt8kShe4IudlvYsyoiip6vR/3aaxGk4+/9U4lIxBsx4ShHZ+XV5Eq8qv:JycdVZo5/ddfuBpSHwV5E5emBQX
Malware Config
Extracted
redline
luska
77.91.124.55:19071
-
auth_value
a6797888f51a88afbfd8854a79ac9357
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4284-28-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4284-29-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4284-30-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4284-32-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4596 x6526259.exe 1908 x6572699.exe 3752 x6858340.exe 5040 g0448141.exe 3856 h7813781.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6526259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6572699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6858340.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5040 set thread context of 4284 5040 g0448141.exe 91 -
Program crash 2 IoCs
pid pid_target Process procid_target 3728 4284 WerFault.exe 91 4464 5040 WerFault.exe 88 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3984 wrote to memory of 4596 3984 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 84 PID 3984 wrote to memory of 4596 3984 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 84 PID 3984 wrote to memory of 4596 3984 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 84 PID 4596 wrote to memory of 1908 4596 x6526259.exe 85 PID 4596 wrote to memory of 1908 4596 x6526259.exe 85 PID 4596 wrote to memory of 1908 4596 x6526259.exe 85 PID 1908 wrote to memory of 3752 1908 x6572699.exe 87 PID 1908 wrote to memory of 3752 1908 x6572699.exe 87 PID 1908 wrote to memory of 3752 1908 x6572699.exe 87 PID 3752 wrote to memory of 5040 3752 x6858340.exe 88 PID 3752 wrote to memory of 5040 3752 x6858340.exe 88 PID 3752 wrote to memory of 5040 3752 x6858340.exe 88 PID 5040 wrote to memory of 4284 5040 g0448141.exe 91 PID 5040 wrote to memory of 4284 5040 g0448141.exe 91 PID 5040 wrote to memory of 4284 5040 g0448141.exe 91 PID 5040 wrote to memory of 4284 5040 g0448141.exe 91 PID 5040 wrote to memory of 4284 5040 g0448141.exe 91 PID 5040 wrote to memory of 4284 5040 g0448141.exe 91 PID 5040 wrote to memory of 4284 5040 g0448141.exe 91 PID 5040 wrote to memory of 4284 5040 g0448141.exe 91 PID 5040 wrote to memory of 4284 5040 g0448141.exe 91 PID 5040 wrote to memory of 4284 5040 g0448141.exe 91 PID 3752 wrote to memory of 3856 3752 x6858340.exe 101 PID 3752 wrote to memory of 3856 3752 x6858340.exe 101 PID 3752 wrote to memory of 3856 3752 x6858340.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe"C:\Users\Admin\AppData\Local\Temp\6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6526259.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6526259.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6572699.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6572699.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6858340.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6858340.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0448141.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0448141.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 5407⤵
- Program crash
PID:3728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 5766⤵
- Program crash
PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7813781.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7813781.exe5⤵
- Executes dropped EXE
PID:3856
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5040 -ip 50401⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4284 -ip 42841⤵PID:1328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD56d368034064f4aec421b17f47f6ab9f6
SHA1c5cecdd9aae0ae1ef4150e41f6667a79d31cc98d
SHA256c893a0de68f5da325b89b7fd9217c61cee835fe27b7d9aec72e49c7c2feec88d
SHA5120abf44ae84e4d790996ae0e13197043854bf33e6eb75e566e23784d85ea024bb5c9fe667b5c74ddb804a05bbbb1dc280a9ce89d2b0cda50d6adf0ac27e9b3d8b
-
Filesize
826KB
MD56d368034064f4aec421b17f47f6ab9f6
SHA1c5cecdd9aae0ae1ef4150e41f6667a79d31cc98d
SHA256c893a0de68f5da325b89b7fd9217c61cee835fe27b7d9aec72e49c7c2feec88d
SHA5120abf44ae84e4d790996ae0e13197043854bf33e6eb75e566e23784d85ea024bb5c9fe667b5c74ddb804a05bbbb1dc280a9ce89d2b0cda50d6adf0ac27e9b3d8b
-
Filesize
555KB
MD5332c5201b49536e5009b836de1cf871f
SHA10455d521fd075d1da39bd67694ee544876490053
SHA256b670547008ac27039f970cf706a77a85aa048226e6390f3499b5e4fc847d5c6a
SHA5128811998ed67dfd4000b79901a6d57b82acd1a8116f470b0d259f99ddff5fc6d929e53ba6e01f963ff869074f288a38d9c9193d67a93eebea5f91f31e846630ea
-
Filesize
555KB
MD5332c5201b49536e5009b836de1cf871f
SHA10455d521fd075d1da39bd67694ee544876490053
SHA256b670547008ac27039f970cf706a77a85aa048226e6390f3499b5e4fc847d5c6a
SHA5128811998ed67dfd4000b79901a6d57b82acd1a8116f470b0d259f99ddff5fc6d929e53ba6e01f963ff869074f288a38d9c9193d67a93eebea5f91f31e846630ea
-
Filesize
390KB
MD5559a684b443f9e536c88bff0fee1f391
SHA1032fc9af866425f80d32b8ba866adde044a6c65c
SHA256ccfa9d671b3bd152015ed1809647d31a05c697c10994bcf57387bd02bdfc03ce
SHA5127fd64d632ff1695dc4ae4dba89ce6f87c89381f2efc1ad63a896b4e3cc4a9e77766d0ab10f576cff7e2fe19427d81218911c136f8d037e28de42721d95185d02
-
Filesize
390KB
MD5559a684b443f9e536c88bff0fee1f391
SHA1032fc9af866425f80d32b8ba866adde044a6c65c
SHA256ccfa9d671b3bd152015ed1809647d31a05c697c10994bcf57387bd02bdfc03ce
SHA5127fd64d632ff1695dc4ae4dba89ce6f87c89381f2efc1ad63a896b4e3cc4a9e77766d0ab10f576cff7e2fe19427d81218911c136f8d037e28de42721d95185d02
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
174KB
MD5b623cf877c3e55e3afc976941e116302
SHA1c0e0d846dd1756810d9822d6ce7e961832a5b8c7
SHA256c9be26713066845f8d0d35b4b6a74cced7aaa641d8e4aa82d96e90c688f7b322
SHA512eb0031652b7d90aae7b7520e565b273b38f57f9236848ab89d8ad7d14a38fb6a29637736b0b27a735709741c569df298c4f2e5e7ceb0851d92f0a26ebf5c5b9c
-
Filesize
174KB
MD5b623cf877c3e55e3afc976941e116302
SHA1c0e0d846dd1756810d9822d6ce7e961832a5b8c7
SHA256c9be26713066845f8d0d35b4b6a74cced7aaa641d8e4aa82d96e90c688f7b322
SHA512eb0031652b7d90aae7b7520e565b273b38f57f9236848ab89d8ad7d14a38fb6a29637736b0b27a735709741c569df298c4f2e5e7ceb0851d92f0a26ebf5c5b9c