Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3RedEye-Ran...on.vbs
windows7-x64
1RedEye-Ran...on.vbs
windows10-2004-x64
1RedEye-Ran...ip.vbs
windows7-x64
1RedEye-Ran...ip.vbs
windows10-2004-x64
1RedEye-Ran...ds.vbs
windows7-x64
1RedEye-Ran...ds.vbs
windows10-2004-x64
1RedEye-Ran...ad.vbs
windows7-x64
1RedEye-Ran...ad.vbs
windows10-2004-x64
1RedEye-Ran...m1.vbs
windows7-x64
1RedEye-Ran...m1.vbs
windows10-2004-x64
1RedEye-Ran...m2.vbs
windows7-x64
1RedEye-Ran...m2.vbs
windows10-2004-x64
1RedEye-Ran...m2.vbs
windows7-x64
1RedEye-Ran...m2.vbs
windows10-2004-x64
1RedEye-Ran...m3.vbs
windows7-x64
1RedEye-Ran...m3.vbs
windows10-2004-x64
1RedEye-Ran...m4.vbs
windows7-x64
1RedEye-Ran...m4.vbs
windows10-2004-x64
1RedEye-Ran...m5.vbs
windows7-x64
1RedEye-Ran...m5.vbs
windows10-2004-x64
1RedEye-Ran...m6.vbs
windows7-x64
1RedEye-Ran...m6.vbs
windows10-2004-x64
1RedEye-Ran...m6.vbs
windows7-x64
1RedEye-Ran...m6.vbs
windows10-2004-x64
1RedEye-Ran...es.vbs
windows7-x64
1RedEye-Ran...es.vbs
windows10-2004-x64
1RedEye-Ran...GE.exe
windows7-x64
1RedEye-Ran...GE.exe
windows10-2004-x64
1RedEye-Ran...ye.exe
windows7-x64
6RedEye-Ran...ye.exe
windows10-2004-x64
1RedEye-Ran...ye.exe
windows7-x64
RedEye-Ran...ye.exe
windows10-2004-x64
Analysis
-
max time kernel
113s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 09:14
Static task
static1
Behavioral task
behavioral1
Sample
RedEye-Ransomware-master/NewRedEye/Classes and Modules/Icon.vbs
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
RedEye-Ransomware-master/NewRedEye/Classes and Modules/Icon.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
RedEye-Ransomware-master/NewRedEye/Classes and Modules/Rar-Zip.vbs
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
RedEye-Ransomware-master/NewRedEye/Classes and Modules/Rar-Zip.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
RedEye-Ransomware-master/NewRedEye/Classes and Modules/payloads.vbs
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
RedEye-Ransomware-master/NewRedEye/Classes and Modules/payloads.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
RedEye-Ransomware-master/NewRedEye/Classes and Modules/spread.vbs
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
RedEye-Ransomware-master/NewRedEye/Classes and Modules/spread.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form1.vbs
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form1.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form2.vbs
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form2.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form2.vbs
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form2.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form3.vbs
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form3.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form4.vbs
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form4.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form5.vbs
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form5.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form6.vbs
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form6.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form6.vbs
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
RedEye-Ransomware-master/NewRedEye/Forms/Form6.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
RedEye-Ransomware-master/NewRedEye/My Project/Resources.vbs
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
RedEye-Ransomware-master/NewRedEye/My Project/Resources.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
RedEye-Ransomware-master/NewRedEye/Resources/SGE.exe
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
RedEye-Ransomware-master/NewRedEye/Resources/SGE.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
RedEye-Ransomware-master/NewRedEye/Resources/redeye.exe
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
RedEye-Ransomware-master/NewRedEye/Resources/redeye.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
RedEye-Ransomware-master/NewRedEye/obj/Debug/NewRedEye.exe
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
RedEye-Ransomware-master/NewRedEye/obj/Debug/NewRedEye.exe
Resource
win10v2004-20230915-en
Errors
General
-
Target
RedEye-Ransomware-master/NewRedEye/obj/Debug/NewRedEye.exe
-
Size
34.6MB
-
MD5
a16493f64983e95b47f4c23a43b54015
-
SHA1
fa596483355bb89e1c767cf33ea2911633daa574
-
SHA256
8b69a3aa3d2dc1eff7cce69cbd0d7bb8d3c178e218a80f3eae36ea7868ce8892
-
SHA512
7396c831bbe70eba699af2ba749bc428a6fc143d4a27cc547213925514653a152947c70dc161e3f19422094a186ff74a6c04a20f11a164418d42d1ee47fa3938
-
SSDEEP
786432:Zg1mbZFph3NKjsqydxM0Xb96BxTRZSvmrIXAphIh0vxwTjFxOfZdac:ZumbJesqyd+0Xb6xTRUvmkXAfIh3nFkN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation NewRedEye.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NewRedEye = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RedEye-Ransomware-master\\NewRedEye\\obj\\Debug\\NewRedEye.exe" NewRedEye.exe Set value (str) \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NewRedEye = "C:\\Users\\Admin\\AppData\\Local\\Temp\\RedEye-Ransomware-master\\NewRedEye\\obj\\Debug\\NewRedEye.exe" NewRedEye.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf NewRedEye.exe File opened for modification C:\autorun.inf NewRedEye.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "37" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 344 NewRedEye.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 232 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 232 AUDIODG.EXE Token: SeDebugPrivilege 344 NewRedEye.exe Token: SeShutdownPrivilege 1080 shutdown.exe Token: SeRemoteShutdownPrivilege 1080 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1544 LogonUI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 344 wrote to memory of 1080 344 NewRedEye.exe 100 PID 344 wrote to memory of 1080 344 NewRedEye.exe 100 PID 344 wrote to memory of 1080 344 NewRedEye.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\RedEye-Ransomware-master\NewRedEye\obj\Debug\NewRedEye.exe"C:\Users\Admin\AppData\Local\Temp\RedEye-Ransomware-master\NewRedEye\obj\Debug\NewRedEye.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" -r -t 00 -f2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:232
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3942855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1544