Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 12:25
Static task
static1
Behavioral task
behavioral1
Sample
b72642f104bdbb23c275c4e8f2504fc6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b72642f104bdbb23c275c4e8f2504fc6.exe
Resource
win10v2004-20230915-en
General
-
Target
b72642f104bdbb23c275c4e8f2504fc6.exe
-
Size
942KB
-
MD5
b72642f104bdbb23c275c4e8f2504fc6
-
SHA1
19eb6e9469e8bd99fefcf362009d91b49e16b543
-
SHA256
c5d6bd9e558b4a0a61eb954ca7b0a28833221666fbc2bd299ce60f62bd62e29d
-
SHA512
7f6bb1104fd17e131b10190ad5b9962a7a975886107338430e45be12eac4a30d594de1eba538d4722b600a8b7b0ce9e56fb472c2e952c951811c97979a063baa
-
SSDEEP
12288:7Mr5y90C5q5YrS5wJHnwzzkgf3ZXV0lp6thwmam1adqcRDgX+vo/78lkyMVHHuhQ:eywMx5szkw0PFmEJVMVuhEK6w4tR
Malware Config
Extracted
redline
luate
77.91.124.55:19071
-
auth_value
e45cd419aba6c9d372088ffe5629308b
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/532-28-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/532-30-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/532-29-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/532-32-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 3324 x2987309.exe 2388 x5283578.exe 2496 x0220654.exe 2032 g3837789.exe 1800 h2449650.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5283578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0220654.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b72642f104bdbb23c275c4e8f2504fc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2987309.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 532 2032 g3837789.exe 90 -
Program crash 2 IoCs
pid pid_target Process procid_target 2168 532 WerFault.exe 90 880 2032 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 5020 wrote to memory of 3324 5020 b72642f104bdbb23c275c4e8f2504fc6.exe 83 PID 5020 wrote to memory of 3324 5020 b72642f104bdbb23c275c4e8f2504fc6.exe 83 PID 5020 wrote to memory of 3324 5020 b72642f104bdbb23c275c4e8f2504fc6.exe 83 PID 3324 wrote to memory of 2388 3324 x2987309.exe 84 PID 3324 wrote to memory of 2388 3324 x2987309.exe 84 PID 3324 wrote to memory of 2388 3324 x2987309.exe 84 PID 2388 wrote to memory of 2496 2388 x5283578.exe 85 PID 2388 wrote to memory of 2496 2388 x5283578.exe 85 PID 2388 wrote to memory of 2496 2388 x5283578.exe 85 PID 2496 wrote to memory of 2032 2496 x0220654.exe 86 PID 2496 wrote to memory of 2032 2496 x0220654.exe 86 PID 2496 wrote to memory of 2032 2496 x0220654.exe 86 PID 2032 wrote to memory of 4820 2032 g3837789.exe 87 PID 2032 wrote to memory of 4820 2032 g3837789.exe 87 PID 2032 wrote to memory of 4820 2032 g3837789.exe 87 PID 2032 wrote to memory of 4712 2032 g3837789.exe 88 PID 2032 wrote to memory of 4712 2032 g3837789.exe 88 PID 2032 wrote to memory of 4712 2032 g3837789.exe 88 PID 2032 wrote to memory of 4332 2032 g3837789.exe 89 PID 2032 wrote to memory of 4332 2032 g3837789.exe 89 PID 2032 wrote to memory of 4332 2032 g3837789.exe 89 PID 2032 wrote to memory of 532 2032 g3837789.exe 90 PID 2032 wrote to memory of 532 2032 g3837789.exe 90 PID 2032 wrote to memory of 532 2032 g3837789.exe 90 PID 2032 wrote to memory of 532 2032 g3837789.exe 90 PID 2032 wrote to memory of 532 2032 g3837789.exe 90 PID 2032 wrote to memory of 532 2032 g3837789.exe 90 PID 2032 wrote to memory of 532 2032 g3837789.exe 90 PID 2032 wrote to memory of 532 2032 g3837789.exe 90 PID 2032 wrote to memory of 532 2032 g3837789.exe 90 PID 2032 wrote to memory of 532 2032 g3837789.exe 90 PID 2496 wrote to memory of 1800 2496 x0220654.exe 99 PID 2496 wrote to memory of 1800 2496 x0220654.exe 99 PID 2496 wrote to memory of 1800 2496 x0220654.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\b72642f104bdbb23c275c4e8f2504fc6.exe"C:\Users\Admin\AppData\Local\Temp\b72642f104bdbb23c275c4e8f2504fc6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2987309.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2987309.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5283578.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5283578.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0220654.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0220654.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3837789.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4712
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 5407⤵
- Program crash
PID:2168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6006⤵
- Program crash
PID:880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2449650.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2449650.exe5⤵
- Executes dropped EXE
PID:1800
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2032 -ip 20321⤵PID:1208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 532 -ip 5321⤵PID:4528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
840KB
MD5164355782ac23c32eef196edf5ce121a
SHA1a59c187df77b1c8f31e2ceb6dc3f07af301057e4
SHA256e7bcaec3a71e20ff4be13d0dbdd992a5b56e5075308d0fd7db9033f1f869f4b4
SHA512c43fe30b5b41d871b17e4ee846821db22d0d23068164a776e752d9d399d3b08516ca959333b6eb18972a7548f19ecea856da9ce27ed6a1b6d2db33ba958570a4
-
Filesize
840KB
MD5164355782ac23c32eef196edf5ce121a
SHA1a59c187df77b1c8f31e2ceb6dc3f07af301057e4
SHA256e7bcaec3a71e20ff4be13d0dbdd992a5b56e5075308d0fd7db9033f1f869f4b4
SHA512c43fe30b5b41d871b17e4ee846821db22d0d23068164a776e752d9d399d3b08516ca959333b6eb18972a7548f19ecea856da9ce27ed6a1b6d2db33ba958570a4
-
Filesize
562KB
MD5e6b78815b15658197cea978d533b44c3
SHA193532d5b2f66cc6277947e507d72d1fc6da94382
SHA2564b55825cc30e9460643e85481bdfa0108195ba019e441d00d1c5bc8905727870
SHA512e10c327054757a68d8b819696a1ba6418c14290df6b873aa5c6b75f71ec8091f79e214699deb82fe5e9ec4a6c4859b2fff58d02c15d591729f7fa908525c0b47
-
Filesize
562KB
MD5e6b78815b15658197cea978d533b44c3
SHA193532d5b2f66cc6277947e507d72d1fc6da94382
SHA2564b55825cc30e9460643e85481bdfa0108195ba019e441d00d1c5bc8905727870
SHA512e10c327054757a68d8b819696a1ba6418c14290df6b873aa5c6b75f71ec8091f79e214699deb82fe5e9ec4a6c4859b2fff58d02c15d591729f7fa908525c0b47
-
Filesize
396KB
MD54c87cbfe90a611e8ebcfeec5fd49599f
SHA1815c8243d2b1e96bd9b9d2dea976921a78ef60f1
SHA2567a0836bf57e2254a6d0da76cb20145caab1b58887188d147cd6c835e61cd7bed
SHA51203251391c64374e4d783b3f73f2a18c1b7316ee51451fcda939740265f05cbda4463927f7b59a4b1881d6eee163f7a819cd739a40dc625411175f5fa6dd58cf0
-
Filesize
396KB
MD54c87cbfe90a611e8ebcfeec5fd49599f
SHA1815c8243d2b1e96bd9b9d2dea976921a78ef60f1
SHA2567a0836bf57e2254a6d0da76cb20145caab1b58887188d147cd6c835e61cd7bed
SHA51203251391c64374e4d783b3f73f2a18c1b7316ee51451fcda939740265f05cbda4463927f7b59a4b1881d6eee163f7a819cd739a40dc625411175f5fa6dd58cf0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0
-
Filesize
379KB
MD5e6c7cafddc2d8fc42c46e7309f1930a0
SHA1732c0edb05a6dbce5b837d4352b39eaad40e1659
SHA25692a54302e10aaef5532a9751928a7caf4d728712ccf2bc3f0626c44b4c6d13f6
SHA512b07d508f2cad5f956c88978413d285835ab226f692a81958819345a0cea5a5561f305ad8e40dfbe48137d7f81a2f475221b14459ce18314954e9f831ef11abc0
-
Filesize
174KB
MD529d84ae8f2d0cae3e30afadbb56fc1cb
SHA1e73b2cc210b40f178853cf2cc24701492c78b25a
SHA256d85ff93dc55fa7caf4ab844d8d705c7ecfb8c6c2e9b3d723c1ad9f1c18ce5658
SHA51299886564ba383e0cb40cf644dda85c4b1a91aa3079b537639cc04025c994c25c4f90000e1eb497dcd432f86a6a350e5b18bc90b02f7dcde28ae11490c341738e
-
Filesize
174KB
MD529d84ae8f2d0cae3e30afadbb56fc1cb
SHA1e73b2cc210b40f178853cf2cc24701492c78b25a
SHA256d85ff93dc55fa7caf4ab844d8d705c7ecfb8c6c2e9b3d723c1ad9f1c18ce5658
SHA51299886564ba383e0cb40cf644dda85c4b1a91aa3079b537639cc04025c994c25c4f90000e1eb497dcd432f86a6a350e5b18bc90b02f7dcde28ae11490c341738e