Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe
Resource
win10v2004-20230915-en
General
-
Target
4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe
-
Size
2.5MB
-
MD5
3d91b4b4877130321fe2dff023f31b4b
-
SHA1
e857122f0f46d22036c64f58d52dd3387ea2c582
-
SHA256
4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e
-
SHA512
ca6df76d3ca8d64adbbfbd6466b30ab0d715134b7a637087827bf3dfeb5210ab49e1f7f2852d27a30b341bafca3b8cd5ff0511c2967ddc44bf852daf104988f6
-
SSDEEP
24576:tMwN6yuB40zA0pHxV+L3DkU6KJi6a9Dhvh5wFbykjTJijcwEkeOR4/4z71+jsJR/:N6tzA0pHxVmkv6a3vgm+TEQ6ngd03z
Malware Config
Extracted
redline
ramon
77.91.124.82:19071
-
auth_value
3197576965d9513f115338c233015b40
Signatures
-
Detect Mystic stealer payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023244-17.dat family_mystic behavioral2/files/0x0008000000023244-16.dat family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4100 y5475781.exe 3028 m1249957.exe 4688 n1886076.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5475781.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4720 set thread context of 4412 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 96 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4264 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 95 PID 4720 wrote to memory of 4264 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 95 PID 4720 wrote to memory of 4264 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 95 PID 4720 wrote to memory of 4412 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 96 PID 4720 wrote to memory of 4412 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 96 PID 4720 wrote to memory of 4412 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 96 PID 4720 wrote to memory of 4412 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 96 PID 4720 wrote to memory of 4412 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 96 PID 4720 wrote to memory of 4412 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 96 PID 4720 wrote to memory of 4412 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 96 PID 4720 wrote to memory of 4412 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 96 PID 4720 wrote to memory of 4412 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 96 PID 4720 wrote to memory of 4412 4720 4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe 96 PID 4412 wrote to memory of 4100 4412 AppLaunch.exe 98 PID 4412 wrote to memory of 4100 4412 AppLaunch.exe 98 PID 4412 wrote to memory of 4100 4412 AppLaunch.exe 98 PID 4100 wrote to memory of 3028 4100 y5475781.exe 99 PID 4100 wrote to memory of 3028 4100 y5475781.exe 99 PID 4100 wrote to memory of 3028 4100 y5475781.exe 99 PID 4100 wrote to memory of 4688 4100 y5475781.exe 100 PID 4100 wrote to memory of 4688 4100 y5475781.exe 100 PID 4100 wrote to memory of 4688 4100 y5475781.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe"C:\Users\Admin\AppData\Local\Temp\4d5ad17afba094be5ae7ab14a5bd7c816ed861ad2fb2d6ba711dddf0f40bec0e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5475781.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5475781.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m1249957.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m1249957.exe4⤵
- Executes dropped EXE
PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n1886076.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n1886076.exe4⤵
- Executes dropped EXE
PID:4688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271KB
MD54188849964d7dfb86d9d05c1e7cff9a1
SHA18b91907361cf0d6d206ee3ce0979dd4a2598e8a1
SHA25690eb5d8c6d87fcdb9b52cc392c1ecefcaf0c5abe0fe066c1d01b767c7d7d5d7b
SHA5123ade1c8e35d2fb463389406c53b347621d4371ac40f0430c65f48dfafe6b015d0c3c1d139a1fd1b551416ea06964a93dac2e9af66f0ee74450044a337abd015e
-
Filesize
271KB
MD54188849964d7dfb86d9d05c1e7cff9a1
SHA18b91907361cf0d6d206ee3ce0979dd4a2598e8a1
SHA25690eb5d8c6d87fcdb9b52cc392c1ecefcaf0c5abe0fe066c1d01b767c7d7d5d7b
SHA5123ade1c8e35d2fb463389406c53b347621d4371ac40f0430c65f48dfafe6b015d0c3c1d139a1fd1b551416ea06964a93dac2e9af66f0ee74450044a337abd015e
-
Filesize
140KB
MD53462f58f29a8e9cee1a3784b6d9ca81a
SHA1d1263091469a2767bc2d01fdcfada72eb81413f3
SHA25607ac187aac9955dd78c49f756596f52638d5b6b15d236d39ebb52ac54cd9b45f
SHA5122a75b49e50488b6e75aeb6d2d2783025da7c8401e276d760081769e6d5cf14a43bd92de3a4a3cd628c0f20731eb8fa6dbed9a02a083e8a1c3cf2d85375dc702b
-
Filesize
140KB
MD53462f58f29a8e9cee1a3784b6d9ca81a
SHA1d1263091469a2767bc2d01fdcfada72eb81413f3
SHA25607ac187aac9955dd78c49f756596f52638d5b6b15d236d39ebb52ac54cd9b45f
SHA5122a75b49e50488b6e75aeb6d2d2783025da7c8401e276d760081769e6d5cf14a43bd92de3a4a3cd628c0f20731eb8fa6dbed9a02a083e8a1c3cf2d85375dc702b
-
Filesize
174KB
MD5cba4858bd1ba1ee2c33959b54a4c3164
SHA195a1d4d23fd2a8837fbb99035ce5817239cd84be
SHA256da00bc347006b2c8310bce45068575cde109c5bd4e50f40780e18de1bdbc684c
SHA51204fdc10ec75de7135483402f32b2d74db4db44083868bdec78a4cefbcb37d0ded4fcf57ac54f53c15c82ba23abfa88d4e7c93d1ccd9b5e258d8e426d3268bde3
-
Filesize
174KB
MD5cba4858bd1ba1ee2c33959b54a4c3164
SHA195a1d4d23fd2a8837fbb99035ce5817239cd84be
SHA256da00bc347006b2c8310bce45068575cde109c5bd4e50f40780e18de1bdbc684c
SHA51204fdc10ec75de7135483402f32b2d74db4db44083868bdec78a4cefbcb37d0ded4fcf57ac54f53c15c82ba23abfa88d4e7c93d1ccd9b5e258d8e426d3268bde3