Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe
Resource
win10v2004-20230915-en
General
-
Target
e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe
-
Size
742KB
-
MD5
49d46cb81f01044f2563813d9ff41fbd
-
SHA1
9c7f2e414f91b5b4a06a47491e079d8510b36fb9
-
SHA256
e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847
-
SHA512
86f2c9809b7c57d6320c187efe735680a9641f60aba0ce62ba81e97d33064455610c3194f197a583296a7e0096aaafaa76cc223e07d60314817fe708dde3205c
-
SSDEEP
12288:cO//yfYb5BIQZVt31Pi7uFqDIhN6UZeTp3HO65rRyLzmqnFFbsrVI9:7iuBtZtKoUWs5VO65rR0FbUy
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detect Mystic stealer payload 2 IoCs
resource yara_rule behavioral2/files/0x00080000000231e5-17.dat family_mystic behavioral2/files/0x00080000000231e5-16.dat family_mystic -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3992 y7299366.exe 1404 m7841525.exe 4460 n0060393.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7299366.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3596 set thread context of 5112 3596 e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe 87 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3596 wrote to memory of 5112 3596 e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe 87 PID 3596 wrote to memory of 5112 3596 e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe 87 PID 3596 wrote to memory of 5112 3596 e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe 87 PID 3596 wrote to memory of 5112 3596 e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe 87 PID 3596 wrote to memory of 5112 3596 e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe 87 PID 3596 wrote to memory of 5112 3596 e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe 87 PID 3596 wrote to memory of 5112 3596 e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe 87 PID 3596 wrote to memory of 5112 3596 e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe 87 PID 3596 wrote to memory of 5112 3596 e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe 87 PID 3596 wrote to memory of 5112 3596 e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe 87 PID 5112 wrote to memory of 3992 5112 AppLaunch.exe 88 PID 5112 wrote to memory of 3992 5112 AppLaunch.exe 88 PID 5112 wrote to memory of 3992 5112 AppLaunch.exe 88 PID 3992 wrote to memory of 1404 3992 y7299366.exe 89 PID 3992 wrote to memory of 1404 3992 y7299366.exe 89 PID 3992 wrote to memory of 1404 3992 y7299366.exe 89 PID 3992 wrote to memory of 4460 3992 y7299366.exe 90 PID 3992 wrote to memory of 4460 3992 y7299366.exe 90 PID 3992 wrote to memory of 4460 3992 y7299366.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe"C:\Users\Admin\AppData\Local\Temp\e35e93f9ca7731196ebc922e102fe9230fb6818c52f8c7fcbec24ba9c2df0847.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7299366.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7299366.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7841525.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7841525.exe4⤵
- Executes dropped EXE
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n0060393.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n0060393.exe4⤵
- Executes dropped EXE
PID:4460
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD523ad1fcee08f5a9944316a21ada8ebf0
SHA12bbe19a25251d6137c0b704d12d78d71e5527308
SHA2561a81f72dfb7e0ade80f71c41fbf82a3129aaa407dd5b651570666423a44b69e1
SHA512df130a399cd7be74a67095c24bcd0c9d34ccb7e8a6f12cd6d5561d00cd6628259382882a113c624b25dce09a079cf21bd4a2617c82c8e779229779afd33c0b77
-
Filesize
272KB
MD523ad1fcee08f5a9944316a21ada8ebf0
SHA12bbe19a25251d6137c0b704d12d78d71e5527308
SHA2561a81f72dfb7e0ade80f71c41fbf82a3129aaa407dd5b651570666423a44b69e1
SHA512df130a399cd7be74a67095c24bcd0c9d34ccb7e8a6f12cd6d5561d00cd6628259382882a113c624b25dce09a079cf21bd4a2617c82c8e779229779afd33c0b77
-
Filesize
140KB
MD5d2299781b97e72554bac0b18c54c18e6
SHA1ca715fabfba8b0f02e21f0eb3814a4d20678f205
SHA256059a487b5e6e854236a71105e38d55660687e3c0610ac753dbfb010ebd84b922
SHA5121bb5c4c49a6ea81e5f9f9183cf5dcd6386579b78978099584e2a5426e70776cf6277c508d421efc5ec21f41d88c5b48e6a9d1c51ec57a0dcfbb332ab7d38b089
-
Filesize
140KB
MD5d2299781b97e72554bac0b18c54c18e6
SHA1ca715fabfba8b0f02e21f0eb3814a4d20678f205
SHA256059a487b5e6e854236a71105e38d55660687e3c0610ac753dbfb010ebd84b922
SHA5121bb5c4c49a6ea81e5f9f9183cf5dcd6386579b78978099584e2a5426e70776cf6277c508d421efc5ec21f41d88c5b48e6a9d1c51ec57a0dcfbb332ab7d38b089
-
Filesize
174KB
MD56cff9e54de3360f8ece29bfdda8d73b6
SHA19bafe76bd68b6b413cf1ca688733d218e003d1e0
SHA256839f3ccce0dfc7519fcee9d8cd15efef7e920a24cfe2879517c49283abf6a8b1
SHA512deb9162db65b9e0287026d13f4b98b87a1a8641ae079b84e0307b79d77482e399d194f1ccf7bb7f331c0a75280a750d03f9a7dda7d1794bbdbcc07fc582419fc
-
Filesize
174KB
MD56cff9e54de3360f8ece29bfdda8d73b6
SHA19bafe76bd68b6b413cf1ca688733d218e003d1e0
SHA256839f3ccce0dfc7519fcee9d8cd15efef7e920a24cfe2879517c49283abf6a8b1
SHA512deb9162db65b9e0287026d13f4b98b87a1a8641ae079b84e0307b79d77482e399d194f1ccf7bb7f331c0a75280a750d03f9a7dda7d1794bbdbcc07fc582419fc