Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2023, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
6945b1b6375202378fe90f17235f0d00_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6945b1b6375202378fe90f17235f0d00_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
6945b1b6375202378fe90f17235f0d00_exe32.exe
-
Size
1.1MB
-
MD5
6945b1b6375202378fe90f17235f0d00
-
SHA1
ac27b9609a00c94dce5129eaa8c65eacb899e984
-
SHA256
569a977023b8a9fb2fa761343ff88f7091a2ebef77293d0333a91a12e1225448
-
SHA512
13e5744c37c7dddfcd564b2b83c5c75b47e05f2a530d37b9291f80f8e2a235bcbf0b344a4497c039f5e04db4ffac8007f47d4cb9afedb825b17e176c7bde16d2
-
SSDEEP
24576:pyaf7VikDptRWix52Fw/gn0u2c2eXOtPbEMbkZy9VuK:caf7V7Rnx52Fw/HcjetPvkZy9
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x0006000000023279-27.dat family_redline behavioral2/files/0x0006000000023279-28.dat family_redline behavioral2/memory/4948-29-0x0000000000BC0000-0x0000000000BFE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4428 nw5BF3hd.exe 2600 ZS7rH5GF.exe 3040 1av56uC0.exe 4948 2EQ802yT.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6945b1b6375202378fe90f17235f0d00_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nw5BF3hd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ZS7rH5GF.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3040 set thread context of 2296 3040 1av56uC0.exe 92 -
Program crash 2 IoCs
pid pid_target Process procid_target 4940 3040 WerFault.exe 84 2568 2296 WerFault.exe 92 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4428 4720 6945b1b6375202378fe90f17235f0d00_exe32.exe 82 PID 4720 wrote to memory of 4428 4720 6945b1b6375202378fe90f17235f0d00_exe32.exe 82 PID 4720 wrote to memory of 4428 4720 6945b1b6375202378fe90f17235f0d00_exe32.exe 82 PID 4428 wrote to memory of 2600 4428 nw5BF3hd.exe 83 PID 4428 wrote to memory of 2600 4428 nw5BF3hd.exe 83 PID 4428 wrote to memory of 2600 4428 nw5BF3hd.exe 83 PID 2600 wrote to memory of 3040 2600 ZS7rH5GF.exe 84 PID 2600 wrote to memory of 3040 2600 ZS7rH5GF.exe 84 PID 2600 wrote to memory of 3040 2600 ZS7rH5GF.exe 84 PID 3040 wrote to memory of 2232 3040 1av56uC0.exe 90 PID 3040 wrote to memory of 2232 3040 1av56uC0.exe 90 PID 3040 wrote to memory of 2232 3040 1av56uC0.exe 90 PID 3040 wrote to memory of 1432 3040 1av56uC0.exe 91 PID 3040 wrote to memory of 1432 3040 1av56uC0.exe 91 PID 3040 wrote to memory of 1432 3040 1av56uC0.exe 91 PID 3040 wrote to memory of 2296 3040 1av56uC0.exe 92 PID 3040 wrote to memory of 2296 3040 1av56uC0.exe 92 PID 3040 wrote to memory of 2296 3040 1av56uC0.exe 92 PID 3040 wrote to memory of 2296 3040 1av56uC0.exe 92 PID 3040 wrote to memory of 2296 3040 1av56uC0.exe 92 PID 3040 wrote to memory of 2296 3040 1av56uC0.exe 92 PID 3040 wrote to memory of 2296 3040 1av56uC0.exe 92 PID 3040 wrote to memory of 2296 3040 1av56uC0.exe 92 PID 3040 wrote to memory of 2296 3040 1av56uC0.exe 92 PID 3040 wrote to memory of 2296 3040 1av56uC0.exe 92 PID 2600 wrote to memory of 4948 2600 ZS7rH5GF.exe 100 PID 2600 wrote to memory of 4948 2600 ZS7rH5GF.exe 100 PID 2600 wrote to memory of 4948 2600 ZS7rH5GF.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\6945b1b6375202378fe90f17235f0d00_exe32.exe"C:\Users\Admin\AppData\Local\Temp\6945b1b6375202378fe90f17235f0d00_exe32.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nw5BF3hd.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nw5BF3hd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZS7rH5GF.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZS7rH5GF.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1av56uC0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1av56uC0.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2232
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 5406⤵
- Program crash
PID:2568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 5965⤵
- Program crash
PID:4940
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2EQ802yT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2EQ802yT.exe4⤵
- Executes dropped EXE
PID:4948
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2296 -ip 22961⤵PID:616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3040 -ip 30401⤵PID:564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756KB
MD5fa67733ffa94b522eec9f6e3cb74f9d6
SHA18a850c8cb7e30a3da2d8f7e6527c1319462c4719
SHA256749e93ebcfbf952d9015e97ed04937d914b4914391d444dbb907da2106e19d0e
SHA5120ad27936eaa008c26e3b2b40cf10db42b6cda5a64e55f9d7b839841298288a9f72a5d7817b97c101f55decb24512ca1974ab9b43ef2ccf307c8e3ca5a1de761b
-
Filesize
756KB
MD5fa67733ffa94b522eec9f6e3cb74f9d6
SHA18a850c8cb7e30a3da2d8f7e6527c1319462c4719
SHA256749e93ebcfbf952d9015e97ed04937d914b4914391d444dbb907da2106e19d0e
SHA5120ad27936eaa008c26e3b2b40cf10db42b6cda5a64e55f9d7b839841298288a9f72a5d7817b97c101f55decb24512ca1974ab9b43ef2ccf307c8e3ca5a1de761b
-
Filesize
560KB
MD578f1a4e7e93b6bcc05522c76960271cf
SHA116e4b88908c839c8d7dafc95aa97d134430c7372
SHA2569cfb07582c30f49e7d17307a4d8bd24e1b4b0c40b5c5f7d3d4bb50978899126e
SHA5125bf20696857e8d688ce1e70f0792414fbc3c689c3e4e1cdadb847fe7a47a808c2d1c81ab87b8e909c3f64c2ef0b6cbc6e4b79f535419aba7160f92fda96cb6e0
-
Filesize
560KB
MD578f1a4e7e93b6bcc05522c76960271cf
SHA116e4b88908c839c8d7dafc95aa97d134430c7372
SHA2569cfb07582c30f49e7d17307a4d8bd24e1b4b0c40b5c5f7d3d4bb50978899126e
SHA5125bf20696857e8d688ce1e70f0792414fbc3c689c3e4e1cdadb847fe7a47a808c2d1c81ab87b8e909c3f64c2ef0b6cbc6e4b79f535419aba7160f92fda96cb6e0
-
Filesize
1.1MB
MD5b971f0f56bd340686837930eaf95030c
SHA1e4ba997e3b16e78c97ff12a4f82dbff006f09416
SHA256ffe53ae729ffb95531892df64543d3d81dd775cc2159c2743b15b461955aaa5a
SHA512be08841316e7145e75a975e358c5880923571562de50f9f24e67c80553f9072b782baae15b8504de4fa7aff725bb1e4dfa8d982c10fbba95ec61657243c7ffdf
-
Filesize
1.1MB
MD5b971f0f56bd340686837930eaf95030c
SHA1e4ba997e3b16e78c97ff12a4f82dbff006f09416
SHA256ffe53ae729ffb95531892df64543d3d81dd775cc2159c2743b15b461955aaa5a
SHA512be08841316e7145e75a975e358c5880923571562de50f9f24e67c80553f9072b782baae15b8504de4fa7aff725bb1e4dfa8d982c10fbba95ec61657243c7ffdf
-
Filesize
221KB
MD500be2620fca81481ba1cd66ab02245cb
SHA1b99a50554b760f97165c4b7ff51b4fff9d9049b0
SHA256c7865fcc07a81f5783f67b0a33ee3626aa68d8e2d36280b5f2550fad05134cae
SHA51212aad37d0406665fbc3fda18ae01d4bb03aec5331782156f0ef4dcc7e51136d9271a87ba40f82e19b09636afda03c1318282aa004dd053ec8f9ee6b97906aa9f
-
Filesize
221KB
MD500be2620fca81481ba1cd66ab02245cb
SHA1b99a50554b760f97165c4b7ff51b4fff9d9049b0
SHA256c7865fcc07a81f5783f67b0a33ee3626aa68d8e2d36280b5f2550fad05134cae
SHA51212aad37d0406665fbc3fda18ae01d4bb03aec5331782156f0ef4dcc7e51136d9271a87ba40f82e19b09636afda03c1318282aa004dd053ec8f9ee6b97906aa9f