Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2023, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
ef0a4f73c51f2a14eeaac3d6db1b9a016e22afb50dcae.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ef0a4f73c51f2a14eeaac3d6db1b9a016e22afb50dcae.exe
Resource
win10v2004-20230915-en
General
-
Target
ef0a4f73c51f2a14eeaac3d6db1b9a016e22afb50dcae.exe
-
Size
1.2MB
-
MD5
cd900bad4b7376e0ec9efe7b6b5b656f
-
SHA1
69a757cfe9785e95ca429d9c18264c61215ce5b5
-
SHA256
ef0a4f73c51f2a14eeaac3d6db1b9a016e22afb50dcaec7f383b4d81d1b318ee
-
SHA512
f926c91f9401faf14a36aad3ab585725991e4b5c09cd72828e5a21dd1212d03340a07e8ed978940b2dc04efc4d81fe57fef530f19818552809d4ccdc11179229
-
SSDEEP
6144:XZABbWqsE/Ao+mv8Qv0LVmwq4FU0fNoy62plUFsYM:pANwRo+mv8QD4+0V162gzM
Malware Config
Extracted
redline
6246893512_99
https://pastebin.com/raw/8baCJyMF
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation ef0a4f73c51f2a14eeaac3d6db1b9a016e22afb50dcae.exe -
Executes dropped EXE 1 IoCs
pid Process 4808 setup_1696682515.396641.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\1\1\setup_1696682515.396641.exe ef0a4f73c51f2a14eeaac3d6db1b9a016e22afb50dcae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3140 wrote to memory of 4808 3140 ef0a4f73c51f2a14eeaac3d6db1b9a016e22afb50dcae.exe 90 PID 3140 wrote to memory of 4808 3140 ef0a4f73c51f2a14eeaac3d6db1b9a016e22afb50dcae.exe 90 PID 3140 wrote to memory of 4808 3140 ef0a4f73c51f2a14eeaac3d6db1b9a016e22afb50dcae.exe 90 PID 4808 wrote to memory of 4552 4808 setup_1696682515.396641.exe 94 PID 4808 wrote to memory of 4552 4808 setup_1696682515.396641.exe 94 PID 4552 wrote to memory of 3068 4552 msedge.exe 95 PID 4552 wrote to memory of 3068 4552 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef0a4f73c51f2a14eeaac3d6db1b9a016e22afb50dcae.exe"C:\Users\Admin\AppData\Local\Temp\ef0a4f73c51f2a14eeaac3d6db1b9a016e22afb50dcae.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Program Files (x86)\1\1\setup_1696682515.396641.exe"C:\Program Files (x86)\1\1\setup_1696682515.396641.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=setup_1696682515.396641.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.03⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff041c46f8,0x7fff041c4708,0x7fff041c47184⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:34⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:24⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:84⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:14⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:14⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:14⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:14⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:14⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:84⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:84⤵PID:180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:14⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:14⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:14⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14684846165999802845,5771165743855274301,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:14⤵PID:4184
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=setup_1696682515.396641.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.03⤵PID:3660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fff041c46f8,0x7fff041c4708,0x7fff041c47184⤵PID:2044
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
725.1MB
MD5f621e6445542f401e1be82aed669692e
SHA1b6ae6a659bf5cda7d6e010aeae3662fa75d04bc8
SHA256660d98b0e8e12cc1b8058038ff797dee216aebf91a7bc27739350fd0c0c6562b
SHA512d168a4f0b680f1d083ebe1f0131ef52fece67c67e455b1dfeab1ea426e1f58be9d6c1f4db4725eee076576549977c91025ddd1026b08a2cb0c57826d57178c14
-
Filesize
459.8MB
MD517fbcddbe794572f8fe0c9c147cb2e8a
SHA177e33d2d3fdbf5395adac7517cb0e94cfec54f88
SHA256de5d550c8236f65999a5373b0a05840f92f4a2f44258baa9ab51ec43ad4c9b67
SHA5123e1219cf5e4ae802027cb67f88f541f3a6b9918effcbbfc51b9bbfb39f919419e270203a60986d80b1c1d62a74d17c4a4d7d181f48d6c801ad923c6ff15d9778
-
Filesize
431.2MB
MD5c0d94780529fac2c843bea2918c4da4c
SHA1b3848e08b4be7009d93d9f0bf49e73b7c9d131f5
SHA25697e060ea3f41b31cf1b4f56e84a2af88139cb0da3cfcdb16661829cac31dade8
SHA5121d0ec921ba291aeb8a505f4aeb910ece1f26739c08e13a9e8935014bdbace33672e624e007f662dd0b993414bef217263a8a537c50d6514e688b9fb722b6d667
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
Filesize
152B
MD516c2a9f4b2e1386aab0e353614a63f0d
SHA16edd3be593b653857e579cbd3db7aa7e1df3e30f
SHA2560f7c58a653ae1f3999627721bad03793edc1e9d12e8f5253c30b61b8478f5c81
SHA512aba1ed22c7b9ae1942d69a7cd7a618597300ae5c56be88187ddec6227df056f81c1d9217778d87fa8c36402bce7275d707118ff62d3a241297738da434556e06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5797c817205e57a3bd0cbcb397569e241
SHA1e5627930201dc6aab29e089b6832930f68fa8555
SHA2561fde07b74002298be75f78e290f7a41b86a5ff21efe738be8c32edf7965858df
SHA512aeb9b1f75a987af20b82b3c93482f75d95c0ef4b4488900497307bda9718f983ab94b306ed731d95641875066f208dc1e1c3eab1c71a2888dc8bb23a26f0bbd3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5d6213f521ee838ddaf85e33db668c0c3
SHA1b13a886490ccf8a067bb47f4f3733ec62196cabe
SHA256e7b4eceef9ca422e5f5c722e11720e9e00d033a34683a88cdaa49ad4b17eb154
SHA5128f49374b53fb1436b63fca463031714c07603175aa10da79c1c5c146391396fca7fe2cd5187defc6d3251c967a9b5dd9cdc5ea39c6f1e2946e70f48811d69704
-
Filesize
5KB
MD5e3f6f4962e78306c9a2c703df11c73dc
SHA1a16df4f2b94f8e7d2178ecf60ecb0813c7258e8d
SHA25681bce3ac8a54eeb6553a72361aabb4a2f969dfb7d279dd7ccb9a29fbf936510d
SHA512046649abbf1142e5fd82162509ed88ff9a48289bf0f48a46a55ae0f96cadc6c4d7a3d7678efb60bf5a4c2603c8fdefcfd17917c030ca5cd30d4c824c5dff0c1e
-
Filesize
24KB
MD5699e3636ed7444d9b47772e4446ccfc1
SHA1db0459ca6ceeea2e87e0023a6b7ee06aeed6fded
SHA2569205233792628ecf0d174de470b2986abf3adfed702330dc54c4a76c9477949a
SHA512d5d4c08b6aec0f3e3506e725decc1bdf0b2e2fb50703c36d568c1ea3c3ab70720f5aec9d49ad824505731eb64db399768037c9f1be655779ed77331a7bab1d51
-
Filesize
371B
MD59669c204988ab398ccbf25520a6a41dd
SHA1f90f4c1a303e979df46ed22f3501df018b635ee7
SHA256c994919c306bc3305b22c6e03f222e8fc0c82ff30d6e7c8fd33da7a54fb70963
SHA512cb7a7f4b15ba5283bb2b9fcf02cad541e9942583c9fecf22d1526db661cd873faefa591ca15d4ab6381c8476c66c700365618a2e94e266e4ce3fe7388f645295
-
Filesize
203B
MD5665b5c7d6a92e4ebea7b1f70ba5925fb
SHA1baeb907511e589ccaf461600b2ae7b88a01db26f
SHA256eebdbb1fead9997c7f43c656e873bc2ba400a6ef46f03e34d918a69676441f3c
SHA5128652966b203139d53281b5af9618380c1f32e4fef8e2b987c77f2348e9584a115a6f82865f6df53d94b7190c3c8355f4e781cc0a8bda4437776c445dc3f188b8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50943574408858737dca73d045a90d475
SHA1b04a9e9e97e679aba09a09b4e09b492a59273186
SHA25606c57ab1d4dc0af2db66d5097b3102e571b718e7dbdc8ea466e5682a30fcbcb8
SHA5128b5eaca2351e54bf72c6115b26f84a38bf22358edef4303e2cbea21e0ae879a33dc057e0f6693ba13ade9b3be1b9c74538c437dd36efa3fd87b23834597c7a5a
-
Filesize
10KB
MD50923ceeca2b8e91696d080ae28612bae
SHA12e011b0f473164c6c42aea9d95dd5b82e5ee7b64
SHA25611e755fce31df73b1304142d8dcb98b6384575ff6e5f50dc1dd2f456ac4affad
SHA51235ee46b7d40936acc21e083d61094d613798984a4e76cc8b2f6aee1794b4a3d7d24700b651d4bb8f650c8574000d6e40de0b9da9ba81d3e2a491670cdae28eae