Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
24/10/2023, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
cef2505e5c844d4bad39d894e5b4e1d5ea54f31bb1425f522eb4b67889005490.exe
Resource
win10-20231020-en
General
-
Target
cef2505e5c844d4bad39d894e5b4e1d5ea54f31bb1425f522eb4b67889005490.exe
-
Size
1.7MB
-
MD5
c1a168e8d7773da790a4f6551a4fb7d0
-
SHA1
95bdfece92beab46e20d4e12141f02589708f264
-
SHA256
cef2505e5c844d4bad39d894e5b4e1d5ea54f31bb1425f522eb4b67889005490
-
SHA512
b787e861dbcf196dd19512cdded0eaf1058f9856ff4b17c997ab9ccb7c997bae4680aebbca86978119cd144d1d8cde1274859122f56ce351e5bf312c0a83eb2c
-
SSDEEP
49152:WQm3hsddHp8GXfQr5EgG2VUN4EfNrjCMJs:tm3he8GXfU5EgGzDVjCOs
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000600000001abf5-42.dat family_redline behavioral1/files/0x000600000001abf5-40.dat family_redline behavioral1/memory/3708-45-0x0000000000320000-0x000000000035E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2856 DH7tC4qi.exe 1452 Ie6ai7uk.exe 372 HC5IY2ae.exe 4380 op1ux0tf.exe 348 1DO28Nu1.exe 3708 2aF308BW.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cef2505e5c844d4bad39d894e5b4e1d5ea54f31bb1425f522eb4b67889005490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" DH7tC4qi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ie6ai7uk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" HC5IY2ae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" op1ux0tf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 348 set thread context of 4980 348 1DO28Nu1.exe 76 -
Program crash 1 IoCs
pid pid_target Process procid_target 3904 4980 WerFault.exe 76 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4156 wrote to memory of 2856 4156 cef2505e5c844d4bad39d894e5b4e1d5ea54f31bb1425f522eb4b67889005490.exe 71 PID 4156 wrote to memory of 2856 4156 cef2505e5c844d4bad39d894e5b4e1d5ea54f31bb1425f522eb4b67889005490.exe 71 PID 4156 wrote to memory of 2856 4156 cef2505e5c844d4bad39d894e5b4e1d5ea54f31bb1425f522eb4b67889005490.exe 71 PID 2856 wrote to memory of 1452 2856 DH7tC4qi.exe 72 PID 2856 wrote to memory of 1452 2856 DH7tC4qi.exe 72 PID 2856 wrote to memory of 1452 2856 DH7tC4qi.exe 72 PID 1452 wrote to memory of 372 1452 Ie6ai7uk.exe 73 PID 1452 wrote to memory of 372 1452 Ie6ai7uk.exe 73 PID 1452 wrote to memory of 372 1452 Ie6ai7uk.exe 73 PID 372 wrote to memory of 4380 372 HC5IY2ae.exe 74 PID 372 wrote to memory of 4380 372 HC5IY2ae.exe 74 PID 372 wrote to memory of 4380 372 HC5IY2ae.exe 74 PID 4380 wrote to memory of 348 4380 op1ux0tf.exe 75 PID 4380 wrote to memory of 348 4380 op1ux0tf.exe 75 PID 4380 wrote to memory of 348 4380 op1ux0tf.exe 75 PID 348 wrote to memory of 4980 348 1DO28Nu1.exe 76 PID 348 wrote to memory of 4980 348 1DO28Nu1.exe 76 PID 348 wrote to memory of 4980 348 1DO28Nu1.exe 76 PID 348 wrote to memory of 4980 348 1DO28Nu1.exe 76 PID 348 wrote to memory of 4980 348 1DO28Nu1.exe 76 PID 348 wrote to memory of 4980 348 1DO28Nu1.exe 76 PID 348 wrote to memory of 4980 348 1DO28Nu1.exe 76 PID 348 wrote to memory of 4980 348 1DO28Nu1.exe 76 PID 348 wrote to memory of 4980 348 1DO28Nu1.exe 76 PID 348 wrote to memory of 4980 348 1DO28Nu1.exe 76 PID 4380 wrote to memory of 3708 4380 op1ux0tf.exe 77 PID 4380 wrote to memory of 3708 4380 op1ux0tf.exe 77 PID 4380 wrote to memory of 3708 4380 op1ux0tf.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\cef2505e5c844d4bad39d894e5b4e1d5ea54f31bb1425f522eb4b67889005490.exe"C:\Users\Admin\AppData\Local\Temp\cef2505e5c844d4bad39d894e5b4e1d5ea54f31bb1425f522eb4b67889005490.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DH7tC4qi.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DH7tC4qi.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ie6ai7uk.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ie6ai7uk.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\HC5IY2ae.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\HC5IY2ae.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\op1ux0tf.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\op1ux0tf.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DO28Nu1.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DO28Nu1.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 5688⤵
- Program crash
PID:3904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aF308BW.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2aF308BW.exe6⤵
- Executes dropped EXE
PID:3708
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD55d69befb0444dd295fd359efd6ecc9a1
SHA1199d71a5e4004493ff4e60f2bd027418c6ffe100
SHA256343652d15cbc1749f0454db1ed98cf1c57f7767a68b2eddd922a0e35561735d2
SHA5123a3418337df44126396bd3c79c02a9cbb82db8c4859b4be781e56bd5b121d4400032444002da4ae69ee17578b5a6e37cd1dea6ea64d95701901d4159f94652c0
-
Filesize
1.5MB
MD55d69befb0444dd295fd359efd6ecc9a1
SHA1199d71a5e4004493ff4e60f2bd027418c6ffe100
SHA256343652d15cbc1749f0454db1ed98cf1c57f7767a68b2eddd922a0e35561735d2
SHA5123a3418337df44126396bd3c79c02a9cbb82db8c4859b4be781e56bd5b121d4400032444002da4ae69ee17578b5a6e37cd1dea6ea64d95701901d4159f94652c0
-
Filesize
1.4MB
MD56e385ff86612cf12869408468d1b91c5
SHA1558efec194ce61d21c3bef14deb841efcc346b8b
SHA25625ce802a822fa72b563660d8c640f2e2d1b34cf7b4cf6bf9390f44062f4283b2
SHA512df907d0806d3d74e17d847cdc449f1eae59594ed3cf233bcc308102e07fa19fa63ce877309e7c0b2cc9ae3615ee9d7f901590599ef7d4768684cbe657354df9d
-
Filesize
1.4MB
MD56e385ff86612cf12869408468d1b91c5
SHA1558efec194ce61d21c3bef14deb841efcc346b8b
SHA25625ce802a822fa72b563660d8c640f2e2d1b34cf7b4cf6bf9390f44062f4283b2
SHA512df907d0806d3d74e17d847cdc449f1eae59594ed3cf233bcc308102e07fa19fa63ce877309e7c0b2cc9ae3615ee9d7f901590599ef7d4768684cbe657354df9d
-
Filesize
873KB
MD5bfdf8a09be9ce3f1126cec2e664d1149
SHA152f617732121b9007fc99ebe782c9c7900d6bed0
SHA256efe6b79cb6b809c475d637c8fffddfaa4a461821ca1d12cc958748608d21e3c4
SHA5123203c7edb427ab137e93a77b1c86810371b422433b25b4b162c2ad5f05aee96eaef7eeb82e8a5f45c7e9a0ede24d3483ba0082474af82fad9d2b6338ba587b6c
-
Filesize
873KB
MD5bfdf8a09be9ce3f1126cec2e664d1149
SHA152f617732121b9007fc99ebe782c9c7900d6bed0
SHA256efe6b79cb6b809c475d637c8fffddfaa4a461821ca1d12cc958748608d21e3c4
SHA5123203c7edb427ab137e93a77b1c86810371b422433b25b4b162c2ad5f05aee96eaef7eeb82e8a5f45c7e9a0ede24d3483ba0082474af82fad9d2b6338ba587b6c
-
Filesize
678KB
MD517c9093a9e5a9af119e559d5f45ec5fd
SHA19d858bdf6b36ef2602def7313a74143fa777127e
SHA25690733104eb13dc375ee1122500ae208ccd58c0eaef163912ad62aefda1aad8eb
SHA51286eaa00efdaa0018697bcb57b549b4947310e8fe4025ff2a6a09588008f20e6ec3023fd4d30023c2e2f44690ea8acf6049d8c260ea08b287ce3ab7519b4e27c2
-
Filesize
678KB
MD517c9093a9e5a9af119e559d5f45ec5fd
SHA19d858bdf6b36ef2602def7313a74143fa777127e
SHA25690733104eb13dc375ee1122500ae208ccd58c0eaef163912ad62aefda1aad8eb
SHA51286eaa00efdaa0018697bcb57b549b4947310e8fe4025ff2a6a09588008f20e6ec3023fd4d30023c2e2f44690ea8acf6049d8c260ea08b287ce3ab7519b4e27c2
-
Filesize
1.8MB
MD5d855c906fd7f72726405487e4e8187b9
SHA1ae9c5e60351cd513ecb8d6366842370245baa22c
SHA256d42230a2a77373486c3f4335b34aa0f921510e00b48313e21e7cc8a932582923
SHA51254a9bfb21946846608a49052f5843cb0f1c950bca13828db4ad4d0fba994388c55315e0b6657cd515792deb135a877003be071f85ad17b9bace79562167b86a3
-
Filesize
1.8MB
MD5d855c906fd7f72726405487e4e8187b9
SHA1ae9c5e60351cd513ecb8d6366842370245baa22c
SHA256d42230a2a77373486c3f4335b34aa0f921510e00b48313e21e7cc8a932582923
SHA51254a9bfb21946846608a49052f5843cb0f1c950bca13828db4ad4d0fba994388c55315e0b6657cd515792deb135a877003be071f85ad17b9bace79562167b86a3
-
Filesize
221KB
MD5dc779d5da5c807ae4429ac64a4ee9074
SHA18e9e5bf0d4aeba3540e89c82fa0e5ee726d4eafd
SHA256bf23980039b0e0f55468484b71b5daa1ad360485b21467a548bafbee0a862b12
SHA512eaab80e5c445fee233d65d80b07c29086e6e109af1dd5317cb107956e35c67a11827a421ad33e8883ecc8a65e2b9fe6fc0b019f06024cafdcb592f1a7836102c
-
Filesize
221KB
MD5dc779d5da5c807ae4429ac64a4ee9074
SHA18e9e5bf0d4aeba3540e89c82fa0e5ee726d4eafd
SHA256bf23980039b0e0f55468484b71b5daa1ad360485b21467a548bafbee0a862b12
SHA512eaab80e5c445fee233d65d80b07c29086e6e109af1dd5317cb107956e35c67a11827a421ad33e8883ecc8a65e2b9fe6fc0b019f06024cafdcb592f1a7836102c