Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.425d8c9efa48b19a888f7f165d2c32f0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.425d8c9efa48b19a888f7f165d2c32f0.exe
-
Size
1.5MB
-
MD5
425d8c9efa48b19a888f7f165d2c32f0
-
SHA1
33a584dab98135bfb53e539fd46fe0721998674f
-
SHA256
08f23e63ef45a3062061e105d972a26f30379b83357117359704e50ad3c00385
-
SHA512
88461b37b10bf288dd973adde6da2f6bffb3fdcba4241fdcc08ca5d3dc2815aaddcf7b46208e65511cf6abf116d52d0331cc2f2bdd6d12e0067ede124f7b30d0
-
SSDEEP
24576:mylhonEBY+7MK/7XbBPEKHcuQWKNIP4aCY6FHpezj9UdZMSiO97:1lcGY+7MK/bBEKbxKNuCpRWj2
Malware Config
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0006000000022daa-41.dat family_redline behavioral1/files/0x0006000000022daa-42.dat family_redline behavioral1/memory/2496-43-0x00000000005F0000-0x000000000062E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 2356 Si4SR7iQ.exe 2008 kn6Lv6zN.exe 3488 EX9zq3Ho.exe 2816 HQ2ER5na.exe 4404 1cJ14rw7.exe 2496 2Ql467Em.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" NEAS.425d8c9efa48b19a888f7f165d2c32f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Si4SR7iQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kn6Lv6zN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" EX9zq3Ho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" HQ2ER5na.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4404 set thread context of 4184 4404 1cJ14rw7.exe 92 -
Program crash 1 IoCs
pid pid_target Process procid_target 4856 4184 WerFault.exe 92 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2356 2972 NEAS.425d8c9efa48b19a888f7f165d2c32f0.exe 84 PID 2972 wrote to memory of 2356 2972 NEAS.425d8c9efa48b19a888f7f165d2c32f0.exe 84 PID 2972 wrote to memory of 2356 2972 NEAS.425d8c9efa48b19a888f7f165d2c32f0.exe 84 PID 2356 wrote to memory of 2008 2356 Si4SR7iQ.exe 85 PID 2356 wrote to memory of 2008 2356 Si4SR7iQ.exe 85 PID 2356 wrote to memory of 2008 2356 Si4SR7iQ.exe 85 PID 2008 wrote to memory of 3488 2008 kn6Lv6zN.exe 86 PID 2008 wrote to memory of 3488 2008 kn6Lv6zN.exe 86 PID 2008 wrote to memory of 3488 2008 kn6Lv6zN.exe 86 PID 3488 wrote to memory of 2816 3488 EX9zq3Ho.exe 87 PID 3488 wrote to memory of 2816 3488 EX9zq3Ho.exe 87 PID 3488 wrote to memory of 2816 3488 EX9zq3Ho.exe 87 PID 2816 wrote to memory of 4404 2816 HQ2ER5na.exe 89 PID 2816 wrote to memory of 4404 2816 HQ2ER5na.exe 89 PID 2816 wrote to memory of 4404 2816 HQ2ER5na.exe 89 PID 4404 wrote to memory of 4184 4404 1cJ14rw7.exe 92 PID 4404 wrote to memory of 4184 4404 1cJ14rw7.exe 92 PID 4404 wrote to memory of 4184 4404 1cJ14rw7.exe 92 PID 4404 wrote to memory of 4184 4404 1cJ14rw7.exe 92 PID 4404 wrote to memory of 4184 4404 1cJ14rw7.exe 92 PID 4404 wrote to memory of 4184 4404 1cJ14rw7.exe 92 PID 4404 wrote to memory of 4184 4404 1cJ14rw7.exe 92 PID 4404 wrote to memory of 4184 4404 1cJ14rw7.exe 92 PID 4404 wrote to memory of 4184 4404 1cJ14rw7.exe 92 PID 4404 wrote to memory of 4184 4404 1cJ14rw7.exe 92 PID 2816 wrote to memory of 2496 2816 HQ2ER5na.exe 93 PID 2816 wrote to memory of 2496 2816 HQ2ER5na.exe 93 PID 2816 wrote to memory of 2496 2816 HQ2ER5na.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.425d8c9efa48b19a888f7f165d2c32f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.425d8c9efa48b19a888f7f165d2c32f0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Si4SR7iQ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Si4SR7iQ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kn6Lv6zN.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kn6Lv6zN.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EX9zq3Ho.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\EX9zq3Ho.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\HQ2ER5na.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\HQ2ER5na.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cJ14rw7.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1cJ14rw7.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 5648⤵
- Program crash
PID:4856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Ql467Em.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Ql467Em.exe6⤵
- Executes dropped EXE
PID:2496
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4184 -ip 41841⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f8d523ac387a03c88fd3e9cf8507d089
SHA10ccbb0bff3be94a64853bd6e15fb7b1d24f748f4
SHA256207574395c76a75e27cb32f0d000053ffb84e44278c2e4fb4c42c1c8c297b459
SHA512a269ae40ccd9fc867cbaff221f7621b24320babf46de72335bdceab05194461e32a1e77287f85c89a8f9bcbeeefa088ae4cc5e73ed173c7cd59e34569e02c720
-
Filesize
1.3MB
MD5f8d523ac387a03c88fd3e9cf8507d089
SHA10ccbb0bff3be94a64853bd6e15fb7b1d24f748f4
SHA256207574395c76a75e27cb32f0d000053ffb84e44278c2e4fb4c42c1c8c297b459
SHA512a269ae40ccd9fc867cbaff221f7621b24320babf46de72335bdceab05194461e32a1e77287f85c89a8f9bcbeeefa088ae4cc5e73ed173c7cd59e34569e02c720
-
Filesize
1.1MB
MD50710c97d3448e872745e783251b7e0e5
SHA1d63acc85f9c0e0bfa5009389229f701107d8d682
SHA25614f40f7ef644381557cae2dabe233e93648057dc99b35941dee9ebe1003b2bac
SHA5120d94045d058fc578a6e21363aacc6bb139a02b4abc2b684411f115b01e820da757ef8f9133d0912f00696131f142b251c58f5cc6e03065c0c20e0a732b0c3edf
-
Filesize
1.1MB
MD50710c97d3448e872745e783251b7e0e5
SHA1d63acc85f9c0e0bfa5009389229f701107d8d682
SHA25614f40f7ef644381557cae2dabe233e93648057dc99b35941dee9ebe1003b2bac
SHA5120d94045d058fc578a6e21363aacc6bb139a02b4abc2b684411f115b01e820da757ef8f9133d0912f00696131f142b251c58f5cc6e03065c0c20e0a732b0c3edf
-
Filesize
758KB
MD5bb1a0f45d15285f9a18115d3c509bd09
SHA16e173bb07c574adde886e7440100cc0b3cac5e4c
SHA25600e351fab6131cdce40e776f08b186b41e4b3f76167cc51d56549918b712073e
SHA5125cc97343d6bb24baf0b38c0245e395b0f9dd363750293b15c0013095eb440051ff52298848adb785a771c767a38224037aa4be01e412f70774c940479a64847e
-
Filesize
758KB
MD5bb1a0f45d15285f9a18115d3c509bd09
SHA16e173bb07c574adde886e7440100cc0b3cac5e4c
SHA25600e351fab6131cdce40e776f08b186b41e4b3f76167cc51d56549918b712073e
SHA5125cc97343d6bb24baf0b38c0245e395b0f9dd363750293b15c0013095eb440051ff52298848adb785a771c767a38224037aa4be01e412f70774c940479a64847e
-
Filesize
562KB
MD54e91c367773562b5b400c44bde45a659
SHA10c7227dfddcba2e6a20a6bbb50091643c262bd16
SHA256da3521157478d89e329f83cfc88112ed830220aa82cd47915516e9b0b812150d
SHA512bdf75ee04e521090712ff871f1c3623caca602e6f8a06c891661fe0603995cb7333a902a1856324fc32588fbc394bed0b2cec4fdbfe67b4dd2072227bbd41de8
-
Filesize
562KB
MD54e91c367773562b5b400c44bde45a659
SHA10c7227dfddcba2e6a20a6bbb50091643c262bd16
SHA256da3521157478d89e329f83cfc88112ed830220aa82cd47915516e9b0b812150d
SHA512bdf75ee04e521090712ff871f1c3623caca602e6f8a06c891661fe0603995cb7333a902a1856324fc32588fbc394bed0b2cec4fdbfe67b4dd2072227bbd41de8
-
Filesize
1.1MB
MD55c0f230733975ca9addb7fb932ba7fd8
SHA170332e6d8e29f8b334079fc914c6fc134453547e
SHA2566aaadefd6b657971a15bd5a6afa20a0bc883b13d89c5109ccdd58f9bd3a14aa7
SHA5125234959d6344c7a0026f33a7ae54c01ee085f7a4c96f1a0c29821c8d1c873d35371cc37c4d17ba99e5dcba059c3e4e7ca92782c580a0d28ffc4ed6a70b9175c0
-
Filesize
1.1MB
MD55c0f230733975ca9addb7fb932ba7fd8
SHA170332e6d8e29f8b334079fc914c6fc134453547e
SHA2566aaadefd6b657971a15bd5a6afa20a0bc883b13d89c5109ccdd58f9bd3a14aa7
SHA5125234959d6344c7a0026f33a7ae54c01ee085f7a4c96f1a0c29821c8d1c873d35371cc37c4d17ba99e5dcba059c3e4e7ca92782c580a0d28ffc4ed6a70b9175c0
-
Filesize
222KB
MD57a0ee5aa6aff36f538386caf58800029
SHA17a2cf540214633cc55f0ac9527832b1da9776a92
SHA2566ed8c76c56591c552671f7a905b9ee9fe1331144aaf42873a551fcbec5d4d18a
SHA512f6c6dcf0d2f4ec1659721eac4e1ce0b2ca57bd9059b5b0ddeb85175ed6ceb4ddc24066b3dbba6175ac0febb5ae113c3039203834809c7e114e887dd7ddd8658b
-
Filesize
222KB
MD57a0ee5aa6aff36f538386caf58800029
SHA17a2cf540214633cc55f0ac9527832b1da9776a92
SHA2566ed8c76c56591c552671f7a905b9ee9fe1331144aaf42873a551fcbec5d4d18a
SHA512f6c6dcf0d2f4ec1659721eac4e1ce0b2ca57bd9059b5b0ddeb85175ed6ceb4ddc24066b3dbba6175ac0febb5ae113c3039203834809c7e114e887dd7ddd8658b