Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    291s
  • max time network
    310s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2023, 04:02

General

  • Target

    2a2d52a4b2b0e2b45ad671e6ce69ef23f63ebe3e772b50d1e0bca1424a483713.exe

  • Size

    1.5MB

  • MD5

    6bcbbf831380a47e6d269bb02befe194

  • SHA1

    55a5c0863c3cc9297050bfb0bbe3a01ef90c4791

  • SHA256

    2a2d52a4b2b0e2b45ad671e6ce69ef23f63ebe3e772b50d1e0bca1424a483713

  • SHA512

    9ba12760780a93cddd7eb8de17f2330173b77415bb3c8f48a729ec98ecd7d44ad30c44173b5a4d8eddbae27ffae14f3e93b83fe185ef4ea5516644a46d58e057

  • SSDEEP

    24576:0yP5r8rnF0TvAZ9Em95WAZuP+c7qpeZQJGumxmy6QiraZkfWAwkw1il:DP5rQC4Ymz/Xv9mxG1ra+fZdw

Malware Config

Extracted

Family

redline

Botnet

kedru

C2

77.91.124.86:19084

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a2d52a4b2b0e2b45ad671e6ce69ef23f63ebe3e772b50d1e0bca1424a483713.exe
    "C:\Users\Admin\AppData\Local\Temp\2a2d52a4b2b0e2b45ad671e6ce69ef23f63ebe3e772b50d1e0bca1424a483713.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rb4Nx8gO.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rb4Nx8gO.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EP1ij1Md.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EP1ij1Md.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zw3sp5uY.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zw3sp5uY.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Fe1DF1tc.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Fe1DF1tc.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2716
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1wY65uE6.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1wY65uE6.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2824
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2664
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 268
                  8⤵
                  • Program crash
                  PID:2536
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2vY140cR.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2vY140cR.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rb4Nx8gO.exe

    Filesize

    1.3MB

    MD5

    35c750dbd462c3c640e07a9fba96f565

    SHA1

    f92271b03962710b986e69fc17a12ff1472f4061

    SHA256

    6816e61fb973c4029602bc56232e9a32263b88822f341415401890f11d66b0ad

    SHA512

    0230ccd3685ab093ca510131d99d57ea18a4595e15c2352809d8d0a9447401d3b375c9e6d0daa0f46c32d8fea26aa61acc8955dfcae313e6558efe39af585842

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Rb4Nx8gO.exe

    Filesize

    1.3MB

    MD5

    35c750dbd462c3c640e07a9fba96f565

    SHA1

    f92271b03962710b986e69fc17a12ff1472f4061

    SHA256

    6816e61fb973c4029602bc56232e9a32263b88822f341415401890f11d66b0ad

    SHA512

    0230ccd3685ab093ca510131d99d57ea18a4595e15c2352809d8d0a9447401d3b375c9e6d0daa0f46c32d8fea26aa61acc8955dfcae313e6558efe39af585842

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EP1ij1Md.exe

    Filesize

    1.1MB

    MD5

    ac3135ce03ca577a689cfffb88d3cb88

    SHA1

    24659d716defc7089d92116e3fdbf94086008bb5

    SHA256

    8c85e17daf8ee592437c405cba5187636a7374bc73a74c8950b1b42d0e583a20

    SHA512

    f6e76aa76277c721c8878df126bf13a39f129d5af398e5e16a98eadec2beb46b92eec5866ee61780c3b06441cac7e57bc7e83c3f71d1be0ce0637426a7bdcf22

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\EP1ij1Md.exe

    Filesize

    1.1MB

    MD5

    ac3135ce03ca577a689cfffb88d3cb88

    SHA1

    24659d716defc7089d92116e3fdbf94086008bb5

    SHA256

    8c85e17daf8ee592437c405cba5187636a7374bc73a74c8950b1b42d0e583a20

    SHA512

    f6e76aa76277c721c8878df126bf13a39f129d5af398e5e16a98eadec2beb46b92eec5866ee61780c3b06441cac7e57bc7e83c3f71d1be0ce0637426a7bdcf22

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zw3sp5uY.exe

    Filesize

    753KB

    MD5

    ab848404044669ebe592f908a2c1f838

    SHA1

    dd623ac23f219050a851f8dedab168b4ce9211fe

    SHA256

    00d1c27ac249cb2d6208f865ec191cc8bbe179308abd49510fb4d3a1644d256c

    SHA512

    b9dce73fc865838f885f79a4ca447888cf7379f6e8e7e225437d10eb6ebe8baca206e08fcdfeda7806bc6b69f72e5daa4ad54e45f03f08457ec516009d8a4411

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zw3sp5uY.exe

    Filesize

    753KB

    MD5

    ab848404044669ebe592f908a2c1f838

    SHA1

    dd623ac23f219050a851f8dedab168b4ce9211fe

    SHA256

    00d1c27ac249cb2d6208f865ec191cc8bbe179308abd49510fb4d3a1644d256c

    SHA512

    b9dce73fc865838f885f79a4ca447888cf7379f6e8e7e225437d10eb6ebe8baca206e08fcdfeda7806bc6b69f72e5daa4ad54e45f03f08457ec516009d8a4411

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Fe1DF1tc.exe

    Filesize

    558KB

    MD5

    202b12fd8aa334b14cf48b7c54d82e91

    SHA1

    33ff3acd954ad9566f70213540c2fbdd966d968c

    SHA256

    b4b880882739be916596ef4c7c8fc8d5c9ee05359c7eddea75531ae914c8f158

    SHA512

    a5c08192eba535085b39058b66fc3bf981898d381db431707633539ed60324f44f5cecc9719894f38a9327ef34befdca89e932f993ee781657c141476395f4ef

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Fe1DF1tc.exe

    Filesize

    558KB

    MD5

    202b12fd8aa334b14cf48b7c54d82e91

    SHA1

    33ff3acd954ad9566f70213540c2fbdd966d968c

    SHA256

    b4b880882739be916596ef4c7c8fc8d5c9ee05359c7eddea75531ae914c8f158

    SHA512

    a5c08192eba535085b39058b66fc3bf981898d381db431707633539ed60324f44f5cecc9719894f38a9327ef34befdca89e932f993ee781657c141476395f4ef

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1wY65uE6.exe

    Filesize

    1.0MB

    MD5

    ccc96ab285d6c44ab2c0e00b6db08858

    SHA1

    1caa1595ea5169962b7d875cc568835c4bba1d31

    SHA256

    d877a57fa56f63a72c36b52086577c1884db8af261820b1a71aeb43cbc7eef30

    SHA512

    1eafde3703ceb3a051eba1248266c81c86cf457083bcd6b469fcbc0a1d3a2bc8b029fe2ae6b423a8a197d1774c8bf78bf1ced00376bed032cfe0bb08db784268

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1wY65uE6.exe

    Filesize

    1.0MB

    MD5

    ccc96ab285d6c44ab2c0e00b6db08858

    SHA1

    1caa1595ea5169962b7d875cc568835c4bba1d31

    SHA256

    d877a57fa56f63a72c36b52086577c1884db8af261820b1a71aeb43cbc7eef30

    SHA512

    1eafde3703ceb3a051eba1248266c81c86cf457083bcd6b469fcbc0a1d3a2bc8b029fe2ae6b423a8a197d1774c8bf78bf1ced00376bed032cfe0bb08db784268

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1wY65uE6.exe

    Filesize

    1.0MB

    MD5

    ccc96ab285d6c44ab2c0e00b6db08858

    SHA1

    1caa1595ea5169962b7d875cc568835c4bba1d31

    SHA256

    d877a57fa56f63a72c36b52086577c1884db8af261820b1a71aeb43cbc7eef30

    SHA512

    1eafde3703ceb3a051eba1248266c81c86cf457083bcd6b469fcbc0a1d3a2bc8b029fe2ae6b423a8a197d1774c8bf78bf1ced00376bed032cfe0bb08db784268

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2vY140cR.exe

    Filesize

    219KB

    MD5

    8fbcefe5e0ab6540381148d7e63ed70a

    SHA1

    4bb34d487923f3fd0e54daa33ba22945c5dceb87

    SHA256

    1b15a222383706636228923f325ae47228021934f7a80433417a474e31e45467

    SHA512

    55b39938c347f50cefc7b009c8032cee6fe782e5d329ee2fd868452e452c1f30fc1fe056ea435b74a4e9369a79503587f5cd4b22914c370475386bfd77065eeb

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2vY140cR.exe

    Filesize

    219KB

    MD5

    8fbcefe5e0ab6540381148d7e63ed70a

    SHA1

    4bb34d487923f3fd0e54daa33ba22945c5dceb87

    SHA256

    1b15a222383706636228923f325ae47228021934f7a80433417a474e31e45467

    SHA512

    55b39938c347f50cefc7b009c8032cee6fe782e5d329ee2fd868452e452c1f30fc1fe056ea435b74a4e9369a79503587f5cd4b22914c370475386bfd77065eeb

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Rb4Nx8gO.exe

    Filesize

    1.3MB

    MD5

    35c750dbd462c3c640e07a9fba96f565

    SHA1

    f92271b03962710b986e69fc17a12ff1472f4061

    SHA256

    6816e61fb973c4029602bc56232e9a32263b88822f341415401890f11d66b0ad

    SHA512

    0230ccd3685ab093ca510131d99d57ea18a4595e15c2352809d8d0a9447401d3b375c9e6d0daa0f46c32d8fea26aa61acc8955dfcae313e6558efe39af585842

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Rb4Nx8gO.exe

    Filesize

    1.3MB

    MD5

    35c750dbd462c3c640e07a9fba96f565

    SHA1

    f92271b03962710b986e69fc17a12ff1472f4061

    SHA256

    6816e61fb973c4029602bc56232e9a32263b88822f341415401890f11d66b0ad

    SHA512

    0230ccd3685ab093ca510131d99d57ea18a4595e15c2352809d8d0a9447401d3b375c9e6d0daa0f46c32d8fea26aa61acc8955dfcae313e6558efe39af585842

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\EP1ij1Md.exe

    Filesize

    1.1MB

    MD5

    ac3135ce03ca577a689cfffb88d3cb88

    SHA1

    24659d716defc7089d92116e3fdbf94086008bb5

    SHA256

    8c85e17daf8ee592437c405cba5187636a7374bc73a74c8950b1b42d0e583a20

    SHA512

    f6e76aa76277c721c8878df126bf13a39f129d5af398e5e16a98eadec2beb46b92eec5866ee61780c3b06441cac7e57bc7e83c3f71d1be0ce0637426a7bdcf22

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\EP1ij1Md.exe

    Filesize

    1.1MB

    MD5

    ac3135ce03ca577a689cfffb88d3cb88

    SHA1

    24659d716defc7089d92116e3fdbf94086008bb5

    SHA256

    8c85e17daf8ee592437c405cba5187636a7374bc73a74c8950b1b42d0e583a20

    SHA512

    f6e76aa76277c721c8878df126bf13a39f129d5af398e5e16a98eadec2beb46b92eec5866ee61780c3b06441cac7e57bc7e83c3f71d1be0ce0637426a7bdcf22

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\zw3sp5uY.exe

    Filesize

    753KB

    MD5

    ab848404044669ebe592f908a2c1f838

    SHA1

    dd623ac23f219050a851f8dedab168b4ce9211fe

    SHA256

    00d1c27ac249cb2d6208f865ec191cc8bbe179308abd49510fb4d3a1644d256c

    SHA512

    b9dce73fc865838f885f79a4ca447888cf7379f6e8e7e225437d10eb6ebe8baca206e08fcdfeda7806bc6b69f72e5daa4ad54e45f03f08457ec516009d8a4411

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\zw3sp5uY.exe

    Filesize

    753KB

    MD5

    ab848404044669ebe592f908a2c1f838

    SHA1

    dd623ac23f219050a851f8dedab168b4ce9211fe

    SHA256

    00d1c27ac249cb2d6208f865ec191cc8bbe179308abd49510fb4d3a1644d256c

    SHA512

    b9dce73fc865838f885f79a4ca447888cf7379f6e8e7e225437d10eb6ebe8baca206e08fcdfeda7806bc6b69f72e5daa4ad54e45f03f08457ec516009d8a4411

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\Fe1DF1tc.exe

    Filesize

    558KB

    MD5

    202b12fd8aa334b14cf48b7c54d82e91

    SHA1

    33ff3acd954ad9566f70213540c2fbdd966d968c

    SHA256

    b4b880882739be916596ef4c7c8fc8d5c9ee05359c7eddea75531ae914c8f158

    SHA512

    a5c08192eba535085b39058b66fc3bf981898d381db431707633539ed60324f44f5cecc9719894f38a9327ef34befdca89e932f993ee781657c141476395f4ef

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\Fe1DF1tc.exe

    Filesize

    558KB

    MD5

    202b12fd8aa334b14cf48b7c54d82e91

    SHA1

    33ff3acd954ad9566f70213540c2fbdd966d968c

    SHA256

    b4b880882739be916596ef4c7c8fc8d5c9ee05359c7eddea75531ae914c8f158

    SHA512

    a5c08192eba535085b39058b66fc3bf981898d381db431707633539ed60324f44f5cecc9719894f38a9327ef34befdca89e932f993ee781657c141476395f4ef

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1wY65uE6.exe

    Filesize

    1.0MB

    MD5

    ccc96ab285d6c44ab2c0e00b6db08858

    SHA1

    1caa1595ea5169962b7d875cc568835c4bba1d31

    SHA256

    d877a57fa56f63a72c36b52086577c1884db8af261820b1a71aeb43cbc7eef30

    SHA512

    1eafde3703ceb3a051eba1248266c81c86cf457083bcd6b469fcbc0a1d3a2bc8b029fe2ae6b423a8a197d1774c8bf78bf1ced00376bed032cfe0bb08db784268

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1wY65uE6.exe

    Filesize

    1.0MB

    MD5

    ccc96ab285d6c44ab2c0e00b6db08858

    SHA1

    1caa1595ea5169962b7d875cc568835c4bba1d31

    SHA256

    d877a57fa56f63a72c36b52086577c1884db8af261820b1a71aeb43cbc7eef30

    SHA512

    1eafde3703ceb3a051eba1248266c81c86cf457083bcd6b469fcbc0a1d3a2bc8b029fe2ae6b423a8a197d1774c8bf78bf1ced00376bed032cfe0bb08db784268

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1wY65uE6.exe

    Filesize

    1.0MB

    MD5

    ccc96ab285d6c44ab2c0e00b6db08858

    SHA1

    1caa1595ea5169962b7d875cc568835c4bba1d31

    SHA256

    d877a57fa56f63a72c36b52086577c1884db8af261820b1a71aeb43cbc7eef30

    SHA512

    1eafde3703ceb3a051eba1248266c81c86cf457083bcd6b469fcbc0a1d3a2bc8b029fe2ae6b423a8a197d1774c8bf78bf1ced00376bed032cfe0bb08db784268

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\2vY140cR.exe

    Filesize

    219KB

    MD5

    8fbcefe5e0ab6540381148d7e63ed70a

    SHA1

    4bb34d487923f3fd0e54daa33ba22945c5dceb87

    SHA256

    1b15a222383706636228923f325ae47228021934f7a80433417a474e31e45467

    SHA512

    55b39938c347f50cefc7b009c8032cee6fe782e5d329ee2fd868452e452c1f30fc1fe056ea435b74a4e9369a79503587f5cd4b22914c370475386bfd77065eeb

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\2vY140cR.exe

    Filesize

    219KB

    MD5

    8fbcefe5e0ab6540381148d7e63ed70a

    SHA1

    4bb34d487923f3fd0e54daa33ba22945c5dceb87

    SHA256

    1b15a222383706636228923f325ae47228021934f7a80433417a474e31e45467

    SHA512

    55b39938c347f50cefc7b009c8032cee6fe782e5d329ee2fd868452e452c1f30fc1fe056ea435b74a4e9369a79503587f5cd4b22914c370475386bfd77065eeb

  • memory/2504-72-0x0000000000F50000-0x0000000000F8C000-memory.dmp

    Filesize

    240KB

  • memory/2664-54-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-60-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2664-61-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-63-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-57-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-58-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-59-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-71-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-53-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2664-55-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB