Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2023, 11:09

General

  • Target

    NEAS.d7a62716cfc0d13ece446561ca096e50_JC.exe

  • Size

    1.1MB

  • MD5

    d7a62716cfc0d13ece446561ca096e50

  • SHA1

    b0a3f81df6d4b6354c29716d810a2de43e8d8f1d

  • SHA256

    85028bedd5881d5a0dfef42d52a42f5cd417607f1e71e1644f4c7a9a2f46b58c

  • SHA512

    2aa5580e65c5efd2931fa4c5fca7ff1561e92e96ac6086ec07c135bc2ab240b5c6ae78d17b65f8590d3adb7fe3869b76659a3c5aa9fca87578dd9d427124b27b

  • SSDEEP

    24576:Vy5b2dOXc8lr7PPrmAUlZ8RVOgAqbwDNSHUadYinNF:w5CWc8lr7OZuVOR8HUkY

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.d7a62716cfc0d13ece446561ca096e50_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.d7a62716cfc0d13ece446561ca096e50_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UN2Mn8cF.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UN2Mn8cF.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN7eO3PS.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN7eO3PS.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:232
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Yp60SL5.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Yp60SL5.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1272
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:3668
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 540
                6⤵
                • Program crash
                PID:4420
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2lf993oa.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2lf993oa.exe
            4⤵
            • Executes dropped EXE
            PID:1236
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3668 -ip 3668
      1⤵
        PID:3804

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UN2Mn8cF.exe

        Filesize

        758KB

        MD5

        5dae66c168cccd23b6b060ddfd3b6170

        SHA1

        49c18f6523134da0c21b413940e0721abf8ca258

        SHA256

        586d3d384e58bae74f8eb9bb68c36d3d5aec1f4cb3a041a39b84a4a9b895c396

        SHA512

        ded86ee173202eecf70546740c60daf2c4e5e198f327bf7def281fe08ef194ec4e91650528c272966c95c99b3bc2f3b097dcd042dd43f0be537aa3a4f5a13786

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UN2Mn8cF.exe

        Filesize

        758KB

        MD5

        5dae66c168cccd23b6b060ddfd3b6170

        SHA1

        49c18f6523134da0c21b413940e0721abf8ca258

        SHA256

        586d3d384e58bae74f8eb9bb68c36d3d5aec1f4cb3a041a39b84a4a9b895c396

        SHA512

        ded86ee173202eecf70546740c60daf2c4e5e198f327bf7def281fe08ef194ec4e91650528c272966c95c99b3bc2f3b097dcd042dd43f0be537aa3a4f5a13786

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN7eO3PS.exe

        Filesize

        561KB

        MD5

        b7f8bb5aa9cf132c523d66c2f4f27c83

        SHA1

        eb2432c54c52eccc0842e3ed2172d535155804c3

        SHA256

        795e5b22ec095c3f6be5c60a12607b59c7469eb381d3d333fb5f0acf7682b45a

        SHA512

        f1ba84250d2772f5fc889950a82150d5f75277536dc05a575f6ba7c18d1c0ad934f7c7c76c2b62ec2112712d47096114d0dc1bbf5e779adde3154d7ddc2eca47

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\IN7eO3PS.exe

        Filesize

        561KB

        MD5

        b7f8bb5aa9cf132c523d66c2f4f27c83

        SHA1

        eb2432c54c52eccc0842e3ed2172d535155804c3

        SHA256

        795e5b22ec095c3f6be5c60a12607b59c7469eb381d3d333fb5f0acf7682b45a

        SHA512

        f1ba84250d2772f5fc889950a82150d5f75277536dc05a575f6ba7c18d1c0ad934f7c7c76c2b62ec2112712d47096114d0dc1bbf5e779adde3154d7ddc2eca47

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Yp60SL5.exe

        Filesize

        1.1MB

        MD5

        4ae379f98f52003479e3e5a2b1d9ac2c

        SHA1

        0117d68e2e3409951f7bcd6d93949925b014b363

        SHA256

        7a2b4a06124b689c680d5ecd05502fa430b5eb96d2e0f84fc8b930ed0ac842c9

        SHA512

        31afe94aad244b9f48bc7026103d6687831223a7d478a71019145def21335fc1cd2278b0ffa9408afeeb48a4887762b2ecd290fe2eecb4101245aa077cc5d952

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Yp60SL5.exe

        Filesize

        1.1MB

        MD5

        4ae379f98f52003479e3e5a2b1d9ac2c

        SHA1

        0117d68e2e3409951f7bcd6d93949925b014b363

        SHA256

        7a2b4a06124b689c680d5ecd05502fa430b5eb96d2e0f84fc8b930ed0ac842c9

        SHA512

        31afe94aad244b9f48bc7026103d6687831223a7d478a71019145def21335fc1cd2278b0ffa9408afeeb48a4887762b2ecd290fe2eecb4101245aa077cc5d952

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2lf993oa.exe

        Filesize

        222KB

        MD5

        8922842512fedb5985d9f90ccb39b310

        SHA1

        6d8126223599dc5de0ba27d8a339ad247664c375

        SHA256

        f5ace2ff24caffb10737ad24e9152763253750064cf9cb75e1a47c9251a4dbf0

        SHA512

        c3b351a1445808f8729b8fec2d19933caaa1db483e11caf56cd5253c84dad603c88fc4ee31d40984f68389bdb0e6a96b523ba14eee96204fc12df237d5ef7df6

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2lf993oa.exe

        Filesize

        222KB

        MD5

        8922842512fedb5985d9f90ccb39b310

        SHA1

        6d8126223599dc5de0ba27d8a339ad247664c375

        SHA256

        f5ace2ff24caffb10737ad24e9152763253750064cf9cb75e1a47c9251a4dbf0

        SHA512

        c3b351a1445808f8729b8fec2d19933caaa1db483e11caf56cd5253c84dad603c88fc4ee31d40984f68389bdb0e6a96b523ba14eee96204fc12df237d5ef7df6

      • memory/1236-35-0x0000000008240000-0x0000000008858000-memory.dmp

        Filesize

        6.1MB

      • memory/1236-34-0x0000000007240000-0x000000000724A000-memory.dmp

        Filesize

        40KB

      • memory/1236-41-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/1236-40-0x00000000744C0000-0x0000000074C70000-memory.dmp

        Filesize

        7.7MB

      • memory/1236-29-0x0000000000280000-0x00000000002BE000-memory.dmp

        Filesize

        248KB

      • memory/1236-30-0x00000000744C0000-0x0000000074C70000-memory.dmp

        Filesize

        7.7MB

      • memory/1236-31-0x0000000007670000-0x0000000007C14000-memory.dmp

        Filesize

        5.6MB

      • memory/1236-32-0x0000000007160000-0x00000000071F2000-memory.dmp

        Filesize

        584KB

      • memory/1236-33-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/1236-39-0x0000000007600000-0x000000000764C000-memory.dmp

        Filesize

        304KB

      • memory/1236-38-0x0000000007480000-0x00000000074BC000-memory.dmp

        Filesize

        240KB

      • memory/1236-36-0x00000000074F0000-0x00000000075FA000-memory.dmp

        Filesize

        1.0MB

      • memory/1236-37-0x0000000007420000-0x0000000007432000-memory.dmp

        Filesize

        72KB

      • memory/3668-21-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3668-25-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3668-22-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/3668-23-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB