Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
13/11/2023, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe
Resource
win10v2004-20231020-en
General
-
Target
26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe
-
Size
1.3MB
-
MD5
b3db26e05fef02e0d0e5ef1de7a4b57b
-
SHA1
b77605380920624d2fc77c934c5c148abfe5e580
-
SHA256
26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29
-
SHA512
ab5fc82d966fb6153b73aa5da2551a54d4361106710660abcf4de8a9b5f8f9b4d214bf43e74c2111053fa73c08bc024cc7819b73b32eca6543c2a42492218fff
-
SSDEEP
24576:Hy275jdzF5b0xaSXKjri9m5yLMGk+I+oqB0/uZsixC0:S275jdznb0xPXKjv5ygGDBW41
Malware Config
Extracted
redline
taiga
5.42.92.51:19057
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral1/memory/4352-21-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4352-22-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4352-23-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral1/memory/4352-25-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/4372-29-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 3468 wM3nd38.exe 4696 UC3oW97.exe 3040 11jv1321.exe 928 12TF065.exe 4416 13QY411.exe 4544 14Gl663.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" wM3nd38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" UC3oW97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3040 set thread context of 4352 3040 11jv1321.exe 100 PID 928 set thread context of 4372 928 12TF065.exe 110 PID 4416 set thread context of 3516 4416 13QY411.exe 115 PID 4544 set thread context of 5016 4544 14Gl663.exe 121 -
Program crash 1 IoCs
pid pid_target Process procid_target 3376 4352 WerFault.exe 100 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3516 AppLaunch.exe 3516 AppLaunch.exe 5016 AppLaunch.exe 5016 AppLaunch.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 4580 wrote to memory of 3468 4580 26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe 88 PID 4580 wrote to memory of 3468 4580 26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe 88 PID 4580 wrote to memory of 3468 4580 26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe 88 PID 3468 wrote to memory of 4696 3468 wM3nd38.exe 90 PID 3468 wrote to memory of 4696 3468 wM3nd38.exe 90 PID 3468 wrote to memory of 4696 3468 wM3nd38.exe 90 PID 4696 wrote to memory of 3040 4696 UC3oW97.exe 91 PID 4696 wrote to memory of 3040 4696 UC3oW97.exe 91 PID 4696 wrote to memory of 3040 4696 UC3oW97.exe 91 PID 3040 wrote to memory of 4352 3040 11jv1321.exe 100 PID 3040 wrote to memory of 4352 3040 11jv1321.exe 100 PID 3040 wrote to memory of 4352 3040 11jv1321.exe 100 PID 3040 wrote to memory of 4352 3040 11jv1321.exe 100 PID 3040 wrote to memory of 4352 3040 11jv1321.exe 100 PID 3040 wrote to memory of 4352 3040 11jv1321.exe 100 PID 3040 wrote to memory of 4352 3040 11jv1321.exe 100 PID 3040 wrote to memory of 4352 3040 11jv1321.exe 100 PID 3040 wrote to memory of 4352 3040 11jv1321.exe 100 PID 3040 wrote to memory of 4352 3040 11jv1321.exe 100 PID 4696 wrote to memory of 928 4696 UC3oW97.exe 101 PID 4696 wrote to memory of 928 4696 UC3oW97.exe 101 PID 4696 wrote to memory of 928 4696 UC3oW97.exe 101 PID 928 wrote to memory of 4372 928 12TF065.exe 110 PID 928 wrote to memory of 4372 928 12TF065.exe 110 PID 928 wrote to memory of 4372 928 12TF065.exe 110 PID 928 wrote to memory of 4372 928 12TF065.exe 110 PID 928 wrote to memory of 4372 928 12TF065.exe 110 PID 928 wrote to memory of 4372 928 12TF065.exe 110 PID 928 wrote to memory of 4372 928 12TF065.exe 110 PID 928 wrote to memory of 4372 928 12TF065.exe 110 PID 3468 wrote to memory of 4416 3468 wM3nd38.exe 111 PID 3468 wrote to memory of 4416 3468 wM3nd38.exe 111 PID 3468 wrote to memory of 4416 3468 wM3nd38.exe 111 PID 4416 wrote to memory of 3516 4416 13QY411.exe 115 PID 4416 wrote to memory of 3516 4416 13QY411.exe 115 PID 4416 wrote to memory of 3516 4416 13QY411.exe 115 PID 4416 wrote to memory of 3516 4416 13QY411.exe 115 PID 4416 wrote to memory of 3516 4416 13QY411.exe 115 PID 4416 wrote to memory of 3516 4416 13QY411.exe 115 PID 4416 wrote to memory of 3516 4416 13QY411.exe 115 PID 4416 wrote to memory of 3516 4416 13QY411.exe 115 PID 4416 wrote to memory of 3516 4416 13QY411.exe 115 PID 4580 wrote to memory of 4544 4580 26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe 116 PID 4580 wrote to memory of 4544 4580 26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe 116 PID 4580 wrote to memory of 4544 4580 26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe 116 PID 4544 wrote to memory of 3364 4544 14Gl663.exe 119 PID 4544 wrote to memory of 3364 4544 14Gl663.exe 119 PID 4544 wrote to memory of 3364 4544 14Gl663.exe 119 PID 4544 wrote to memory of 4204 4544 14Gl663.exe 120 PID 4544 wrote to memory of 4204 4544 14Gl663.exe 120 PID 4544 wrote to memory of 4204 4544 14Gl663.exe 120 PID 4544 wrote to memory of 5016 4544 14Gl663.exe 121 PID 4544 wrote to memory of 5016 4544 14Gl663.exe 121 PID 4544 wrote to memory of 5016 4544 14Gl663.exe 121 PID 4544 wrote to memory of 5016 4544 14Gl663.exe 121 PID 4544 wrote to memory of 5016 4544 14Gl663.exe 121 PID 4544 wrote to memory of 5016 4544 14Gl663.exe 121 PID 4544 wrote to memory of 5016 4544 14Gl663.exe 121 PID 4544 wrote to memory of 5016 4544 14Gl663.exe 121 PID 4544 wrote to memory of 5016 4544 14Gl663.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe"C:\Users\Admin\AppData\Local\Temp\26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wM3nd38.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wM3nd38.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UC3oW97.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UC3oW97.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11jv1321.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11jv1321.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 5406⤵
- Program crash
PID:3376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12TF065.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12TF065.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:4372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13QY411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13QY411.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\14Gl663.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\14Gl663.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3364
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:4204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4352 -ip 43521⤵PID:2408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717KB
MD5d872e06779eb542dc531f143d757f5f0
SHA157b4a8d11a4d6dc57263c95f2e46186c4715af14
SHA25693189c07b80184b4bb16b3d29529e23a9504086df8b383b23792a788c05443ce
SHA512a622c8743a895f59da1e67aeee1e74e28e78dc9f4f3a9c6e712334cfdcf718831bed4d6529cc80194dbb469fc598933a3ef5d2dee9176eaca6fef3b62b3e9a79
-
Filesize
717KB
MD5d872e06779eb542dc531f143d757f5f0
SHA157b4a8d11a4d6dc57263c95f2e46186c4715af14
SHA25693189c07b80184b4bb16b3d29529e23a9504086df8b383b23792a788c05443ce
SHA512a622c8743a895f59da1e67aeee1e74e28e78dc9f4f3a9c6e712334cfdcf718831bed4d6529cc80194dbb469fc598933a3ef5d2dee9176eaca6fef3b62b3e9a79
-
Filesize
887KB
MD59e915fe8fab64f07bb08f180f021dbf1
SHA133d8f835999f38940d9e581d23400c76a30e8e3a
SHA2564108fb1a2ee688b7238db574061c1c3ed1e37f1b86458d8449147e5dcce305f3
SHA512d5291ac8a73d67620db84aec3e8581855d770647e03c4f562e4a034f7932dc9b42dd3b8fb3a90f9ccfcb0870be81fabd10f3371eab1633b7188ba5f145b339c7
-
Filesize
887KB
MD59e915fe8fab64f07bb08f180f021dbf1
SHA133d8f835999f38940d9e581d23400c76a30e8e3a
SHA2564108fb1a2ee688b7238db574061c1c3ed1e37f1b86458d8449147e5dcce305f3
SHA512d5291ac8a73d67620db84aec3e8581855d770647e03c4f562e4a034f7932dc9b42dd3b8fb3a90f9ccfcb0870be81fabd10f3371eab1633b7188ba5f145b339c7
-
Filesize
717KB
MD586f55f861842d4b49d6682c0aca9e18a
SHA15eb32c1c4b3e2d864ad7f2e2a4d6423146201de0
SHA2564dc6470be1dc4576ea28a42b2cbe28356a6324c3f0b2baaea62a28398110f502
SHA5127c07776ca641b664006de478ecdd42e7267941635a54fa4eda098b70e1c3b5e1898a3da115149c3524ff3d773b393043947cf2e8a9d0f28d54e0b91dc42979fa
-
Filesize
717KB
MD586f55f861842d4b49d6682c0aca9e18a
SHA15eb32c1c4b3e2d864ad7f2e2a4d6423146201de0
SHA2564dc6470be1dc4576ea28a42b2cbe28356a6324c3f0b2baaea62a28398110f502
SHA5127c07776ca641b664006de478ecdd42e7267941635a54fa4eda098b70e1c3b5e1898a3da115149c3524ff3d773b393043947cf2e8a9d0f28d54e0b91dc42979fa
-
Filesize
426KB
MD548e3fa5fce706dc39f409fcb8ea7e667
SHA1ce46b3d492eea9b4259d1c199e3064647639aad2
SHA256c0c5a01d857fd709d3634ccabfd8501a39beb01ca38cd7b62851a76d18b255ab
SHA512a9e50fc97bcb56612924cf932278e0265ebea76ee668cc053a2ce6077918220b322d2820d7d5facb7c9286bd5fbd4c1bbdffbbe95548d2ab40607c572ec264ea
-
Filesize
426KB
MD548e3fa5fce706dc39f409fcb8ea7e667
SHA1ce46b3d492eea9b4259d1c199e3064647639aad2
SHA256c0c5a01d857fd709d3634ccabfd8501a39beb01ca38cd7b62851a76d18b255ab
SHA512a9e50fc97bcb56612924cf932278e0265ebea76ee668cc053a2ce6077918220b322d2820d7d5facb7c9286bd5fbd4c1bbdffbbe95548d2ab40607c572ec264ea
-
Filesize
369KB
MD58174d8aefd3eb8f9fc338d3ed132ae4b
SHA10c4f6df4bb3eae1cbb75bbe41c87e86bde5b22bf
SHA256331265cc84a3c4459837b94e79bf0e069456a4dd24b805b2461e35597fab7364
SHA512ef3c83c720a61b97a8cb9f19939f5afa8e4acbf6d3acd007d53cecf1b09f32df249ad7ee6d81fdabfb3943bd1091db08d5a84373a5ea0d0b2ab378b13e3a1f22
-
Filesize
369KB
MD58174d8aefd3eb8f9fc338d3ed132ae4b
SHA10c4f6df4bb3eae1cbb75bbe41c87e86bde5b22bf
SHA256331265cc84a3c4459837b94e79bf0e069456a4dd24b805b2461e35597fab7364
SHA512ef3c83c720a61b97a8cb9f19939f5afa8e4acbf6d3acd007d53cecf1b09f32df249ad7ee6d81fdabfb3943bd1091db08d5a84373a5ea0d0b2ab378b13e3a1f22
-
Filesize
408KB
MD5aaa9a35f1c4da30de4c80c55416abf42
SHA13381966a4bd51dd2e20ca14e8eda5c18aa3c7009
SHA2566d4228592cf5d620973b74d16aff3286e9a465a947d5870b32be851b5debcc18
SHA5129a3d576928ed9ad40c284816f99f724e8d927bdd334d97cdc4d1baf18fbc52e4ced5be6c50133759809fc5e8a03bb46193fd5630bd0bbd87063de553ab4d425f
-
Filesize
408KB
MD5aaa9a35f1c4da30de4c80c55416abf42
SHA13381966a4bd51dd2e20ca14e8eda5c18aa3c7009
SHA2566d4228592cf5d620973b74d16aff3286e9a465a947d5870b32be851b5debcc18
SHA5129a3d576928ed9ad40c284816f99f724e8d927bdd334d97cdc4d1baf18fbc52e4ced5be6c50133759809fc5e8a03bb46193fd5630bd0bbd87063de553ab4d425f