Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2023, 18:49

General

  • Target

    26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe

  • Size

    1.3MB

  • MD5

    b3db26e05fef02e0d0e5ef1de7a4b57b

  • SHA1

    b77605380920624d2fc77c934c5c148abfe5e580

  • SHA256

    26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29

  • SHA512

    ab5fc82d966fb6153b73aa5da2551a54d4361106710660abcf4de8a9b5f8f9b4d214bf43e74c2111053fa73c08bc024cc7819b73b32eca6543c2a42492218fff

  • SSDEEP

    24576:Hy275jdzF5b0xaSXKjri9m5yLMGk+I+oqB0/uZsixC0:S275jdznb0xPXKjv5ygGDBW41

Malware Config

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Signatures

  • Detect Mystic stealer payload 4 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe
    "C:\Users\Admin\AppData\Local\Temp\26d425ac5b0310375e561eff55da1a9fb8c8a3b1cb826364fbe657d9d408bf29.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wM3nd38.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wM3nd38.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UC3oW97.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UC3oW97.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4696
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11jv1321.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11jv1321.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3040
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
              PID:4352
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 540
                6⤵
                • Program crash
                PID:3376
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12TF065.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12TF065.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:928
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:4372
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13QY411.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13QY411.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4416
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3516
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\14Gl663.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\14Gl663.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4544
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:3364
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              3⤵
                PID:4204
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:5016
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4352 -ip 4352
            1⤵
              PID:2408

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\14Gl663.exe

              Filesize

              717KB

              MD5

              d872e06779eb542dc531f143d757f5f0

              SHA1

              57b4a8d11a4d6dc57263c95f2e46186c4715af14

              SHA256

              93189c07b80184b4bb16b3d29529e23a9504086df8b383b23792a788c05443ce

              SHA512

              a622c8743a895f59da1e67aeee1e74e28e78dc9f4f3a9c6e712334cfdcf718831bed4d6529cc80194dbb469fc598933a3ef5d2dee9176eaca6fef3b62b3e9a79

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\14Gl663.exe

              Filesize

              717KB

              MD5

              d872e06779eb542dc531f143d757f5f0

              SHA1

              57b4a8d11a4d6dc57263c95f2e46186c4715af14

              SHA256

              93189c07b80184b4bb16b3d29529e23a9504086df8b383b23792a788c05443ce

              SHA512

              a622c8743a895f59da1e67aeee1e74e28e78dc9f4f3a9c6e712334cfdcf718831bed4d6529cc80194dbb469fc598933a3ef5d2dee9176eaca6fef3b62b3e9a79

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wM3nd38.exe

              Filesize

              887KB

              MD5

              9e915fe8fab64f07bb08f180f021dbf1

              SHA1

              33d8f835999f38940d9e581d23400c76a30e8e3a

              SHA256

              4108fb1a2ee688b7238db574061c1c3ed1e37f1b86458d8449147e5dcce305f3

              SHA512

              d5291ac8a73d67620db84aec3e8581855d770647e03c4f562e4a034f7932dc9b42dd3b8fb3a90f9ccfcb0870be81fabd10f3371eab1633b7188ba5f145b339c7

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wM3nd38.exe

              Filesize

              887KB

              MD5

              9e915fe8fab64f07bb08f180f021dbf1

              SHA1

              33d8f835999f38940d9e581d23400c76a30e8e3a

              SHA256

              4108fb1a2ee688b7238db574061c1c3ed1e37f1b86458d8449147e5dcce305f3

              SHA512

              d5291ac8a73d67620db84aec3e8581855d770647e03c4f562e4a034f7932dc9b42dd3b8fb3a90f9ccfcb0870be81fabd10f3371eab1633b7188ba5f145b339c7

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13QY411.exe

              Filesize

              717KB

              MD5

              86f55f861842d4b49d6682c0aca9e18a

              SHA1

              5eb32c1c4b3e2d864ad7f2e2a4d6423146201de0

              SHA256

              4dc6470be1dc4576ea28a42b2cbe28356a6324c3f0b2baaea62a28398110f502

              SHA512

              7c07776ca641b664006de478ecdd42e7267941635a54fa4eda098b70e1c3b5e1898a3da115149c3524ff3d773b393043947cf2e8a9d0f28d54e0b91dc42979fa

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\13QY411.exe

              Filesize

              717KB

              MD5

              86f55f861842d4b49d6682c0aca9e18a

              SHA1

              5eb32c1c4b3e2d864ad7f2e2a4d6423146201de0

              SHA256

              4dc6470be1dc4576ea28a42b2cbe28356a6324c3f0b2baaea62a28398110f502

              SHA512

              7c07776ca641b664006de478ecdd42e7267941635a54fa4eda098b70e1c3b5e1898a3da115149c3524ff3d773b393043947cf2e8a9d0f28d54e0b91dc42979fa

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UC3oW97.exe

              Filesize

              426KB

              MD5

              48e3fa5fce706dc39f409fcb8ea7e667

              SHA1

              ce46b3d492eea9b4259d1c199e3064647639aad2

              SHA256

              c0c5a01d857fd709d3634ccabfd8501a39beb01ca38cd7b62851a76d18b255ab

              SHA512

              a9e50fc97bcb56612924cf932278e0265ebea76ee668cc053a2ce6077918220b322d2820d7d5facb7c9286bd5fbd4c1bbdffbbe95548d2ab40607c572ec264ea

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\UC3oW97.exe

              Filesize

              426KB

              MD5

              48e3fa5fce706dc39f409fcb8ea7e667

              SHA1

              ce46b3d492eea9b4259d1c199e3064647639aad2

              SHA256

              c0c5a01d857fd709d3634ccabfd8501a39beb01ca38cd7b62851a76d18b255ab

              SHA512

              a9e50fc97bcb56612924cf932278e0265ebea76ee668cc053a2ce6077918220b322d2820d7d5facb7c9286bd5fbd4c1bbdffbbe95548d2ab40607c572ec264ea

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11jv1321.exe

              Filesize

              369KB

              MD5

              8174d8aefd3eb8f9fc338d3ed132ae4b

              SHA1

              0c4f6df4bb3eae1cbb75bbe41c87e86bde5b22bf

              SHA256

              331265cc84a3c4459837b94e79bf0e069456a4dd24b805b2461e35597fab7364

              SHA512

              ef3c83c720a61b97a8cb9f19939f5afa8e4acbf6d3acd007d53cecf1b09f32df249ad7ee6d81fdabfb3943bd1091db08d5a84373a5ea0d0b2ab378b13e3a1f22

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\11jv1321.exe

              Filesize

              369KB

              MD5

              8174d8aefd3eb8f9fc338d3ed132ae4b

              SHA1

              0c4f6df4bb3eae1cbb75bbe41c87e86bde5b22bf

              SHA256

              331265cc84a3c4459837b94e79bf0e069456a4dd24b805b2461e35597fab7364

              SHA512

              ef3c83c720a61b97a8cb9f19939f5afa8e4acbf6d3acd007d53cecf1b09f32df249ad7ee6d81fdabfb3943bd1091db08d5a84373a5ea0d0b2ab378b13e3a1f22

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12TF065.exe

              Filesize

              408KB

              MD5

              aaa9a35f1c4da30de4c80c55416abf42

              SHA1

              3381966a4bd51dd2e20ca14e8eda5c18aa3c7009

              SHA256

              6d4228592cf5d620973b74d16aff3286e9a465a947d5870b32be851b5debcc18

              SHA512

              9a3d576928ed9ad40c284816f99f724e8d927bdd334d97cdc4d1baf18fbc52e4ced5be6c50133759809fc5e8a03bb46193fd5630bd0bbd87063de553ab4d425f

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\12TF065.exe

              Filesize

              408KB

              MD5

              aaa9a35f1c4da30de4c80c55416abf42

              SHA1

              3381966a4bd51dd2e20ca14e8eda5c18aa3c7009

              SHA256

              6d4228592cf5d620973b74d16aff3286e9a465a947d5870b32be851b5debcc18

              SHA512

              9a3d576928ed9ad40c284816f99f724e8d927bdd334d97cdc4d1baf18fbc52e4ced5be6c50133759809fc5e8a03bb46193fd5630bd0bbd87063de553ab4d425f

            • memory/3516-49-0x0000000000400000-0x0000000000488000-memory.dmp

              Filesize

              544KB

            • memory/3516-46-0x0000000000400000-0x0000000000488000-memory.dmp

              Filesize

              544KB

            • memory/3516-45-0x0000000000400000-0x0000000000488000-memory.dmp

              Filesize

              544KB

            • memory/3516-52-0x0000000000400000-0x0000000000488000-memory.dmp

              Filesize

              544KB

            • memory/4352-25-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4352-23-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4352-21-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4352-22-0x0000000000400000-0x0000000000433000-memory.dmp

              Filesize

              204KB

            • memory/4372-40-0x0000000007650000-0x0000000007662000-memory.dmp

              Filesize

              72KB

            • memory/4372-29-0x0000000000400000-0x000000000043C000-memory.dmp

              Filesize

              240KB

            • memory/4372-35-0x0000000007500000-0x0000000007592000-memory.dmp

              Filesize

              584KB

            • memory/4372-41-0x00000000077F0000-0x000000000782C000-memory.dmp

              Filesize

              240KB

            • memory/4372-42-0x0000000007780000-0x00000000077CC000-memory.dmp

              Filesize

              304KB

            • memory/4372-43-0x0000000074210000-0x00000000749C0000-memory.dmp

              Filesize

              7.7MB

            • memory/4372-44-0x0000000007680000-0x0000000007690000-memory.dmp

              Filesize

              64KB

            • memory/4372-34-0x0000000007A10000-0x0000000007FB4000-memory.dmp

              Filesize

              5.6MB

            • memory/4372-33-0x0000000074210000-0x00000000749C0000-memory.dmp

              Filesize

              7.7MB

            • memory/4372-39-0x0000000007900000-0x0000000007A0A000-memory.dmp

              Filesize

              1.0MB

            • memory/4372-38-0x00000000085E0000-0x0000000008BF8000-memory.dmp

              Filesize

              6.1MB

            • memory/4372-37-0x00000000074E0000-0x00000000074EA000-memory.dmp

              Filesize

              40KB

            • memory/4372-36-0x0000000007680000-0x0000000007690000-memory.dmp

              Filesize

              64KB

            • memory/5016-53-0x0000000000400000-0x0000000000488000-memory.dmp

              Filesize

              544KB

            • memory/5016-54-0x0000000000400000-0x0000000000488000-memory.dmp

              Filesize

              544KB

            • memory/5016-57-0x0000000000400000-0x0000000000488000-memory.dmp

              Filesize

              544KB

            • memory/5016-55-0x0000000000400000-0x0000000000488000-memory.dmp

              Filesize

              544KB