Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2023, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
998d11b1a98132f03929e757580de41b3543bec99d09d5e1239dbbc237a0a2da.exe
Resource
win10v2004-20231023-en
General
-
Target
998d11b1a98132f03929e757580de41b3543bec99d09d5e1239dbbc237a0a2da.exe
-
Size
1.4MB
-
MD5
ba9bf7af0c009f395801205af7596df9
-
SHA1
444bf2e08210cc84b015841797b34d85a732e618
-
SHA256
998d11b1a98132f03929e757580de41b3543bec99d09d5e1239dbbc237a0a2da
-
SHA512
6901fcfd2a8a6a54de41ea43202a08e68e03ed4901b3af8b367b18a07711dd20e47191be153d4cec26cb30bca3508304c5e65b31e69f4b6ac3fc6e1ea103145a
-
SSDEEP
24576:pyy5EflOGXXRlhvuVgGfkIie5pMVemEqfr3+ZzKM6mpLcD2Lx6MZwkuWbGe:cy5UOGHEqGfkIie5pnmjfaZOM6g6M
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Extracted
risepro
194.49.94.152
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2648-21-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 3pN62CG.exe -
Executes dropped EXE 4 IoCs
pid Process 4560 rN7CJ41.exe 1940 sp9iT22.exe 4908 2cg3717.exe 3680 3pN62CG.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 3pN62CG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 998d11b1a98132f03929e757580de41b3543bec99d09d5e1239dbbc237a0a2da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" rN7CJ41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sp9iT22.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4908 set thread context of 2648 4908 2cg3717.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2816 schtasks.exe 3592 schtasks.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1396 wrote to memory of 4560 1396 998d11b1a98132f03929e757580de41b3543bec99d09d5e1239dbbc237a0a2da.exe 87 PID 1396 wrote to memory of 4560 1396 998d11b1a98132f03929e757580de41b3543bec99d09d5e1239dbbc237a0a2da.exe 87 PID 1396 wrote to memory of 4560 1396 998d11b1a98132f03929e757580de41b3543bec99d09d5e1239dbbc237a0a2da.exe 87 PID 4560 wrote to memory of 1940 4560 rN7CJ41.exe 89 PID 4560 wrote to memory of 1940 4560 rN7CJ41.exe 89 PID 4560 wrote to memory of 1940 4560 rN7CJ41.exe 89 PID 1940 wrote to memory of 4908 1940 sp9iT22.exe 90 PID 1940 wrote to memory of 4908 1940 sp9iT22.exe 90 PID 1940 wrote to memory of 4908 1940 sp9iT22.exe 90 PID 4908 wrote to memory of 2544 4908 2cg3717.exe 102 PID 4908 wrote to memory of 2544 4908 2cg3717.exe 102 PID 4908 wrote to memory of 2544 4908 2cg3717.exe 102 PID 4908 wrote to memory of 1640 4908 2cg3717.exe 103 PID 4908 wrote to memory of 1640 4908 2cg3717.exe 103 PID 4908 wrote to memory of 1640 4908 2cg3717.exe 103 PID 4908 wrote to memory of 2540 4908 2cg3717.exe 104 PID 4908 wrote to memory of 2540 4908 2cg3717.exe 104 PID 4908 wrote to memory of 2540 4908 2cg3717.exe 104 PID 4908 wrote to memory of 2648 4908 2cg3717.exe 105 PID 4908 wrote to memory of 2648 4908 2cg3717.exe 105 PID 4908 wrote to memory of 2648 4908 2cg3717.exe 105 PID 4908 wrote to memory of 2648 4908 2cg3717.exe 105 PID 4908 wrote to memory of 2648 4908 2cg3717.exe 105 PID 4908 wrote to memory of 2648 4908 2cg3717.exe 105 PID 4908 wrote to memory of 2648 4908 2cg3717.exe 105 PID 4908 wrote to memory of 2648 4908 2cg3717.exe 105 PID 1940 wrote to memory of 3680 1940 sp9iT22.exe 106 PID 1940 wrote to memory of 3680 1940 sp9iT22.exe 106 PID 1940 wrote to memory of 3680 1940 sp9iT22.exe 106 PID 3680 wrote to memory of 2816 3680 3pN62CG.exe 107 PID 3680 wrote to memory of 2816 3680 3pN62CG.exe 107 PID 3680 wrote to memory of 2816 3680 3pN62CG.exe 107 PID 3680 wrote to memory of 3592 3680 3pN62CG.exe 109 PID 3680 wrote to memory of 3592 3680 3pN62CG.exe 109 PID 3680 wrote to memory of 3592 3680 3pN62CG.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\998d11b1a98132f03929e757580de41b3543bec99d09d5e1239dbbc237a0a2da.exe"C:\Users\Admin\AppData\Local\Temp\998d11b1a98132f03929e757580de41b3543bec99d09d5e1239dbbc237a0a2da.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rN7CJ41.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rN7CJ41.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sp9iT22.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sp9iT22.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2cg3717.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2cg3717.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:1640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:2648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3pN62CG.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\3pN62CG.exe4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:2816
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵
- Creates scheduled task(s)
PID:3592
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51125ca41ef9c6892fe57190c44101803
SHA1dbddac0538bd7161eb676db13c10f14869a5ffab
SHA256e90fc9fb91758c648abb327e9924f514bbb52b7c31344ef18d38e826a54576e3
SHA51263ee46760b68d6d0e559d86dfcef8017dc61b8805d768199ef2d7bd4b32274638e44857419838b8eb3505a1f5c49a63258f2756bcef84c67c28fb3c2639a20b2
-
Filesize
1.2MB
MD548428fcd9e8087b7d791384dd3c69915
SHA1774c503bc09711275172e098147f9952fc905fb3
SHA256d3d5027ba3d90610d7e25d17e1339c6a1736aaa0f21624319af436ce568b7ef2
SHA5127bcbc7d7cf58e85c65a564ce83965dcc7c64b6106c23e2a028a86d6245d469dceede7a05b275576c3862b518fdee56eb56e45f0f502a4d35969eeec5d1e418c2
-
Filesize
1.2MB
MD548428fcd9e8087b7d791384dd3c69915
SHA1774c503bc09711275172e098147f9952fc905fb3
SHA256d3d5027ba3d90610d7e25d17e1339c6a1736aaa0f21624319af436ce568b7ef2
SHA5127bcbc7d7cf58e85c65a564ce83965dcc7c64b6106c23e2a028a86d6245d469dceede7a05b275576c3862b518fdee56eb56e45f0f502a4d35969eeec5d1e418c2
-
Filesize
1.1MB
MD5c30e7f5d11794f38a5768f08a4f4532e
SHA164a7dc253cacb6857ae9a87378d8172efbe37bf0
SHA256ae78af63b3ad94120639c97c28f724d0a76737b0033357190422c6a58d7acd7c
SHA5123f56cc32e14026f5f823fed83c3fbd9ecc1cf88a74c18da84a53c0e08ef2850e7211643e3bf58d4ffd2adaa46273f75c97063c73cd0462e11fb2576cb70e2162
-
Filesize
1.1MB
MD5c30e7f5d11794f38a5768f08a4f4532e
SHA164a7dc253cacb6857ae9a87378d8172efbe37bf0
SHA256ae78af63b3ad94120639c97c28f724d0a76737b0033357190422c6a58d7acd7c
SHA5123f56cc32e14026f5f823fed83c3fbd9ecc1cf88a74c18da84a53c0e08ef2850e7211643e3bf58d4ffd2adaa46273f75c97063c73cd0462e11fb2576cb70e2162
-
Filesize
1.9MB
MD58f06bc38d1bba7f0b4b88ebf512fe6cd
SHA1f70699d0075e136ae3d611ec230a5bc4d876d3dd
SHA25686457fcbcad999b2e3fc07e1d4b4f6ae2978acc1b47a062f76b86dc353ea02bc
SHA5120a56b571774bd649a1aa64e01f8b73fb8d4d64f09d05375cc4e25a3150da784fe2f9f31daec62d62f5e85d909e0f67b707b3cd2de632616462dcec9f8d174c43
-
Filesize
1.9MB
MD58f06bc38d1bba7f0b4b88ebf512fe6cd
SHA1f70699d0075e136ae3d611ec230a5bc4d876d3dd
SHA25686457fcbcad999b2e3fc07e1d4b4f6ae2978acc1b47a062f76b86dc353ea02bc
SHA5120a56b571774bd649a1aa64e01f8b73fb8d4d64f09d05375cc4e25a3150da784fe2f9f31daec62d62f5e85d909e0f67b707b3cd2de632616462dcec9f8d174c43
-
Filesize
1.3MB
MD51125ca41ef9c6892fe57190c44101803
SHA1dbddac0538bd7161eb676db13c10f14869a5ffab
SHA256e90fc9fb91758c648abb327e9924f514bbb52b7c31344ef18d38e826a54576e3
SHA51263ee46760b68d6d0e559d86dfcef8017dc61b8805d768199ef2d7bd4b32274638e44857419838b8eb3505a1f5c49a63258f2756bcef84c67c28fb3c2639a20b2
-
Filesize
1.3MB
MD51125ca41ef9c6892fe57190c44101803
SHA1dbddac0538bd7161eb676db13c10f14869a5ffab
SHA256e90fc9fb91758c648abb327e9924f514bbb52b7c31344ef18d38e826a54576e3
SHA51263ee46760b68d6d0e559d86dfcef8017dc61b8805d768199ef2d7bd4b32274638e44857419838b8eb3505a1f5c49a63258f2756bcef84c67c28fb3c2639a20b2