Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    168s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2023, 16:39

General

  • Target

    b882d2fa75dd429d2366009bbe68c3bf3910cc54bce8a1b6e3ec56f8cae11775.exe

  • Size

    1.4MB

  • MD5

    45cee4ec3643349ffdf7395f7b4a5b3f

  • SHA1

    26774d3f71bb03f94588b04e9bd8926fc87c6653

  • SHA256

    b882d2fa75dd429d2366009bbe68c3bf3910cc54bce8a1b6e3ec56f8cae11775

  • SHA512

    eac80cdb3cb0371bd429e7a672257d7015ff7ab70f4d6c56ac4ba8abbe3d6e931441389b031220f8c7fcb2decdf8042f76969442c2e7f2d5d2e5f68e8124a08b

  • SSDEEP

    24576:n5hGigbZWG8Srp651ZFL3XVTLcx9+WrCkF2gNCs46sL3f:n0SYP+cRF2gNlsD

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3300
      • C:\Users\Admin\AppData\Local\Temp\b882d2fa75dd429d2366009bbe68c3bf3910cc54bce8a1b6e3ec56f8cae11775.exe
        "C:\Users\Admin\AppData\Local\Temp\b882d2fa75dd429d2366009bbe68c3bf3910cc54bce8a1b6e3ec56f8cae11775.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4448
        • C:\Windows\SysWOW64\cmd.exe
          cmd /k cmd < Bbs & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1480
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:768
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:1020
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
              5⤵
                PID:2964
              • C:\Windows\SysWOW64\tasklist.exe
                tasklist
                5⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:1380
              • C:\Windows\SysWOW64\findstr.exe
                findstr /I "wrsa.exe"
                5⤵
                  PID:232
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c mkdir 26762
                  5⤵
                    PID:5100
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b Sentence + Taught + Feedback + Tsunami + Grad 26762\Connection.pif
                    5⤵
                      PID:1212
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c copy /b Sparc + Results 26762\C
                      5⤵
                        PID:2688
                      • C:\Users\Admin\AppData\Local\Temp\27979\26762\Connection.pif
                        26762\Connection.pif 26762\C
                        5⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:2572
                      • C:\Windows\SysWOW64\PING.EXE
                        ping -n 5 localhost
                        5⤵
                        • Runs ping.exe
                        PID:4344
                • C:\Users\Admin\AppData\Local\Temp\27979\26762\jsc.exe
                  C:\Users\Admin\AppData\Local\Temp\27979\26762\jsc.exe
                  2⤵
                  • Executes dropped EXE
                  PID:3652

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\27979\26762\C

                Filesize

                758KB

                MD5

                36d46255ee659decc167a858f4e9dc30

                SHA1

                ca38f807567c1e36b6b0b8c88674249653dea471

                SHA256

                86a5d8d34c89a8fbd3ed3afdde52507c24ec05a361fbe4f6f3627ca1572eacab

                SHA512

                e4d68ef4d554d5ea497ff438306326948b2c80ee42c1ed16934c45c0b1ebdff3214ebfb1f28945a36b69c4c7d8eff5b05902e5cd7d1683b1a9794c6635a9aa1a

              • C:\Users\Admin\AppData\Local\Temp\27979\26762\Connection.pif

                Filesize

                924KB

                MD5

                848164d084384c49937f99d5b894253e

                SHA1

                3055ef803eeec4f175ebf120f94125717ee12444

                SHA256

                f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                SHA512

                aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

              • C:\Users\Admin\AppData\Local\Temp\27979\26762\jsc.exe

                Filesize

                46KB

                MD5

                94c8e57a80dfca2482dedb87b93d4fd9

                SHA1

                5729e6c7d2f5ab760f0093b9d44f8ac0f876a803

                SHA256

                39e87f0edcdd15582cfefdfab1975aadd2c7ca1e3a5f07b1146ce3206f401bb5

                SHA512

                1798a3607b2b94732b52de51d2748c86f9453343b6d8a417e98e65ddb38e9198cdcb2f45bf60823cb429b312466b28c5103c7588f2c4ef69fa27bfdb4f4c67dc

              • C:\Users\Admin\AppData\Local\Temp\27979\26762\jsc.exe

                Filesize

                46KB

                MD5

                94c8e57a80dfca2482dedb87b93d4fd9

                SHA1

                5729e6c7d2f5ab760f0093b9d44f8ac0f876a803

                SHA256

                39e87f0edcdd15582cfefdfab1975aadd2c7ca1e3a5f07b1146ce3206f401bb5

                SHA512

                1798a3607b2b94732b52de51d2748c86f9453343b6d8a417e98e65ddb38e9198cdcb2f45bf60823cb429b312466b28c5103c7588f2c4ef69fa27bfdb4f4c67dc

              • C:\Users\Admin\AppData\Local\Temp\27979\Bbs

                Filesize

                13KB

                MD5

                5d8a2a120af045c8d0aac78c57c03697

                SHA1

                cbd0f90fefeba76f599ba9ec7f4fc1bbcd3bdb13

                SHA256

                8b03a9e8437f6f7201b0fc777e8c3629c0aeea041f63ac1b8e70e73717c07fb4

                SHA512

                ac7e3d3d916053c912e7f2209977e9c12cf8d5efdf02fa482679165ebc2806c4643846d20ad9a2d58a1537389443c2625543721521b8d5a289334e14b3b5f888

              • C:\Users\Admin\AppData\Local\Temp\27979\Feedback

                Filesize

                161KB

                MD5

                c6cf09534f8ee6daef3149da78c64ba5

                SHA1

                aaa3dc37dc2dd81e164c4e35c274b676b12ff771

                SHA256

                c35fee916b97f7e1a1b0715030e407d872cfc894b426b94fabf0babfa58bd142

                SHA512

                9d625d3c7ad80cc862d06f3ef994f7408a32a0a8bb7d9847d0b077d18e6e46dd9a7d8338ffe966f8e5d7c47c1a0ef9f7d858d268e2388028c3a62841d9262912

              • C:\Users\Admin\AppData\Local\Temp\27979\Grad

                Filesize

                126KB

                MD5

                ac33b4a176c095a6eca59095316ebe22

                SHA1

                de7b15757d24a5df589badee3c43342622e318b5

                SHA256

                0dcf9719f65563766be234ed65ca2f5fb62f28cf42f23709b1de5b8ce6b595e4

                SHA512

                7d4cb1f56d262304e7a7853825e42f774190e2c5d978dd16a4a2e17824c1452040e885cd731117ff0a94bbe9f205896de401e1ea18d8fee438dd09ef9e80c42a

              • C:\Users\Admin\AppData\Local\Temp\27979\Results

                Filesize

                307KB

                MD5

                fedcc23be1cc5f7617bc3ef5e8252d66

                SHA1

                e5a2c10df5aa4765e968df1394c0fcc9018adfa3

                SHA256

                4fdb64abc7ad651a4587660e9179bfaafc2a30fe2410b9896e6a7c06eb8acdcf

                SHA512

                5b8237cd60653d0eb481ec5c3e6da5c56ee2a646797a444c38e24b286ad204e5592fb6a9486e8bb079e2b24ea3f4b19375516aacee2c6dc84b0605f2b18e56b0

              • C:\Users\Admin\AppData\Local\Temp\27979\Sentence

                Filesize

                242KB

                MD5

                3dc2a9b76a1d6565091a348e2b1f8751

                SHA1

                79565e6821e0f4c1a8d28494365d3b3deb354140

                SHA256

                acf6ace5d4162c30d687204df636013d66167a1a01af56e7c2721fe32a156558

                SHA512

                ae6861c940bb3609d361e043f73c54882091adb1de34e8217b5787639fb7035e6d358cd2418e1c967c97886193ec9a54c95b9ea9fb681b18a6c682897e24656d

              • C:\Users\Admin\AppData\Local\Temp\27979\Sparc

                Filesize

                451KB

                MD5

                0fca05071fd14f524b0e9556b8f3984f

                SHA1

                0c38b11f62e4e34b9bef32f8bbc7eda8fb75af7b

                SHA256

                dcfadf0620bb02b1c0f053c677dd2021399c8efe0e6e99f3a860a035eab35141

                SHA512

                2dea8f25b0586fc8cd5f9a406e880ea39476748707ba0c19a038902c181eec228a332ae52b4127b40b6baa8d78bac8cfbe1df50ac531ef34e8bdcda5a00e552d

              • C:\Users\Admin\AppData\Local\Temp\27979\Taught

                Filesize

                185KB

                MD5

                8a28ac876447f7d287e7a27fbb6275fa

                SHA1

                555f61875c8e78dd73cc712c881cb282a6004104

                SHA256

                e51e36c506155139c49d40134a7eb3603965e6b806ce7fe712f518635a9ccbe3

                SHA512

                d1d98f81a1fc152ff8d982271cc7fea419461730014ce7acd8b94c590c9c548c059048090f1c158317a009e75d2b104b9ebefad9fffd6227022bc60845950384

              • C:\Users\Admin\AppData\Local\Temp\27979\Tsunami

                Filesize

                210KB

                MD5

                6fc8a81dd6e36b53a40101505e77d665

                SHA1

                96996fb1a6b563d09f4b3a4af1cdb73c7975fef2

                SHA256

                3c9e80af20f23433ab7c14e7c86fe2bb9e7102692bacccbc7c8e29e8c8a14456

                SHA512

                00b81ba4c3d69f307b2acaeea32320bf2253068e90b2839586963f4a88fcd903c9cb7fdc039e0ebee5878056db99b35340b64f713c5ade25d3c1d89b59912e69

              • memory/2572-31-0x0000000000EC0000-0x0000000000EC1000-memory.dmp

                Filesize

                4KB

              • memory/3652-33-0x0000000000F40000-0x0000000000F9A000-memory.dmp

                Filesize

                360KB

              • memory/3652-36-0x00000000745E0000-0x0000000074D90000-memory.dmp

                Filesize

                7.7MB

              • memory/3652-37-0x0000000008310000-0x00000000088B4000-memory.dmp

                Filesize

                5.6MB

              • memory/3652-38-0x0000000007E00000-0x0000000007E92000-memory.dmp

                Filesize

                584KB

              • memory/3652-39-0x00000000745E0000-0x0000000074D90000-memory.dmp

                Filesize

                7.7MB

              • memory/4448-14-0x0000000000400000-0x000000000056C000-memory.dmp

                Filesize

                1.4MB

              • memory/4448-13-0x0000000002200000-0x0000000002201000-memory.dmp

                Filesize

                4KB

              • memory/4448-29-0x0000000000400000-0x000000000056C000-memory.dmp

                Filesize

                1.4MB

              • memory/4448-8-0x0000000000400000-0x000000000056C000-memory.dmp

                Filesize

                1.4MB

              • memory/4448-0-0x0000000000400000-0x000000000056C000-memory.dmp

                Filesize

                1.4MB

              • memory/4448-2-0x0000000000400000-0x000000000056C000-memory.dmp

                Filesize

                1.4MB

              • memory/4448-1-0x0000000002200000-0x0000000002201000-memory.dmp

                Filesize

                4KB