Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
30068388548...96.exe
windows10-2004-x64
1013243e4dd5...33.exe
windows10-2004-x64
10202040bebe...98.exe
windows10-2004-x64
103a1c464610...ff.exe
windows10-2004-x64
10556fc723a7...10.exe
windows10-2004-x64
75eb8ed45ba...01.exe
windows10-2004-x64
10663bf6b48c...37.exe
windows10-2004-x64
767dbedea2e...69.exe
windows10-2004-x64
107e4d47aad3...11.exe
windows10-2004-x64
10820ec15efb...db.exe
windows10-2004-x64
1088a5b8b09a...44.exe
windows10-2004-x64
109c0f7f6495...f7.exe
windows10-2004-x64
10bd0a957eae...c0.exe
windows7-x64
10bd0a957eae...c0.exe
windows10-2004-x64
10c8e229c276...39.exe
windows10-2004-x64
10ca2534058c...e4.exe
windows10-2004-x64
10d0c5f92763...68.exe
windows10-2004-x64
10d3f2262a94...31.exe
windows10-2004-x64
10d40527d1f8...ed.exe
windows10-2004-x64
10de4076a039...c9.exe
windows10-2004-x64
10f80bd79907...93.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
0068388548827b89762c020630c0e79519dedb7b7ff6c4f1c625aca59fbf5996.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
13243e4dd58e70de2748aff5360c6262fe2a6de7562acb1334b8a8adbb876f33.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
202040bebe757e0adc39d99b3d7327e79e0354b43f2a6c6fe0d1c1362d3e4198.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
3a1c464610d6f381fd4237273e1990d1b05567b780bacaa50c4d2462441faeff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
556fc723a7eab0f91113f11d7171070d3875bbfca8f5e2397500b5ee832c0310.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
5eb8ed45ba47d4135feaee11bbc17194ba1e8dfa693a293e370a7725fcfcd401.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
663bf6b48c7a6589e9a0bbabacbb8b22b1556f79bd63892788caae034d162437.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
67dbedea2ea23fd4fe189651241dd1489f71cf6bb5803d660d3d7ecd91ff5669.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
7e4d47aad3f9ebbd9422d69a7b96b1808810801c43b385031da5bd1472cbd411.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
820ec15efb9f2f70d27557121fc2619065a095a0db4a83720d911fc56bc7eedb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
88a5b8b09ad1e32abc7fce3415b25a2aa7be90802b17e91d650f6961ee4e8744.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
bd0a957eaebb4aaad5274b94282e2e629645d3cfc2d373f90812b885800536c0.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
bd0a957eaebb4aaad5274b94282e2e629645d3cfc2d373f90812b885800536c0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d0c5f927631e1bb113c5cb5f1178cddd83c9fa595df60b9ffc903fe23c0bcb68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
d40527d1f87af48fe58a0377e98e5eafc8b6f2ba2f0023257f76d0c61f1096ed.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
de4076a0397d9f3a10c9a7ec7c19d95dd219e5330592bc236b71f5cea26f87c9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe
Resource
win10v2004-20240508-en
General
-
Target
9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe
-
Size
1.5MB
-
MD5
86625ad75631f83ea4cd8fa7a4b14746
-
SHA1
bc7fbd2f348d7b584354e3600c3b68b85aff2fd1
-
SHA256
9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7
-
SHA512
93f578cc3a6eee6de5d609a8216fc2a600be8ab977aab66ec16c257281f7205e46331d182665249ab5a99a80238f1dbd7aa8aad7154b0f1e47e6661404aa3502
-
SSDEEP
24576:NybWSXHURab0mUxblcutLA4FH0mvqFnXhbmWg9KhGxtWLqNjE3Gx:obhOcuDUmmhqWYyGjW2pUG
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral12/memory/4992-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral12/memory/4992-38-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral12/memory/4992-36-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral12/files/0x0007000000023422-40.dat family_redline behavioral12/memory/4164-42-0x0000000000E10000-0x0000000000E4E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 628 fZ2kt5kZ.exe 2528 tR1zZ0Xe.exe 4692 lS8QE3qC.exe 1268 aq7HB9RZ.exe 4836 1yj08tq1.exe 4164 2bt514pE.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" fZ2kt5kZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" tR1zZ0Xe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" lS8QE3qC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" aq7HB9RZ.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4836 set thread context of 4992 4836 1yj08tq1.exe 97 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1848 wrote to memory of 628 1848 9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe 84 PID 1848 wrote to memory of 628 1848 9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe 84 PID 1848 wrote to memory of 628 1848 9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe 84 PID 628 wrote to memory of 2528 628 fZ2kt5kZ.exe 85 PID 628 wrote to memory of 2528 628 fZ2kt5kZ.exe 85 PID 628 wrote to memory of 2528 628 fZ2kt5kZ.exe 85 PID 2528 wrote to memory of 4692 2528 tR1zZ0Xe.exe 86 PID 2528 wrote to memory of 4692 2528 tR1zZ0Xe.exe 86 PID 2528 wrote to memory of 4692 2528 tR1zZ0Xe.exe 86 PID 4692 wrote to memory of 1268 4692 lS8QE3qC.exe 87 PID 4692 wrote to memory of 1268 4692 lS8QE3qC.exe 87 PID 4692 wrote to memory of 1268 4692 lS8QE3qC.exe 87 PID 1268 wrote to memory of 4836 1268 aq7HB9RZ.exe 88 PID 1268 wrote to memory of 4836 1268 aq7HB9RZ.exe 88 PID 1268 wrote to memory of 4836 1268 aq7HB9RZ.exe 88 PID 4836 wrote to memory of 4992 4836 1yj08tq1.exe 97 PID 4836 wrote to memory of 4992 4836 1yj08tq1.exe 97 PID 4836 wrote to memory of 4992 4836 1yj08tq1.exe 97 PID 4836 wrote to memory of 4992 4836 1yj08tq1.exe 97 PID 4836 wrote to memory of 4992 4836 1yj08tq1.exe 97 PID 4836 wrote to memory of 4992 4836 1yj08tq1.exe 97 PID 4836 wrote to memory of 4992 4836 1yj08tq1.exe 97 PID 4836 wrote to memory of 4992 4836 1yj08tq1.exe 97 PID 4836 wrote to memory of 4992 4836 1yj08tq1.exe 97 PID 4836 wrote to memory of 4992 4836 1yj08tq1.exe 97 PID 1268 wrote to memory of 4164 1268 aq7HB9RZ.exe 98 PID 1268 wrote to memory of 4164 1268 aq7HB9RZ.exe 98 PID 1268 wrote to memory of 4164 1268 aq7HB9RZ.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe"C:\Users\Admin\AppData\Local\Temp\9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fZ2kt5kZ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fZ2kt5kZ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tR1zZ0Xe.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tR1zZ0Xe.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lS8QE3qC.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lS8QE3qC.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\aq7HB9RZ.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\aq7HB9RZ.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1yj08tq1.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1yj08tq1.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2bt514pE.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2bt514pE.exe6⤵
- Executes dropped EXE
PID:4164
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD526ac9a3737d6e0ddbab4cc8e0609e93d
SHA1f40baa44090136a3fe29802097198aef7c96852e
SHA25642846a76665d575de3dc0b30c08c1d114d86e8038739b60f34bc4012ca3f88a0
SHA51252004860387ffc9ffa1c2ac77bab0092e1af7075600055815c0f5b84c5e0616b7239933425fc8b8c62819bb7a5a32c27326f3d617cf816d4491c8d044fc88d0f
-
Filesize
1.2MB
MD5e8c2e01758a93140c75a1eb0ba0b2e1d
SHA172d94d557a93135b20dfdd1c7ff1eea95ec1978d
SHA25662e40677bfbb7c55a8147e7e45e6319d600cc2fa522227f09f83f94c9de73763
SHA51274ba1e32a7b50cca794cda94be70795b92b4309d2b3831693b048962119425a16a74e8c0dfa632be9d44d43bba84573fbdd84e502028e99bae333e6b379535e5
-
Filesize
776KB
MD542109ee492b42aed7f675f2dd32277aa
SHA15062c31fb5771e927b78a168774610253a305ee5
SHA2563291f46bfe44e15984a5ee7726fa3cb2eb296bf69bd3d5f0cd02bbc2602b766a
SHA512c7eb62f5fc5565d9eb18c17836409ca44ec407175950c7fe4b5d3785f8bc17507034badf45930def032a8c8c15a1427df27779c813cd3e5740dd378c7ac69c37
-
Filesize
580KB
MD505b2803fa9a236af0cf2375b6a608424
SHA15acc92d45d83b459f30c96a0b2a0acb651b2a97a
SHA25669f32b734666bb3c9cb10f0e2852a098a4f371745742166323428a8c6f83aad8
SHA512608a82a4b8576c18c9b6dee453b59dd94bd40bdbdaac8ca573d464267053c545a2320a1de0d826f1db9d538b362cc320de034dc998d7b5341ee299075d4e2479
-
Filesize
1.1MB
MD5a1c1c44e837edbc2d55d33ba9620a109
SHA10ba4e08d7b6f17f968d1f7cad75d0a3885bae998
SHA2564160c00350706d7630b0a8bfb47722e7ec956858ab07d5adc9345e37ccb751e5
SHA51275267e9d0652e006107506457c5253fe701149888ad977d95f52d215410b18e3b145c8779ae389b718f090c5aa41d614e45deb38a96852a07a299a5b075c02bc
-
Filesize
222KB
MD56bdd3fefb28f8d707b7b443572e3dad2
SHA110a4adc48f13aee4a864347a2112cb6ae65a8162
SHA256688079516c1fd6e9c307cfd1fe9f928503e4e9ee593ee3a602c65d2395f120c0
SHA512e7294bb3f6b431827e40315d47b1836cb9ea6df977b16ac402328c8b94f35ee67a2ff9b84d67fcda172ea3bb0ff262c795e83a039d338dba5c729855047de5e0