Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
30068388548...96.exe
windows10-2004-x64
1013243e4dd5...33.exe
windows10-2004-x64
10202040bebe...98.exe
windows10-2004-x64
103a1c464610...ff.exe
windows10-2004-x64
10556fc723a7...10.exe
windows10-2004-x64
75eb8ed45ba...01.exe
windows10-2004-x64
10663bf6b48c...37.exe
windows10-2004-x64
767dbedea2e...69.exe
windows10-2004-x64
107e4d47aad3...11.exe
windows10-2004-x64
10820ec15efb...db.exe
windows10-2004-x64
1088a5b8b09a...44.exe
windows10-2004-x64
109c0f7f6495...f7.exe
windows10-2004-x64
10bd0a957eae...c0.exe
windows7-x64
10bd0a957eae...c0.exe
windows10-2004-x64
10c8e229c276...39.exe
windows10-2004-x64
10ca2534058c...e4.exe
windows10-2004-x64
10d0c5f92763...68.exe
windows10-2004-x64
10d3f2262a94...31.exe
windows10-2004-x64
10d40527d1f8...ed.exe
windows10-2004-x64
10de4076a039...c9.exe
windows10-2004-x64
10f80bd79907...93.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
0068388548827b89762c020630c0e79519dedb7b7ff6c4f1c625aca59fbf5996.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
13243e4dd58e70de2748aff5360c6262fe2a6de7562acb1334b8a8adbb876f33.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
202040bebe757e0adc39d99b3d7327e79e0354b43f2a6c6fe0d1c1362d3e4198.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
3a1c464610d6f381fd4237273e1990d1b05567b780bacaa50c4d2462441faeff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
556fc723a7eab0f91113f11d7171070d3875bbfca8f5e2397500b5ee832c0310.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
5eb8ed45ba47d4135feaee11bbc17194ba1e8dfa693a293e370a7725fcfcd401.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
663bf6b48c7a6589e9a0bbabacbb8b22b1556f79bd63892788caae034d162437.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
67dbedea2ea23fd4fe189651241dd1489f71cf6bb5803d660d3d7ecd91ff5669.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
7e4d47aad3f9ebbd9422d69a7b96b1808810801c43b385031da5bd1472cbd411.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
820ec15efb9f2f70d27557121fc2619065a095a0db4a83720d911fc56bc7eedb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
88a5b8b09ad1e32abc7fce3415b25a2aa7be90802b17e91d650f6961ee4e8744.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
bd0a957eaebb4aaad5274b94282e2e629645d3cfc2d373f90812b885800536c0.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
bd0a957eaebb4aaad5274b94282e2e629645d3cfc2d373f90812b885800536c0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d0c5f927631e1bb113c5cb5f1178cddd83c9fa595df60b9ffc903fe23c0bcb68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
d40527d1f87af48fe58a0377e98e5eafc8b6f2ba2f0023257f76d0c61f1096ed.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
de4076a0397d9f3a10c9a7ec7c19d95dd219e5330592bc236b71f5cea26f87c9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe
Resource
win10v2004-20240508-en
General
-
Target
c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe
-
Size
1.5MB
-
MD5
19f3cbb17138af08c5bd91e3aab324c4
-
SHA1
f15720768ade102439f446c8d624b4149b603df4
-
SHA256
c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39
-
SHA512
1b8acfb018f9bda540ce0ec607a696925fe6578a1c140e13245a74c7217b006cb730c98caa48e0f212a696c5e6693a8ef0ff8090d2960758997c02c6c4083110
-
SSDEEP
49152:NZ7COdsQvIpUub/r2ypC7hex41knzA1GPL:fCQTkUub/ylhex41kMEPL
Malware Config
Extracted
redline
kukish
77.91.124.55:19071
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral15/memory/5108-35-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral15/memory/5108-41-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family behavioral15/memory/5108-39-0x0000000000400000-0x0000000000432000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral15/files/0x00070000000235fd-37.dat family_redline behavioral15/memory/1388-42-0x0000000000320000-0x000000000035E000-memory.dmp family_redline -
Executes dropped EXE 6 IoCs
pid Process 1108 YH3Kn4eu.exe 3188 cc4oF3zs.exe 4488 FI7Kg0Oa.exe 2748 ZA3It0yV.exe 2184 1kx31MM6.exe 1388 2nv850rJ.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" YH3Kn4eu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" cc4oF3zs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" FI7Kg0Oa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ZA3It0yV.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2184 set thread context of 5108 2184 1kx31MM6.exe 99 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1108 2924 c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe 91 PID 2924 wrote to memory of 1108 2924 c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe 91 PID 2924 wrote to memory of 1108 2924 c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe 91 PID 1108 wrote to memory of 3188 1108 YH3Kn4eu.exe 92 PID 1108 wrote to memory of 3188 1108 YH3Kn4eu.exe 92 PID 1108 wrote to memory of 3188 1108 YH3Kn4eu.exe 92 PID 3188 wrote to memory of 4488 3188 cc4oF3zs.exe 93 PID 3188 wrote to memory of 4488 3188 cc4oF3zs.exe 93 PID 3188 wrote to memory of 4488 3188 cc4oF3zs.exe 93 PID 4488 wrote to memory of 2748 4488 FI7Kg0Oa.exe 94 PID 4488 wrote to memory of 2748 4488 FI7Kg0Oa.exe 94 PID 4488 wrote to memory of 2748 4488 FI7Kg0Oa.exe 94 PID 2748 wrote to memory of 2184 2748 ZA3It0yV.exe 95 PID 2748 wrote to memory of 2184 2748 ZA3It0yV.exe 95 PID 2748 wrote to memory of 2184 2748 ZA3It0yV.exe 95 PID 2184 wrote to memory of 5108 2184 1kx31MM6.exe 99 PID 2184 wrote to memory of 5108 2184 1kx31MM6.exe 99 PID 2184 wrote to memory of 5108 2184 1kx31MM6.exe 99 PID 2184 wrote to memory of 5108 2184 1kx31MM6.exe 99 PID 2184 wrote to memory of 5108 2184 1kx31MM6.exe 99 PID 2184 wrote to memory of 5108 2184 1kx31MM6.exe 99 PID 2184 wrote to memory of 5108 2184 1kx31MM6.exe 99 PID 2184 wrote to memory of 5108 2184 1kx31MM6.exe 99 PID 2184 wrote to memory of 5108 2184 1kx31MM6.exe 99 PID 2184 wrote to memory of 5108 2184 1kx31MM6.exe 99 PID 2748 wrote to memory of 1388 2748 ZA3It0yV.exe 100 PID 2748 wrote to memory of 1388 2748 ZA3It0yV.exe 100 PID 2748 wrote to memory of 1388 2748 ZA3It0yV.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe"C:\Users\Admin\AppData\Local\Temp\c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\YH3Kn4eu.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\YH3Kn4eu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cc4oF3zs.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cc4oF3zs.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\FI7Kg0Oa.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\FI7Kg0Oa.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ZA3It0yV.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ZA3It0yV.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1kx31MM6.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1kx31MM6.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:5108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2nv850rJ.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2nv850rJ.exe6⤵
- Executes dropped EXE
PID:1388
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4036,i,17096020621006928097,15544233752327415349,262144 --variations-seed-version --mojo-platform-channel-handle=1320 /prefetch:81⤵PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5023031815bd41c9887fb2972897ee8bb
SHA1829e86161ed9c4582abd5130303a7a8694a56282
SHA256e073c052d017217f91903bbe0905c7a571e50f51d85b3733d752350167f681e0
SHA5128e861d7760dbb3b1f700f538ad3e634936eae38b2547205481d853c8bb0796563c5a13eb46d6c4edca365c339f5f365cc9c5f7f5bc30ab859bb6b125deed7a65
-
Filesize
1.2MB
MD511013a4152620e19a3b1dbaed0cc30d6
SHA1f8dc17534a895895e961af934433026232c47533
SHA256444e1303b6d9a92f39333f57cc48d72a2d60a3bed32498073922cf5f7b5b4a23
SHA5128024fdd705a9db92e11e6f83732ce17558e48a8cb13066021a38718176783423780a9d7731c79838d5eb1ac74ccc9e67606153f28bda391da1260d601f8a67f9
-
Filesize
782KB
MD52ce9892f0d934996615d85d0eebe155c
SHA11330ce30c0b3ba2b4531a4e9b2caded2521aaecd
SHA2566df2b523440b497e862f1ecff54c808a6cfc6d6207a1819cdfc8f174d9bd3a75
SHA512a412696e6a8a50932965f612b62392596838398f24268c2002273aab5ea5fc07b21fe4205bda3d11710b48d220244d342d5f00a02a94a3f497c1cc9ed5f3e010
-
Filesize
581KB
MD52227fe0e2df1f818f66bb77905d01142
SHA129f80223798368c466298c973a082f0e8110afd4
SHA2564438bcadb8d101c0cd0ab0f2120a6737a311390ac24bac5580d08f040eb87cce
SHA512824115df35a50a44c3d1bfaa39e8ed557d35f8370b52e1bce4159055c211a85fb75189ffeeb725170f12fa4d33fc6e4e86b06185b0e8bf66c4feb63a29d73cc9
-
Filesize
1.1MB
MD56ef68ec5b2d91cbc9c66fa0553e527ec
SHA18d8ab02a5f2433cf12ba62336e4d774f2bbf21d2
SHA2568ffa8c6bcf0b38b229ac57e8a8eacfad2d27bd2b6ec971af827609bfb919495f
SHA5121a02ccdf3d1be279169bc25eb2a4452be337389b78050811ea4367ca624d5d169c7c7e157a73fe3be13378412e8d94606f41c157b5892cc76c4344ee85d204a6
-
Filesize
222KB
MD5ce4ef7c328d32aa5041adc1659b899da
SHA17be450a4fc1c3dbf9fcf4a857e46c9f29f82bf97
SHA256cc87db02c7c03ce5a30a3fc303c780a6f3f0f04511b114bd78c7d3b888d03ba0
SHA51257410ac81f54286fb7cdc664195ba51e0ff39e8d8b30d9928b28479b5f839ea56439a9e179b045d6fbf26565b3d69c02815f8c56b9c3cce2396a53e612008835