Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
30068388548...96.exe
windows10-2004-x64
1013243e4dd5...33.exe
windows10-2004-x64
10202040bebe...98.exe
windows10-2004-x64
103a1c464610...ff.exe
windows10-2004-x64
10556fc723a7...10.exe
windows10-2004-x64
75eb8ed45ba...01.exe
windows10-2004-x64
10663bf6b48c...37.exe
windows10-2004-x64
767dbedea2e...69.exe
windows10-2004-x64
107e4d47aad3...11.exe
windows10-2004-x64
10820ec15efb...db.exe
windows10-2004-x64
1088a5b8b09a...44.exe
windows10-2004-x64
109c0f7f6495...f7.exe
windows10-2004-x64
10bd0a957eae...c0.exe
windows7-x64
10bd0a957eae...c0.exe
windows10-2004-x64
10c8e229c276...39.exe
windows10-2004-x64
10ca2534058c...e4.exe
windows10-2004-x64
10d0c5f92763...68.exe
windows10-2004-x64
10d3f2262a94...31.exe
windows10-2004-x64
10d40527d1f8...ed.exe
windows10-2004-x64
10de4076a039...c9.exe
windows10-2004-x64
10f80bd79907...93.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
0068388548827b89762c020630c0e79519dedb7b7ff6c4f1c625aca59fbf5996.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
13243e4dd58e70de2748aff5360c6262fe2a6de7562acb1334b8a8adbb876f33.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
202040bebe757e0adc39d99b3d7327e79e0354b43f2a6c6fe0d1c1362d3e4198.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
3a1c464610d6f381fd4237273e1990d1b05567b780bacaa50c4d2462441faeff.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
556fc723a7eab0f91113f11d7171070d3875bbfca8f5e2397500b5ee832c0310.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
5eb8ed45ba47d4135feaee11bbc17194ba1e8dfa693a293e370a7725fcfcd401.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
663bf6b48c7a6589e9a0bbabacbb8b22b1556f79bd63892788caae034d162437.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
67dbedea2ea23fd4fe189651241dd1489f71cf6bb5803d660d3d7ecd91ff5669.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
7e4d47aad3f9ebbd9422d69a7b96b1808810801c43b385031da5bd1472cbd411.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
820ec15efb9f2f70d27557121fc2619065a095a0db4a83720d911fc56bc7eedb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
88a5b8b09ad1e32abc7fce3415b25a2aa7be90802b17e91d650f6961ee4e8744.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9c0f7f64959c0f4f98391ebbba925fb68cac09522971875cdbdf5e52983343f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
bd0a957eaebb4aaad5274b94282e2e629645d3cfc2d373f90812b885800536c0.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
bd0a957eaebb4aaad5274b94282e2e629645d3cfc2d373f90812b885800536c0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
c8e229c27623b0e1055a59f9b684a98468f33e92a47da3dcf5b041f74d4eca39.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d0c5f927631e1bb113c5cb5f1178cddd83c9fa595df60b9ffc903fe23c0bcb68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d3f2262a94435b8347df3ab935ed8eca2004e7db1ebf5da5384c7f7fe78efe31.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
d40527d1f87af48fe58a0377e98e5eafc8b6f2ba2f0023257f76d0c61f1096ed.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
de4076a0397d9f3a10c9a7ec7c19d95dd219e5330592bc236b71f5cea26f87c9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
f80bd799075b9e73bec4964dc911341456e6d8cb065c4ab30d36cb613faf6593.exe
Resource
win10v2004-20240508-en
General
-
Target
ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe
-
Size
840KB
-
MD5
06a78e3337e83b49d1e9dc5681174893
-
SHA1
24a81377502011be71396b292bff433e7494d26a
-
SHA256
ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4
-
SHA512
11bf89fe44bf599e600ba8cf3769124f6907855eb8e1d09752e2462379d273bb1ba4e3d674a1db48cde3ffb268afe87d2fc6d34d4a3f24849c401ccc9258204e
-
SSDEEP
12288:EMrTy900DY29HfxRQe2yX84pcbj/I8ScC7CtYhUodFgUdmsJ/0j0YlL3I8B44:fy7Y0HfTQe2yoQpGtwngzIO0YlLD
Malware Config
Extracted
redline
ramos
77.91.124.82:19071
-
auth_value
42c0ec91d63648bb7119ab787aa3fb94
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral16/memory/3268-21-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral16/memory/3268-25-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral16/memory/3268-22-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral16/memory/3268-23-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral16/files/0x0007000000023411-27.dat family_redline behavioral16/memory/2332-29-0x00000000009C0000-0x00000000009F0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2700 x6608415.exe 3052 x9182281.exe 5000 g8210553.exe 2332 h1084948.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6608415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9182281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5000 set thread context of 3268 5000 g8210553.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 1072 5000 WerFault.exe 86 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3468 wrote to memory of 2700 3468 ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe 84 PID 3468 wrote to memory of 2700 3468 ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe 84 PID 3468 wrote to memory of 2700 3468 ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe 84 PID 2700 wrote to memory of 3052 2700 x6608415.exe 85 PID 2700 wrote to memory of 3052 2700 x6608415.exe 85 PID 2700 wrote to memory of 3052 2700 x6608415.exe 85 PID 3052 wrote to memory of 5000 3052 x9182281.exe 86 PID 3052 wrote to memory of 5000 3052 x9182281.exe 86 PID 3052 wrote to memory of 5000 3052 x9182281.exe 86 PID 5000 wrote to memory of 3268 5000 g8210553.exe 87 PID 5000 wrote to memory of 3268 5000 g8210553.exe 87 PID 5000 wrote to memory of 3268 5000 g8210553.exe 87 PID 5000 wrote to memory of 3268 5000 g8210553.exe 87 PID 5000 wrote to memory of 3268 5000 g8210553.exe 87 PID 5000 wrote to memory of 3268 5000 g8210553.exe 87 PID 5000 wrote to memory of 3268 5000 g8210553.exe 87 PID 5000 wrote to memory of 3268 5000 g8210553.exe 87 PID 5000 wrote to memory of 3268 5000 g8210553.exe 87 PID 5000 wrote to memory of 3268 5000 g8210553.exe 87 PID 3052 wrote to memory of 2332 3052 x9182281.exe 91 PID 3052 wrote to memory of 2332 3052 x9182281.exe 91 PID 3052 wrote to memory of 2332 3052 x9182281.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe"C:\Users\Admin\AppData\Local\Temp\ca2534058cb45fd1c3c81407733fc01f8031c3b4f9d15b4210c762c631de25e4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6608415.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6608415.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9182281.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9182281.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8210553.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8210553.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 5925⤵
- Program crash
PID:1072
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1084948.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h1084948.exe4⤵
- Executes dropped EXE
PID:2332
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5000 -ip 50001⤵PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
562KB
MD5e8528ed973e45c37d910684251edb70c
SHA1ab14d3835a1f7c31419ad6318f52c461b16e40ec
SHA2565994389d5adc01e859c3e68f56c14bab184c0a9a375d608e0866bba659aa526c
SHA5126c5a28daeb82a3ad87d7a94a20316cd75dcb58c07a96ea3589700e7c9ef6a580a85c612f9af25b3973313b93bfc295f0d78b1d51e08f42ba730093a3b9b14d29
-
Filesize
396KB
MD57f0ddf8970b4e1ad9b1165200fb01d28
SHA1161551e3a49ca2bbae478ed47f00ce7a8c3f01ba
SHA256f59b1752bd8cdcbdf5b21b84b12a33f399710db9cf5c9a1b76bfafdd7849ceb9
SHA512d6bcc929a8905b66c86a8949406fa36deeda0d6e9db0ec23bae4c1faecfb9e1d3be3af6d72db95408849d77fe9d9de7aedfb244432b763f6580fcd8c8d8cf086
-
Filesize
379KB
MD5ba53e3c438f8324e5bf821e54e7d67d4
SHA11fe6638772007e95a7fa06ce7423d8ba7dad2748
SHA2564b448b31946f8a0f46f3a998573bda4b98541f5df3cf8a42124a342c0324790c
SHA512fd559852078097b84134e084dadb719b56f86e0fd26a3a39efc4d879efcaf6fba3e38e7404c0fb3dfed8a14aa0facd209f389f1bc2de99eb2f554cddbd71c4f4
-
Filesize
174KB
MD5e07a85ae578665db5433373012fc6ac9
SHA110f45e361c82e810c190163f06e2cbd4bc74bd25
SHA25665e74a7be27b401cb7cf179bef967ec17f0793de12ecd9cba01f00c2ddd83a5f
SHA512e8c796a908904b7e62aa0df79a5f70f2e2e66e71998eb23f98cadc9ba95d57607c6cf8e05bee9352ef934929acd88be27a2baf10439240fd3f9a0a0f598066d2