Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 12:33

General

  • Target

    47e26a3424119bb3474243a62c68d0c38747b303822e8e6d0198c8fc44796126.exe

  • Size

    515KB

  • MD5

    f203dcc69457c4f08c89665d1998b068

  • SHA1

    73cb4dc56ff1d6f5c03ff884266c758a5feb5acb

  • SHA256

    47e26a3424119bb3474243a62c68d0c38747b303822e8e6d0198c8fc44796126

  • SHA512

    60bc74a72e8210868efb5fb308c8e332a62c3e599e0602f94a1c84b23bdd10153248c000d7b60f4027af526ac71636a2b524568f4173b2459a34d4f7c496c166

  • SSDEEP

    12288:0Mrdy905AKt2UKRMv1cBjTwm/dCR2XjDC8BRh6J:ZyEwUKRMvCzgsd4

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • Detect Mystic stealer payload 1 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47e26a3424119bb3474243a62c68d0c38747b303822e8e6d0198c8fc44796126.exe
    "C:\Users\Admin\AppData\Local\Temp\47e26a3424119bb3474243a62c68d0c38747b303822e8e6d0198c8fc44796126.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UK4uc7mJ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UK4uc7mJ.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1yw93zW5.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1yw93zW5.exe
        3⤵
        • Executes dropped EXE
        PID:1468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Gt312qW.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Gt312qW.exe
        3⤵
        • Executes dropped EXE
        PID:4544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\UK4uc7mJ.exe

    Filesize

    319KB

    MD5

    c6f5b294030edb3ddb25ef7ba6834181

    SHA1

    099a5023c801836db35332f93e26a9a4ea576455

    SHA256

    ccfacfbd2fd9e1dbfff5b5ecd97fbb0c0425d4ed26df44d42f65e84a3df9d0e7

    SHA512

    1623f1f0e00c50d945686dbe8994810f9dafc1b62e4492a8c6805574ad422183cc4c0ab3321c1c092997053fb9256dda144bf569acd848b78fac738ec6b61bf5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1yw93zW5.exe

    Filesize

    180KB

    MD5

    53e28e07671d832a65fbfe3aa38b6678

    SHA1

    6f9ea0ed8109030511c2c09c848f66bd0d16d1e1

    SHA256

    5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e

    SHA512

    053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2Gt312qW.exe

    Filesize

    223KB

    MD5

    9fcb2d09ee009580a5fca5585a2321fc

    SHA1

    d35192eba9d2989d41c7970cfffa5103856b8513

    SHA256

    09dae28fa8392a38adda2352bf092921bb342734e6a8f992f8c10cd6bd9c704d

    SHA512

    082ca7716a425c6fcf1aa9a397b540cd55e240f6e3ef66d8da9f2781424d86aed03dde337ee1f472c1579c8b5c371202492647b76cb34ae4a31ef577aa4c416a

  • memory/4544-17-0x000000007405E000-0x000000007405F000-memory.dmp

    Filesize

    4KB

  • memory/4544-18-0x00000000005C0000-0x00000000005FE000-memory.dmp

    Filesize

    248KB

  • memory/4544-19-0x0000000007A40000-0x0000000007FE4000-memory.dmp

    Filesize

    5.6MB

  • memory/4544-20-0x0000000007490000-0x0000000007522000-memory.dmp

    Filesize

    584KB

  • memory/4544-21-0x0000000004A80000-0x0000000004A8A000-memory.dmp

    Filesize

    40KB

  • memory/4544-22-0x0000000008610000-0x0000000008C28000-memory.dmp

    Filesize

    6.1MB

  • memory/4544-23-0x0000000007790000-0x000000000789A000-memory.dmp

    Filesize

    1.0MB

  • memory/4544-24-0x00000000076C0000-0x00000000076D2000-memory.dmp

    Filesize

    72KB

  • memory/4544-25-0x0000000007720000-0x000000000775C000-memory.dmp

    Filesize

    240KB

  • memory/4544-26-0x00000000078A0000-0x00000000078EC000-memory.dmp

    Filesize

    304KB

  • memory/4544-27-0x000000007405E000-0x000000007405F000-memory.dmp

    Filesize

    4KB