Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe
Resource
win10v2004-20241007-en
General
-
Target
10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe
-
Size
1.1MB
-
MD5
603ddcf7d38452d0ba19362c82622e58
-
SHA1
96fb4f2f21ee3f48a921f270bde6339b7706ed04
-
SHA256
10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af
-
SHA512
b6c71b92d3eea1d067e0b8c852d3e398b0bb2aafaf55e5ab580b71e6c01f14214ebfa1b10501b01be7ddad340d72d0b4986b6763a121be96e20b8b0c4829c0b6
-
SSDEEP
24576:Jy48Lx+qmMyt7gtzl6RMGRfXAdylOigMA53UbcUtbp25bPxKrwksIv:8lxAM6R71XPOiTwU1p21E6I
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c95-19.dat family_redline behavioral1/memory/3664-21-0x0000000000540000-0x000000000056A000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4576 x3214298.exe 4464 x3095975.exe 3664 f4313612.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3214298.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3095975.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x3214298.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x3095975.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4313612.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4576 2896 10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe 83 PID 2896 wrote to memory of 4576 2896 10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe 83 PID 2896 wrote to memory of 4576 2896 10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe 83 PID 4576 wrote to memory of 4464 4576 x3214298.exe 84 PID 4576 wrote to memory of 4464 4576 x3214298.exe 84 PID 4576 wrote to memory of 4464 4576 x3214298.exe 84 PID 4464 wrote to memory of 3664 4464 x3095975.exe 86 PID 4464 wrote to memory of 3664 4464 x3095975.exe 86 PID 4464 wrote to memory of 3664 4464 x3095975.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe"C:\Users\Admin\AppData\Local\Temp\10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3214298.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3214298.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3095975.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3095975.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4313612.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4313612.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3664
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
750KB
MD5fe82b5301b2c76aa3cb4728b9f4ada70
SHA1dfcfc0a5491f830a84218504a4377cd31bb5a6fd
SHA256c8be141662b86c573a4e687185286fc085cb87a3920f8b9962e11d155e6af04f
SHA51259d2112093170658ff98ddf5f9b003182a3d08ee6911c87f91b5fc9780e34419afee05c7d61817473781d32fa007525d8d8035cc44b8f635d1eba59066857bd6
-
Filesize
305KB
MD58dc79b766579851029ebcc38e3c665ff
SHA12c0211f5f9996c840442e3e2a304b9531ec7f0e5
SHA256617cd5ceddca55d5c02c0a6f4241142b856994d5f64b2e367ed4e61fdab8c6f1
SHA512b63d3952ab0a0b7f6bf97f580c4c1d244eec63c2ca16b7e535ab42550d1d70fe9629ae01901129cb275b176a1e70d88240473cb6f3a982bf55fa940dc673b60c
-
Filesize
145KB
MD572a989ad13f5e0097446b1968eb470a7
SHA1f0448ffacdb062f1b7718e6c7dc2572515597484
SHA2562374127867ed3d61a6f165a97c5e5229759da9492d6869a64f8f37e55d4abbbe
SHA512f36a906032ca1bfd1f4b3a4bd741eb83c515ff97c034e284c38b20a20b62be53cf880c7572dc5fac22d66376349059eed1a5fa7979812c61ae1178374867e0c9