Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe
Resource
win10v2004-20241007-en
General
-
Target
95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe
-
Size
480KB
-
MD5
a335e43c4f994ad9217a02b1afd10cef
-
SHA1
02e280e606d5631b5f483c16dbd5ace0add25f5f
-
SHA256
95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6
-
SHA512
b28a39bc1f8333e5e51857900b3d5bf869363c1b3d56a2bad50b82bf48b5dfe15350d30757ddf1f82add93997bdc56631b352d54324416efea5de28b51e848e4
-
SSDEEP
12288:4MrLy905Lh23CKqu225yrxdo36DCUxx1M:zyChqCKqu228rf91M
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b9c-12.dat family_redline behavioral1/memory/4560-15-0x0000000000920000-0x0000000000948000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 4448 x8597964.exe 4560 g8243327.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8597964.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x8597964.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g8243327.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2404 wrote to memory of 4448 2404 95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe 85 PID 2404 wrote to memory of 4448 2404 95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe 85 PID 2404 wrote to memory of 4448 2404 95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe 85 PID 4448 wrote to memory of 4560 4448 x8597964.exe 86 PID 4448 wrote to memory of 4560 4448 x8597964.exe 86 PID 4448 wrote to memory of 4560 4448 x8597964.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe"C:\Users\Admin\AppData\Local\Temp\95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8597964.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8597964.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8243327.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8243327.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5559e1fef62802080660720c0a17265a3
SHA153e1c408bc9caca9ced9ab03b89ef18ea971adad
SHA25659b2bd04a7a8f0f91180e4acbd2dd40aabca9d2a8e89531f42da892b2e5eaae8
SHA512c57ad6bf6dc3d2d1ee46860b179842a50e92e25f675e69c521589d694d0d1f64a8824b86577cd99c54d3d894e9a535184d2323b2ed71efd2f0aa2728efacbaea
-
Filesize
136KB
MD562b511f868b541fcab2d80602c748cef
SHA157ecbb2e7c5f3619932d80d0bbfe112be96b5e47
SHA256e1e30646e8f820ef0892561925d6b83e0a46f75c6311bc1a9bd9df2977dc1acb
SHA5123fa75015978742bb2de8126875e73db884a0783a0a08972c6e01622268e4ddc8183cb5c44f42fb465f8b61cc48ce86fa821cd6f1323c4c0e3c7241c46b6c1895