Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
55440bf680d4b947e341695136199bbd6ad8b3cf5c39a112b40faa1e73a809fc.exe
Resource
win10v2004-20241007-en
General
-
Target
55440bf680d4b947e341695136199bbd6ad8b3cf5c39a112b40faa1e73a809fc.exe
-
Size
376KB
-
MD5
014f68b15f1ad96765569f3a57f619bf
-
SHA1
6f5fb81dbc114c1302d567d4fd339a2ac95f8975
-
SHA256
55440bf680d4b947e341695136199bbd6ad8b3cf5c39a112b40faa1e73a809fc
-
SHA512
70a3cde16db693dbfb4c9e9c154fc98dfa8c72b396e336da55ca097ca55120114fa54a9af2a7c93bfa98945ef9c3e4b581f57b9ee48a2116a6773025d8f0113e
-
SSDEEP
6144:Kqy+bnr+4p0yN90QEVHmoFmJE+/nEfbvIVcA0cWaKOcVPEtJ6uOGxosYZQ1c3:6Mroy90jFEE5QV8aK7V0U/sYec3
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ce7-12.dat family_redline behavioral1/memory/2500-15-0x0000000000560000-0x0000000000588000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 668 x6708771.exe 2500 g6169466.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55440bf680d4b947e341695136199bbd6ad8b3cf5c39a112b40faa1e73a809fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6708771.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g6169466.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55440bf680d4b947e341695136199bbd6ad8b3cf5c39a112b40faa1e73a809fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x6708771.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3808 wrote to memory of 668 3808 55440bf680d4b947e341695136199bbd6ad8b3cf5c39a112b40faa1e73a809fc.exe 85 PID 3808 wrote to memory of 668 3808 55440bf680d4b947e341695136199bbd6ad8b3cf5c39a112b40faa1e73a809fc.exe 85 PID 3808 wrote to memory of 668 3808 55440bf680d4b947e341695136199bbd6ad8b3cf5c39a112b40faa1e73a809fc.exe 85 PID 668 wrote to memory of 2500 668 x6708771.exe 86 PID 668 wrote to memory of 2500 668 x6708771.exe 86 PID 668 wrote to memory of 2500 668 x6708771.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\55440bf680d4b947e341695136199bbd6ad8b3cf5c39a112b40faa1e73a809fc.exe"C:\Users\Admin\AppData\Local\Temp\55440bf680d4b947e341695136199bbd6ad8b3cf5c39a112b40faa1e73a809fc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6708771.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6708771.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6169466.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6169466.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD50452e95c3559f8af746b16d7ab8b1705
SHA15533da8f7735f32e47d9e2784b5fc4e2a5d8688a
SHA2560d986112745dd5d48ea898af585634c1b22d0da1400e729545ed038ebb5244a8
SHA512df5a5e67be9b8d819ce2d48845376c250bc7d581a7cdc67e96158a6f5f0256850f1c028696c58ecf318fe92e36eae82600511d9218d048aa5770fa0e2290656e
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0