Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/01/2025, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
0e0d4b5ddacf76662c6b36a1110db0a5.exe
Resource
win7-20240903-en
General
-
Target
0e0d4b5ddacf76662c6b36a1110db0a5.exe
-
Size
851KB
-
MD5
0e0d4b5ddacf76662c6b36a1110db0a5
-
SHA1
5b4c839317566b54a3dc04fb335ef453683775c7
-
SHA256
8c758b00cb5411492ccb15c015b491ac41358a48319e14cd83e0332a07b9eaaf
-
SHA512
b1e3c25bbd8afa40f92fd1ff3c0e2db78bed43c8bd6ada1ed68bdb09b6c4acdc9d48bb94f7f08edd408692d18bc0623fe3d5ce57fdd5a3c436c0bd1890c72095
-
SSDEEP
12288:bTW3WYMV+I4MVKWIJ44LZuyC0JBTSwqVKT5NwjZDuPYAYcFa8NALLQ4sgOAVHa8p:HMGRgcK9CuSwqVKlK9DWM8NALsOHwhw
Malware Config
Extracted
redline
Bot
87.120.120.4:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2276-29-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2276-32-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2276-30-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2276-26-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2276-24-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2800 powershell.exe 2572 powershell.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2276 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e0d4b5ddacf76662c6b36a1110db0a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e0d4b5ddacf76662c6b36a1110db0a5.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2800 powershell.exe 2572 powershell.exe 2276 0e0d4b5ddacf76662c6b36a1110db0a5.exe 2276 0e0d4b5ddacf76662c6b36a1110db0a5.exe 2276 0e0d4b5ddacf76662c6b36a1110db0a5.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2800 powershell.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2276 0e0d4b5ddacf76662c6b36a1110db0a5.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2572 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 31 PID 2280 wrote to memory of 2572 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 31 PID 2280 wrote to memory of 2572 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 31 PID 2280 wrote to memory of 2572 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 31 PID 2280 wrote to memory of 2800 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 33 PID 2280 wrote to memory of 2800 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 33 PID 2280 wrote to memory of 2800 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 33 PID 2280 wrote to memory of 2800 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 33 PID 2280 wrote to memory of 2912 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 34 PID 2280 wrote to memory of 2912 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 34 PID 2280 wrote to memory of 2912 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 34 PID 2280 wrote to memory of 2912 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 34 PID 2280 wrote to memory of 2276 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 37 PID 2280 wrote to memory of 2276 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 37 PID 2280 wrote to memory of 2276 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 37 PID 2280 wrote to memory of 2276 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 37 PID 2280 wrote to memory of 2276 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 37 PID 2280 wrote to memory of 2276 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 37 PID 2280 wrote to memory of 2276 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 37 PID 2280 wrote to memory of 2276 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 37 PID 2280 wrote to memory of 2276 2280 0e0d4b5ddacf76662c6b36a1110db0a5.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e0d4b5ddacf76662c6b36a1110db0a5.exe"C:\Users\Admin\AppData\Local\Temp\0e0d4b5ddacf76662c6b36a1110db0a5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0e0d4b5ddacf76662c6b36a1110db0a5.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZlrSunD.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZlrSunD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1DAE.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\0e0d4b5ddacf76662c6b36a1110db0a5.exe"C:\Users\Admin\AppData\Local\Temp\0e0d4b5ddacf76662c6b36a1110db0a5.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD570c126ba076ea75d60b85af70aaa2a60
SHA128308f042e53dd2d02b86a9d68b071d0874dd8ec
SHA25667d275ecda6b4b4c1b091b6c8080613723c734bd351a238c62236abf83c5bead
SHA512e5f944b7ee7cf73a1b7c51c477a36a3dcd6da4e86d15b03fb144c4de76dbdde38c85849f5f5fd4efd9824d6aa3fa2ce1943d9186f75f94a93bf041bb196fd5bc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD511eed6ddf8a2699afffe3c5c10818bbe
SHA1603cd8c25d8dc1d027868467e5995f7258fb8958
SHA25629ff66dee8e341fed466b5ca1381e00f32962c3c6760e0366c703db67891cecc
SHA512c7b17ac11aabbe794d65067a9f048896c41b2b093e741d97dc670391a543b8d0d9715eda25835aa380e913920b6e284809642da727735726cdc8a047dec9bf49