Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
76s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
10/09/2022, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
Mod menu.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Mod menu.exe
Resource
win10v2004-20220901-en
General
-
Target
Mod menu.exe
-
Size
225KB
-
MD5
e8685789e1d355b022632c6b9e8c27c7
-
SHA1
feb1c07bcba00a9184d58e92622e105671fb06a5
-
SHA256
19c3401042baeac38e94c3105dbfc1249697741f242db3f51f52eebb45c92ad9
-
SHA512
a5fea415f09765175d93ec6851cc2bfd41f75003bcd4ef4d5863233ca4e70ab6f2937e32c60408d836d2ea4dc0e6e9ad09d2948cc497e942004f780fa2760e45
-
SSDEEP
6144:FhQSSuvV2HmLa3a7guuLwjaHPm4PUdOX:FhQU4mLyGo+rOX
Malware Config
Extracted
redline
@wyuiiii
185.106.92.226:40788
-
auth_value
e616906b36ab81b0f11bcc9eadad8236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2448-133-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4932 set thread context of 2448 4932 Mod menu.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2448 AppLaunch.exe 2448 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2448 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4932 wrote to memory of 2448 4932 Mod menu.exe 87 PID 4932 wrote to memory of 2448 4932 Mod menu.exe 87 PID 4932 wrote to memory of 2448 4932 Mod menu.exe 87 PID 4932 wrote to memory of 2448 4932 Mod menu.exe 87 PID 4932 wrote to memory of 2448 4932 Mod menu.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mod menu.exe"C:\Users\Admin\AppData\Local\Temp\Mod menu.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-