Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    71s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/09/2022, 14:42

General

  • Target

    975631dae8c1851598da2c82597c1de26c9c6c102615a8ee54f8ffe4bf88364a.exe

  • Size

    360KB

  • MD5

    32907a749ec6598ed03de4ed65869bd6

  • SHA1

    a358aaa456414e3359be3903bf8ddbc3de66a078

  • SHA256

    975631dae8c1851598da2c82597c1de26c9c6c102615a8ee54f8ffe4bf88364a

  • SHA512

    50bc2f4226cec7f9c0fe5c4ca56f8003f7af60ea770ef0d162795c95ddda6416808107e3cf9e031bc22c3a39bc9cf720bb4f7522dc1981249899c6d16c237122

  • SSDEEP

    6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv

Malware Config

Extracted

Family

redline

Botnet

0002

C2

13.72.81.58:13413

Attributes
  • auth_value

    866ce0ed8cfe2be77fb43a4912677698

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\975631dae8c1851598da2c82597c1de26c9c6c102615a8ee54f8ffe4bf88364a.exe
    "C:\Users\Admin\AppData\Local\Temp\975631dae8c1851598da2c82597c1de26c9c6c102615a8ee54f8ffe4bf88364a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4468-132-0x0000000000140000-0x00000000001A0000-memory.dmp

    Filesize

    384KB

  • memory/4468-133-0x000000000A7F0000-0x000000000AE08000-memory.dmp

    Filesize

    6.1MB

  • memory/4468-134-0x000000000A350000-0x000000000A45A000-memory.dmp

    Filesize

    1.0MB

  • memory/4468-135-0x000000000A280000-0x000000000A292000-memory.dmp

    Filesize

    72KB

  • memory/4468-136-0x000000000A2E0000-0x000000000A31C000-memory.dmp

    Filesize

    240KB

  • memory/4468-137-0x000000000B3C0000-0x000000000B964000-memory.dmp

    Filesize

    5.6MB

  • memory/4468-138-0x000000000A740000-0x000000000A7D2000-memory.dmp

    Filesize

    584KB

  • memory/4468-139-0x000000000AE10000-0x000000000AE76000-memory.dmp

    Filesize

    408KB

  • memory/4468-140-0x000000000B2E0000-0x000000000B356000-memory.dmp

    Filesize

    472KB

  • memory/4468-141-0x000000000B360000-0x000000000B3B0000-memory.dmp

    Filesize

    320KB

  • memory/4468-142-0x000000000BC40000-0x000000000BE02000-memory.dmp

    Filesize

    1.8MB

  • memory/4468-143-0x000000000C340000-0x000000000C86C000-memory.dmp

    Filesize

    5.2MB