Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2022, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
068514f5a92707c86c3494f9868f898c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
068514f5a92707c86c3494f9868f898c.exe
Resource
win10v2004-20220812-en
General
-
Target
068514f5a92707c86c3494f9868f898c.exe
-
Size
2.5MB
-
MD5
068514f5a92707c86c3494f9868f898c
-
SHA1
946971adbbea34eb91f91e1d593bb97b2d63fa11
-
SHA256
7355dd57286957e0aac341c5b8483dd2dc7fb6d6e8f1704e9386efe30ede751c
-
SHA512
2bbe00afcc47a8d40c1ca87383c3fb4f9159861e75fa9e04dad12d953dd3d8a0a5c5a43aa6c8582af4ce3eeef4ab79976e30233e597cbd0acb40a558a1f98b32
-
SSDEEP
24576:KBIgYBHadgaFPaDYVYp41jlDSM5ldgalC8j+2CxGI6L/nLz1l3RuQ55313X:gInB6dgaFP40xq/xt6L/n31l3N
Malware Config
Extracted
redline
5744794367_99
zaraat.xyz:37397
-
auth_value
3a48ab7a0fb74109c7045f72b67b61e0
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/100564-133-0x0000000000190000-0x00000000001B0000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1584 set thread context of 100564 1584 068514f5a92707c86c3494f9868f898c.exe 83 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 100564 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 100564 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1584 wrote to memory of 100564 1584 068514f5a92707c86c3494f9868f898c.exe 83 PID 1584 wrote to memory of 100564 1584 068514f5a92707c86c3494f9868f898c.exe 83 PID 1584 wrote to memory of 100564 1584 068514f5a92707c86c3494f9868f898c.exe 83 PID 1584 wrote to memory of 100564 1584 068514f5a92707c86c3494f9868f898c.exe 83 PID 1584 wrote to memory of 100564 1584 068514f5a92707c86c3494f9868f898c.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\068514f5a92707c86c3494f9868f898c.exe"C:\Users\Admin\AppData\Local\Temp\068514f5a92707c86c3494f9868f898c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:100564
-