Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe
Resource
win10v2004-20220901-en
General
-
Target
2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe
-
Size
239KB
-
MD5
5f66f6f04fab186a8bd08162c1e67337
-
SHA1
30fbbedab38ce51ac8009cf337794fd53552d726
-
SHA256
2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25
-
SHA512
9bb1b7f180f449fac9cdf53b94f51eb5aaaf7881b5eac3c0010d0acbeb23c82016f580764bd16643507ba5ff7d6dbd0dcc42aee3d321dafe610a9f797a5ddacf
-
SSDEEP
3072:zx+Ygbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATcYmbxO:zx+YgWg5Kq+PwQoHp0DoK2KJSTfqrhm3
Malware Config
Extracted
redline
@P1
193.106.191.138:32796
-
auth_value
54c79ce081122137049ee07c0a2f38ab
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3944-133-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5068 set thread context of 3944 5068 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 5040 5068 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe 3944 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3944 vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5068 wrote to memory of 3944 5068 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 83 PID 5068 wrote to memory of 3944 5068 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 83 PID 5068 wrote to memory of 3944 5068 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 83 PID 5068 wrote to memory of 3944 5068 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 83 PID 5068 wrote to memory of 3944 5068 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe"C:\Users\Admin\AppData\Local\Temp\2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 3402⤵
- Program crash
PID:5040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5068 -ip 50681⤵PID:3516