Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2023, 23:44 UTC

General

  • Target

    7693fcf69f509a3f336c47dc07b564de4abbcd1a396bc951ed6404759544e8bd.exe

  • Size

    338KB

  • MD5

    c46837161a11525bd01ba2493f604100

  • SHA1

    f64044418935d0a10f12a85ba28eb48f3b8b38e7

  • SHA256

    7693fcf69f509a3f336c47dc07b564de4abbcd1a396bc951ed6404759544e8bd

  • SHA512

    a8aecbb72b273dcc305860111efebd09e4549ba862f0b452e2eb86d7b24fcbffb952e4ce2b4073bb7ce8cf04d07210f52a4349da34c2da0e9e460501c15abfb7

  • SSDEEP

    6144:nbDQmioYCCAYp5fRZOVANlZ1iJ5ZccG7uMR9NX23BoIgPEDZCO4lw1JedPlC:nbDQ7LpDcVAN1lDm3BoIgPEDZCO4lw1H

Malware Config

Extracted

Family

redline

Botnet

24.01

C2

37.220.86.164:29170

Attributes
  • auth_value

    1c7f0aa21138601b5201a3a4a0123991

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7693fcf69f509a3f336c47dc07b564de4abbcd1a396bc951ed6404759544e8bd.exe
    "C:\Users\Admin\AppData\Local\Temp\7693fcf69f509a3f336c47dc07b564de4abbcd1a396bc951ed6404759544e8bd.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4660

Network

    No results found
  • 37.220.86.164:29170
    7693fcf69f509a3f336c47dc07b564de4abbcd1a396bc951ed6404759544e8bd.exe
    2.0MB
    22.1kB
    1350
    396
  • 20.50.201.200:443
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4660-132-0x00000000004D0000-0x000000000052A000-memory.dmp

    Filesize

    360KB

  • memory/4660-133-0x0000000005560000-0x0000000005B78000-memory.dmp

    Filesize

    6.1MB

  • memory/4660-134-0x00000000050C0000-0x00000000051CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4660-135-0x0000000004FF0000-0x0000000005002000-memory.dmp

    Filesize

    72KB

  • memory/4660-136-0x0000000005050000-0x000000000508C000-memory.dmp

    Filesize

    240KB

  • memory/4660-137-0x0000000006620000-0x0000000006BC4000-memory.dmp

    Filesize

    5.6MB

  • memory/4660-138-0x00000000054B0000-0x0000000005542000-memory.dmp

    Filesize

    584KB

  • memory/4660-139-0x0000000005BF0000-0x0000000005C56000-memory.dmp

    Filesize

    408KB

  • memory/4660-140-0x00000000061F0000-0x0000000006266000-memory.dmp

    Filesize

    472KB

  • memory/4660-141-0x0000000006170000-0x00000000061C0000-memory.dmp

    Filesize

    320KB

  • memory/4660-142-0x0000000006BD0000-0x0000000006D92000-memory.dmp

    Filesize

    1.8MB

  • memory/4660-143-0x00000000087F0000-0x0000000008D1C000-memory.dmp

    Filesize

    5.2MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.