Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2023, 05:38

General

  • Target

    3a3c346d5fee6a54dce3b2b800b0941e0847816b8c70d096dd6ca2619a3985ee.exe

  • Size

    339KB

  • MD5

    a78586ea0c48123cd484a94d57d0015e

  • SHA1

    2f8e1566332818ca7212bd13b1bb0d31791a2957

  • SHA256

    3a3c346d5fee6a54dce3b2b800b0941e0847816b8c70d096dd6ca2619a3985ee

  • SHA512

    32070f3855d502ad8ac3bf124713e1e4684294d7c6454c6655efbec2056980ce317f06bf0069b1b78bc97adf698b5c3a3dbca26f040dd683a6f0c8510ecee149

  • SSDEEP

    6144:nbDQmioYCCAYp5fRZOVANlZ1iJ5ZccG7uMR9NX23BoIgPEDZCO4lw1JedPlC:nbDQ7LpDcVAN1lDm3BoIgPEDZCO4lw1H

Malware Config

Extracted

Family

redline

Botnet

24.01

C2

37.220.86.164:29170

Attributes
  • auth_value

    1c7f0aa21138601b5201a3a4a0123991

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a3c346d5fee6a54dce3b2b800b0941e0847816b8c70d096dd6ca2619a3985ee.exe
    "C:\Users\Admin\AppData\Local\Temp\3a3c346d5fee6a54dce3b2b800b0941e0847816b8c70d096dd6ca2619a3985ee.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2504-132-0x0000000000170000-0x00000000001CA000-memory.dmp

    Filesize

    360KB

  • memory/2504-133-0x0000000005240000-0x0000000005858000-memory.dmp

    Filesize

    6.1MB

  • memory/2504-134-0x0000000004D60000-0x0000000004E6A000-memory.dmp

    Filesize

    1.0MB

  • memory/2504-135-0x0000000004C90000-0x0000000004CA2000-memory.dmp

    Filesize

    72KB

  • memory/2504-136-0x0000000004CF0000-0x0000000004D2C000-memory.dmp

    Filesize

    240KB

  • memory/2504-137-0x0000000006300000-0x00000000068A4000-memory.dmp

    Filesize

    5.6MB

  • memory/2504-138-0x0000000005150000-0x00000000051E2000-memory.dmp

    Filesize

    584KB

  • memory/2504-139-0x00000000058D0000-0x0000000005936000-memory.dmp

    Filesize

    408KB

  • memory/2504-140-0x0000000006120000-0x00000000062E2000-memory.dmp

    Filesize

    1.8MB

  • memory/2504-141-0x00000000084D0000-0x00000000089FC000-memory.dmp

    Filesize

    5.2MB

  • memory/2504-142-0x0000000007840000-0x00000000078B6000-memory.dmp

    Filesize

    472KB

  • memory/2504-143-0x00000000078C0000-0x0000000007910000-memory.dmp

    Filesize

    320KB