Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/03/2023, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
32e595d4c93e4e0ca55de6756cf23ea090ea45c86d958857f44109376b02e3b0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
32e595d4c93e4e0ca55de6756cf23ea090ea45c86d958857f44109376b02e3b0.exe
Resource
win10v2004-20230220-en
General
-
Target
32e595d4c93e4e0ca55de6756cf23ea090ea45c86d958857f44109376b02e3b0.exe
-
Size
362KB
-
MD5
341dd25109a0edf55c3169110a358e48
-
SHA1
10d375284193deed8a23103f8d9c13af138d034e
-
SHA256
32e595d4c93e4e0ca55de6756cf23ea090ea45c86d958857f44109376b02e3b0
-
SHA512
55ea10eacccaa329ecbf5f04614b24ff085adbbe555bd6dffc2781a0fa222e67dcd5adb0ea405102fab125aac390d7c92d981896bee4f35ff726b0528d1e9ce6
-
SSDEEP
6144:Yk/Lk3Hn8O58Js+fi7nmDhaUOlpfJpb7TbBnqbn4eZO:Yk/g3HPuJlK7mAnfDloZO
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/1212-55-0x0000000002540000-0x000000000259A000-memory.dmp family_redline behavioral1/memory/1212-56-0x00000000048B0000-0x0000000004908000-memory.dmp family_redline behavioral1/memory/1212-57-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-59-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-62-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-65-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-67-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-69-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-71-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-73-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-75-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-77-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-79-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-81-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-83-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-85-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-87-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-91-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-89-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-93-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-95-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-97-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-99-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-101-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-103-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-107-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-109-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-105-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-113-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-111-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-117-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-119-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-115-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-123-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-121-0x00000000048B0000-0x0000000004902000-memory.dmp family_redline behavioral1/memory/1212-850-0x0000000002250000-0x0000000002290000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1212 32e595d4c93e4e0ca55de6756cf23ea090ea45c86d958857f44109376b02e3b0.exe 1212 32e595d4c93e4e0ca55de6756cf23ea090ea45c86d958857f44109376b02e3b0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1212 32e595d4c93e4e0ca55de6756cf23ea090ea45c86d958857f44109376b02e3b0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32e595d4c93e4e0ca55de6756cf23ea090ea45c86d958857f44109376b02e3b0.exe"C:\Users\Admin\AppData\Local\Temp\32e595d4c93e4e0ca55de6756cf23ea090ea45c86d958857f44109376b02e3b0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1212