Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2023, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe
Resource
win7-20230220-en
General
-
Target
a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe
-
Size
896KB
-
MD5
e01eed093c11df9172d1a70484e8f973
-
SHA1
6a9b4f44a5d2cdab4770811543963e66f09d97ec
-
SHA256
a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f409c5f210fbd3f861bb
-
SHA512
6a6a327210f5d35a307c1b9b66bf6e5b65b7cb2303e9126a5457a1be1ac708281cca0a4aea6d4b55e503e930a24213218271e261f80f5df4162be351317c8022
-
SSDEEP
12288:C4a2aC3D3Lfzn7PjXNWjCT3eOPRRlWXYtvp0OjGP91pCmOBgu50x3ecZ:HsjCT6u0tP/OBgu50x3ecZ
Malware Config
Extracted
redline
MatyWon2
85.31.54.216:43728
-
auth_value
abc9e9d7ec3024110589ea03bcfaaa89
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4604 set thread context of 320 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 320 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 320 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 320 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4604 wrote to memory of 1684 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 86 PID 4604 wrote to memory of 1684 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 86 PID 4604 wrote to memory of 1684 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 86 PID 4604 wrote to memory of 1684 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 86 PID 4604 wrote to memory of 320 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 90 PID 4604 wrote to memory of 320 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 90 PID 4604 wrote to memory of 320 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 90 PID 4604 wrote to memory of 320 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 90 PID 4604 wrote to memory of 320 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 90 PID 4604 wrote to memory of 320 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 90 PID 4604 wrote to memory of 320 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 90 PID 4604 wrote to memory of 320 4604 a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe"C:\Users\Admin\AppData\Local\Temp\a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exeC:\Users\Admin\AppData\Local\Temp\a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe2⤵PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exeC:\Users\Admin\AppData\Local\Temp\a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a32d74feaebde8f218d02d99347983aa9b9be0ec85a4f.exe.log
Filesize1KB
MD5a3c82409506a33dec1856104ca55cbfd
SHA12e2ba4e4227590f8821002831c5410f7f45fe812
SHA256780a0d4410f5f9798cb573bcd774561d1439987a39b1368d3c890226928cd203
SHA5129621cfd3dab86d964a2bea6b3788fc19a895307962dcc41428741b8a86291f114df722e9017f755f63d53d09b5111e68f05aa505d9c9deae6c4378a87cdfa69f