Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
109s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 11:08
Static task
static1
General
-
Target
6a98aeb5fab613ae0665adb7242bbdcfd1ffab96c6f8b01ce8febb0cd637cd3a.exe
-
Size
352KB
-
MD5
02ca33b07b4a7104d83e568d0f503a05
-
SHA1
801eae18dc2ca715c7a94356077ddc2b11ffa74f
-
SHA256
6a98aeb5fab613ae0665adb7242bbdcfd1ffab96c6f8b01ce8febb0cd637cd3a
-
SHA512
1986dd18042e2fb7cd3b8b1ccb6142d438e9139aa4d0ce91340ad3c070ae8868509f74b2ccdeeff719cbc36961fd0af723c955d65ccdc10d96392e398bec989e
-
SSDEEP
3072:YpgRzjmT9G9d8R0Tjng1uD6qtREDRYnMjbKsNvREenWsUcf8Fpkv2dQviEilz27z:VjUuPltREYMXpEGUcf8f9l8CkJEIj
Malware Config
Extracted
redline
@Germany
185.11.61.125:22344
-
auth_value
9d15d78194367a949e54a07d6ce02c62
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3080-137-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-138-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-140-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-142-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-144-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-146-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-148-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-150-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-152-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-154-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-156-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-158-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-160-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-162-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-164-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-166-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-169-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-172-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-174-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-176-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-178-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-180-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-182-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-184-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-186-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-188-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-190-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-192-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-194-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-196-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-198-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-200-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline behavioral1/memory/3080-202-0x0000000004D90000-0x0000000004DE2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4232 3080 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3080 6a98aeb5fab613ae0665adb7242bbdcfd1ffab96c6f8b01ce8febb0cd637cd3a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3080 6a98aeb5fab613ae0665adb7242bbdcfd1ffab96c6f8b01ce8febb0cd637cd3a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a98aeb5fab613ae0665adb7242bbdcfd1ffab96c6f8b01ce8febb0cd637cd3a.exe"C:\Users\Admin\AppData\Local\Temp\6a98aeb5fab613ae0665adb7242bbdcfd1ffab96c6f8b01ce8febb0cd637cd3a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 15642⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3080 -ip 30801⤵PID:1440