Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
292KB
-
MD5
ad1ff967c5ea7d2c78e48c2782c59b5f
-
SHA1
8bae7900f4b59f18f8468fd4c979882c2add36f8
-
SHA256
882c10d3523f6e5060248ec72183a1e8fee42122f2688958c3fe27404bb9119c
-
SHA512
f33e9a859b2afab9062534d4e05ebb20aeb1563e97335dab8dd9cfc5ca83b867dc4476173348e679b03f4df39b3c38d75601f7067363d8254cb761650b4aae81
-
SSDEEP
3072:JxuFjXVCnN9/OnkGZLaSCFy9ChX6XIHGMGyv1whEwr3BpY8eLa0TqlQij/tqgIax:J8ZUN3ALa++q4vvwr3Bppe5qqiRqg
Malware Config
Extracted
redline
pushka6
176.123.9.142:14845
-
auth_value
6f874eb6bb4aec568dfa7c320c6ee354
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3196 set thread context of 3480 3196 file.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 1656 3196 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3480 AppLaunch.exe 3480 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3480 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3196 wrote to memory of 3480 3196 file.exe 86 PID 3196 wrote to memory of 3480 3196 file.exe 86 PID 3196 wrote to memory of 3480 3196 file.exe 86 PID 3196 wrote to memory of 3480 3196 file.exe 86 PID 3196 wrote to memory of 3480 3196 file.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 3562⤵
- Program crash
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3196 -ip 31961⤵PID:2736