Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 17:15
Static task
static1
General
-
Target
8b0109fc8d4c53a5e38e099ee6d2bbd0515dadfc69317819471aeac57ecc5cfb.exe
-
Size
362KB
-
MD5
261dc582f719f9055c86dd1c748fe49a
-
SHA1
604d5cb471e3cb27dacf9530cd8becb6343d0ca6
-
SHA256
8b0109fc8d4c53a5e38e099ee6d2bbd0515dadfc69317819471aeac57ecc5cfb
-
SHA512
da05ffc5cf7d81c8c1eb54eebb53caa88294671ce9f391cf8990c996e4f7a286ba4c18b63fdcc81400a1da091cfbf448f907a25f729cdb005e09813d9114e942
-
SSDEEP
6144:Wa4Av9+TdLE09xBDOHBOAvL/BXb9AG994VRWQwuC/:3HETdQQROH/lXxAG9WWQB
Malware Config
Extracted
redline
@Germany
185.11.61.125:22344
-
auth_value
9d15d78194367a949e54a07d6ce02c62
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/2692-138-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-139-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-141-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-143-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-145-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-147-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-149-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-151-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-153-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-155-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-157-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-159-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-161-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-163-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-165-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-167-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-169-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-171-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-173-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-176-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-178-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-180-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-182-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-184-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-186-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-188-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-190-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-192-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-194-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-196-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-198-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-200-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline behavioral1/memory/2692-202-0x0000000005460000-0x00000000054B2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4324 2692 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2692 8b0109fc8d4c53a5e38e099ee6d2bbd0515dadfc69317819471aeac57ecc5cfb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 8b0109fc8d4c53a5e38e099ee6d2bbd0515dadfc69317819471aeac57ecc5cfb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b0109fc8d4c53a5e38e099ee6d2bbd0515dadfc69317819471aeac57ecc5cfb.exe"C:\Users\Admin\AppData\Local\Temp\8b0109fc8d4c53a5e38e099ee6d2bbd0515dadfc69317819471aeac57ecc5cfb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 17602⤵
- Program crash
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2692 -ip 26921⤵PID:1888