Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
c399c3d52b5dc4d60230e1da4daf358d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c399c3d52b5dc4d60230e1da4daf358d.exe
Resource
win10v2004-20230220-en
General
-
Target
c399c3d52b5dc4d60230e1da4daf358d.exe
-
Size
354KB
-
MD5
c399c3d52b5dc4d60230e1da4daf358d
-
SHA1
52f59971296960fda1376f7731b797049a7965c3
-
SHA256
50ab57ec39642fb2d98e3bd5b412eb0b90db8f6c4d8c19993d534186073f1c04
-
SHA512
dd80306d9c7a6f7a1062b5834fd3ccd9b295ce021fd3ee86e8a3406811fbb6b1a2f8ac4e5a901653ad9490f5a22b01c92f234655fa6008d0aca70f153f952f3c
-
SSDEEP
6144:eLbeeki6964UMvt1M3U7AOA2Woe+yYzFQ0eh/eUfhMLa5/:AiekcWx7a0yZ0XUfAa5
Malware Config
Extracted
redline
pub2
89.22.231.25:45245
-
auth_value
ea9464d486a641bb513057e5f63399e1
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3708 set thread context of 3048 3708 c399c3d52b5dc4d60230e1da4daf358d.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 2180 3708 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3708 wrote to memory of 3048 3708 c399c3d52b5dc4d60230e1da4daf358d.exe 87 PID 3708 wrote to memory of 3048 3708 c399c3d52b5dc4d60230e1da4daf358d.exe 87 PID 3708 wrote to memory of 3048 3708 c399c3d52b5dc4d60230e1da4daf358d.exe 87 PID 3708 wrote to memory of 3048 3708 c399c3d52b5dc4d60230e1da4daf358d.exe 87 PID 3708 wrote to memory of 3048 3708 c399c3d52b5dc4d60230e1da4daf358d.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c399c3d52b5dc4d60230e1da4daf358d.exe"C:\Users\Admin\AppData\Local\Temp\c399c3d52b5dc4d60230e1da4daf358d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 2442⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3708 -ip 37081⤵PID:4840