Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    183s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/05/2023, 04:12

General

  • Target

    735b6c9f76a6353543fbbd902d763b4b61b522f0a24df3de20ce7e70ebb8f874.exe

  • Size

    337KB

  • MD5

    f8eb858177aa9334f5dac641740a876d

  • SHA1

    010de59da046fb3d8fc719b195b902f7fc3e5a62

  • SHA256

    735b6c9f76a6353543fbbd902d763b4b61b522f0a24df3de20ce7e70ebb8f874

  • SHA512

    fa113343343fc0a510fd4aadb8d35b2311a889f0abfc5fa170a531df28b56349bc55e7b838cbcd6d48a04ca83ed9c04b16c1181d633aa451f4884d38d6bb1867

  • SSDEEP

    6144:vdEkh2JJtk1HRLOmD6XctJ4jMzn90w6iqhv+TcIzAi:vdEm2JEhRim6MkjxRphvj0

Malware Config

Extracted

Family

redline

C2

135.181.241.192:4328

Attributes
  • auth_value

    a909e2aaecf96137978fea4f86400b9b

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\735b6c9f76a6353543fbbd902d763b4b61b522f0a24df3de20ce7e70ebb8f874.exe
    "C:\Users\Admin\AppData\Local\Temp\735b6c9f76a6353543fbbd902d763b4b61b522f0a24df3de20ce7e70ebb8f874.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4912-120-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4912-128-0x00000000067D0000-0x00000000067D6000-memory.dmp

    Filesize

    24KB

  • memory/4912-129-0x0000000009410000-0x0000000009A16000-memory.dmp

    Filesize

    6.0MB

  • memory/4912-130-0x0000000008F10000-0x000000000901A000-memory.dmp

    Filesize

    1.0MB

  • memory/4912-131-0x0000000008E00000-0x0000000008E12000-memory.dmp

    Filesize

    72KB

  • memory/4912-132-0x0000000008E60000-0x0000000008E9E000-memory.dmp

    Filesize

    248KB

  • memory/4912-133-0x0000000008CF0000-0x0000000008D00000-memory.dmp

    Filesize

    64KB

  • memory/4912-134-0x0000000008EA0000-0x0000000008EEB000-memory.dmp

    Filesize

    300KB

  • memory/4912-139-0x0000000008CF0000-0x0000000008D00000-memory.dmp

    Filesize

    64KB

  • memory/4912-140-0x0000000009180000-0x00000000091F6000-memory.dmp

    Filesize

    472KB

  • memory/4912-141-0x00000000092A0000-0x0000000009332000-memory.dmp

    Filesize

    584KB

  • memory/4912-142-0x0000000009200000-0x0000000009266000-memory.dmp

    Filesize

    408KB

  • memory/4912-143-0x000000000A530000-0x000000000AA2E000-memory.dmp

    Filesize

    5.0MB

  • memory/4912-718-0x000000000A360000-0x000000000A522000-memory.dmp

    Filesize

    1.8MB

  • memory/4912-719-0x000000000B6B0000-0x000000000BBDC000-memory.dmp

    Filesize

    5.2MB