Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 18:09

General

  • Target

    0x00080000000136c268.exe

  • Size

    168KB

  • MD5

    42c63ecc92fee8bea033b0e7ed785c77

  • SHA1

    1de59f1a4882252b6d8f53b02c48424d0e734d94

  • SHA256

    0569b8afb2cac7b990683bf6976e77aa66a3a32552b67739626c79ab65ea2f4a

  • SHA512

    b42c2bd266e7f3202fe8d465ef46f55339be8548bb9396863745671be1b68ad4a7cba850bb0504b112f71ed0420f146b2138a977995424ce7ddf57b1a5093073

  • SSDEEP

    1536:Eq24CeDYZ5QqlVZRGWoysHrt3la3cOo+TGqV0buhoxW7/C6gX83wYk/8e8hK:EObYH2HaXEqVMVxI/C6gXh8e8hK

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x00080000000136c268.exe
    "C:\Users\Admin\AppData\Local\Temp\0x00080000000136c268.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1504-133-0x0000000000E10000-0x0000000000E3E000-memory.dmp

    Filesize

    184KB

  • memory/1504-134-0x000000000B290000-0x000000000B8A8000-memory.dmp

    Filesize

    6.1MB

  • memory/1504-135-0x000000000AD80000-0x000000000AE8A000-memory.dmp

    Filesize

    1.0MB

  • memory/1504-136-0x000000000AC90000-0x000000000ACA2000-memory.dmp

    Filesize

    72KB

  • memory/1504-137-0x000000000ACF0000-0x000000000AD2C000-memory.dmp

    Filesize

    240KB

  • memory/1504-138-0x00000000057E0000-0x00000000057F0000-memory.dmp

    Filesize

    64KB

  • memory/1504-139-0x000000000B100000-0x000000000B176000-memory.dmp

    Filesize

    472KB

  • memory/1504-140-0x000000000B8B0000-0x000000000B942000-memory.dmp

    Filesize

    584KB

  • memory/1504-141-0x000000000B180000-0x000000000B1E6000-memory.dmp

    Filesize

    408KB

  • memory/1504-142-0x000000000C200000-0x000000000C7A4000-memory.dmp

    Filesize

    5.6MB

  • memory/1504-143-0x000000000BFA0000-0x000000000C162000-memory.dmp

    Filesize

    1.8MB

  • memory/1504-144-0x000000000CCE0000-0x000000000D20C000-memory.dmp

    Filesize

    5.2MB

  • memory/1504-145-0x000000000BEF0000-0x000000000BF40000-memory.dmp

    Filesize

    320KB

  • memory/1504-146-0x00000000057E0000-0x00000000057F0000-memory.dmp

    Filesize

    64KB