Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2023, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
n9628571.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
n9628571.exe
Resource
win10v2004-20230220-en
General
-
Target
n9628571.exe
-
Size
284KB
-
MD5
4e250c1c7c9d9f6414eeb68730682023
-
SHA1
8444ed8b98e9d1923e7b98a5f10d6f1f374189c9
-
SHA256
6de42677ba2aa3124ceaa23438c6045b65aafc5a1222c12c19cd9dc502f4633c
-
SHA512
2c21f4795ed28d6430b010b669a692ddcd940358c9087affc30575330be1d7aa8b26d56d49163f55e05e0ebaf8ca9197124df76cb2a7d6c88eedd1376a7dd320
-
SSDEEP
6144:FDKW1Lgbdl0TBBvjc/k/wqEWYqK0rVkt4lD:9h1Lk70TnvjcM/wqQAZkC
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral2/memory/4088-137-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-140-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-138-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-142-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-144-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-146-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-148-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-150-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-152-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-154-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-156-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-158-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-160-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-162-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-164-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-166-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-168-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-170-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-172-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-174-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-176-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-178-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-180-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-182-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-184-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-186-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-188-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-190-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-192-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-194-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-196-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-198-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline behavioral2/memory/4088-200-0x00000000050E0000-0x000000000511C000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4088 n9628571.exe 4088 n9628571.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4088 n9628571.exe