Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25/05/2023, 15:56
Behavioral task
behavioral1
Sample
2c5a75b7d24847bc5d206adb5c630a18.exe
Resource
win7-20230220-en
General
-
Target
2c5a75b7d24847bc5d206adb5c630a18.exe
-
Size
95KB
-
MD5
2c5a75b7d24847bc5d206adb5c630a18
-
SHA1
89ca4d98947ab1248c022d66a23279f04cca6bbf
-
SHA256
dd09828ffbfdd784f83cac83641b8a0c3ca04b76becabb0ab5d170ad1bc169a7
-
SHA512
2ff1ad476ea1c72f6e1cda33f601e2eae06ca87bf4554cd085e17512a88ad515e95d42706e8e0a2c2b1fe17c9e0f1c511ef1554333d17a7e6e111b1531acc789
-
SSDEEP
1536:Fqs8haqpalbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2YtmulgS6pQl:DiaKaYP+zi0ZbYe1g0ujyzdsQ
Malware Config
Extracted
redline
crypto
163.123.142.235:61068
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/1520-54-0x0000000000C10000-0x0000000000C2E000-memory.dmp family_redline behavioral1/memory/1520-55-0x00000000009B0000-0x00000000009F0000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/1520-54-0x0000000000C10000-0x0000000000C2E000-memory.dmp family_sectoprat behavioral1/memory/1520-55-0x00000000009B0000-0x00000000009F0000-memory.dmp family_sectoprat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1520 2c5a75b7d24847bc5d206adb5c630a18.exe 1520 2c5a75b7d24847bc5d206adb5c630a18.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1520 2c5a75b7d24847bc5d206adb5c630a18.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5747ae56c4c143d35c9f4deb890d470c3
SHA11bbe23d6c5eeb56f8a3ea5459bbd00cb825dc22a
SHA256e847489244a60ca420a700898a700fc01002a84aed20b1af9d4ffde6b0a3214e
SHA512f492b8d634c02d680e906f3827b53b41d69905ad59eda7c419f1f8af33a795f6330d1d88243eeab0365a1f25cf524070231ce4720034a4d0cf85a8acf5b05395