Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2023, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
430KB
-
MD5
38590b49503ebe86502c9418f11e7458
-
SHA1
9014f82d54690aaa6e0a8d602933ec6b79ce2a91
-
SHA256
5a37399feb2eebccfcb6268fcf8ed8bc1e3243ec0797daa5a6d8a4cdc993129f
-
SHA512
5d9a99832f4b56a94514c2c814e0d9fd4c82cd39782d0c2ac6d83b476227091bdbdd27a4d45568cc5e2ee7f5763cf6a4030d0cbfed4c52cf635dacae64468dc7
-
SSDEEP
6144:2prkauGpxdr+Q/BsWkrjr6dCJ77cIniSSSPauIvt9gINkSVvVERuAXJunb6:2pIuh+YBnEXTdPauUgINzFVERuAXb
Malware Config
Extracted
redline
Instals
89.23.97.107:8086
-
auth_value
8a82a3c9eb67dfb581f57e3f2c7aefe6
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3708 set thread context of 1648 3708 file.exe 99 -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 3708 file.exe 1648 jsc.exe 1648 jsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3708 file.exe Token: SeDebugPrivilege 1648 jsc.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3708 wrote to memory of 4316 3708 file.exe 79 PID 3708 wrote to memory of 4316 3708 file.exe 79 PID 3708 wrote to memory of 412 3708 file.exe 80 PID 3708 wrote to memory of 412 3708 file.exe 80 PID 3708 wrote to memory of 4124 3708 file.exe 82 PID 3708 wrote to memory of 4124 3708 file.exe 82 PID 3708 wrote to memory of 2244 3708 file.exe 81 PID 3708 wrote to memory of 2244 3708 file.exe 81 PID 3708 wrote to memory of 1984 3708 file.exe 83 PID 3708 wrote to memory of 1984 3708 file.exe 83 PID 3708 wrote to memory of 4444 3708 file.exe 84 PID 3708 wrote to memory of 4444 3708 file.exe 84 PID 3708 wrote to memory of 624 3708 file.exe 85 PID 3708 wrote to memory of 624 3708 file.exe 85 PID 3708 wrote to memory of 4828 3708 file.exe 86 PID 3708 wrote to memory of 4828 3708 file.exe 86 PID 3708 wrote to memory of 4580 3708 file.exe 87 PID 3708 wrote to memory of 4580 3708 file.exe 87 PID 3708 wrote to memory of 1172 3708 file.exe 88 PID 3708 wrote to memory of 1172 3708 file.exe 88 PID 3708 wrote to memory of 656 3708 file.exe 89 PID 3708 wrote to memory of 656 3708 file.exe 89 PID 3708 wrote to memory of 1256 3708 file.exe 90 PID 3708 wrote to memory of 1256 3708 file.exe 90 PID 3708 wrote to memory of 4024 3708 file.exe 91 PID 3708 wrote to memory of 4024 3708 file.exe 91 PID 3708 wrote to memory of 740 3708 file.exe 92 PID 3708 wrote to memory of 740 3708 file.exe 92 PID 3708 wrote to memory of 992 3708 file.exe 93 PID 3708 wrote to memory of 992 3708 file.exe 93 PID 3708 wrote to memory of 4912 3708 file.exe 94 PID 3708 wrote to memory of 4912 3708 file.exe 94 PID 3708 wrote to memory of 4272 3708 file.exe 95 PID 3708 wrote to memory of 4272 3708 file.exe 95 PID 3708 wrote to memory of 4460 3708 file.exe 96 PID 3708 wrote to memory of 4460 3708 file.exe 96 PID 3708 wrote to memory of 2784 3708 file.exe 97 PID 3708 wrote to memory of 2784 3708 file.exe 97 PID 3708 wrote to memory of 1728 3708 file.exe 98 PID 3708 wrote to memory of 1728 3708 file.exe 98 PID 3708 wrote to memory of 1648 3708 file.exe 99 PID 3708 wrote to memory of 1648 3708 file.exe 99 PID 3708 wrote to memory of 1648 3708 file.exe 99 PID 3708 wrote to memory of 1648 3708 file.exe 99 PID 3708 wrote to memory of 1648 3708 file.exe 99 PID 3708 wrote to memory of 1648 3708 file.exe 99 PID 3708 wrote to memory of 1648 3708 file.exe 99 PID 3708 wrote to memory of 1648 3708 file.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:4316
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"2⤵PID:412
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:2244
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:4124
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:1984
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:4444
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:624
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:4828
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:4580
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"2⤵PID:1172
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:656
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:1256
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:4024
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:740
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:992
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:4912
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"2⤵PID:4272
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:4460
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"2⤵PID:2784
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:1728
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-