Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    55s
  • max time network
    64s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/06/2023, 23:47

General

  • Target

    9471dc83530260252412901293a9b67bb45df7fea69eb900d8f9ac876f679beb.exe

  • Size

    256KB

  • MD5

    882a337b9c47f484860ec97f3f52131e

  • SHA1

    436452b23f713d99b0f71c1a7f0848a69e39856e

  • SHA256

    9471dc83530260252412901293a9b67bb45df7fea69eb900d8f9ac876f679beb

  • SHA512

    e847a170aeb0f7281b486a0e9af2c45de0a9df0f5a0b34aea3004c1344a7b637f7d96af0f6deeea6ce2ab3364538a925f5096a81a13cb225a98ee8227ae1b8e9

  • SSDEEP

    6144:izRN/cr0TZC4xR4aPYaD4hYhJWJSW/Ven:o60TZCO4r

Malware Config

Extracted

Family

redline

Botnet

joker

C2

83.97.73.130:19061

Attributes
  • auth_value

    a98d303cc28bb3b32a23c59214ae3bc0

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9471dc83530260252412901293a9b67bb45df7fea69eb900d8f9ac876f679beb.exe
    "C:\Users\Admin\AppData\Local\Temp\9471dc83530260252412901293a9b67bb45df7fea69eb900d8f9ac876f679beb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4268-120-0x00000000006E0000-0x0000000000710000-memory.dmp

    Filesize

    192KB

  • memory/4268-124-0x0000000002430000-0x0000000002436000-memory.dmp

    Filesize

    24KB

  • memory/4268-125-0x0000000004C00000-0x0000000005206000-memory.dmp

    Filesize

    6.0MB

  • memory/4268-126-0x0000000005210000-0x000000000531A000-memory.dmp

    Filesize

    1.0MB

  • memory/4268-127-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

    Filesize

    72KB

  • memory/4268-128-0x0000000005320000-0x000000000535E000-memory.dmp

    Filesize

    248KB

  • memory/4268-129-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/4268-130-0x00000000053A0000-0x00000000053EB000-memory.dmp

    Filesize

    300KB

  • memory/4268-131-0x00000000054E0000-0x0000000005556000-memory.dmp

    Filesize

    472KB

  • memory/4268-132-0x0000000005560000-0x00000000055F2000-memory.dmp

    Filesize

    584KB

  • memory/4268-133-0x0000000005600000-0x0000000005666000-memory.dmp

    Filesize

    408KB

  • memory/4268-134-0x0000000005D30000-0x000000000622E000-memory.dmp

    Filesize

    5.0MB

  • memory/4268-135-0x00000000063B0000-0x0000000006572000-memory.dmp

    Filesize

    1.8MB

  • memory/4268-136-0x0000000006580000-0x0000000006AAC000-memory.dmp

    Filesize

    5.2MB

  • memory/4268-137-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/4268-138-0x0000000006BB0000-0x0000000006C00000-memory.dmp

    Filesize

    320KB