Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    85s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2023, 14:59

General

  • Target

    3b3ed329b47e2b7162409b682aa61653.exe

  • Size

    284KB

  • MD5

    3b3ed329b47e2b7162409b682aa61653

  • SHA1

    32c21b4e0687c88de0687b86d6215c0bf03c7373

  • SHA256

    47677d1b0a154564df5f5fbf5f16e8c2dd493dc3c927ab44afaf971c0120793d

  • SHA512

    b125268b3f35fe6c01b4babf5786082cf3dd3ffa733d8a92d5d3cd1d89f16a24b0923fa73a357fff4da52703bb2610bddb8acf5f9ae455cbe09ea3df430e216b

  • SSDEEP

    6144:isO3VUfHU6Ps3bsmci25sndkzOYFwKBbvoEo+ciVh+d76u578C1A1EofDdxpHSqp:6QHnQLiVhc6uuEABLdb+jWrtJw7EszfG

Malware Config

Extracted

Family

redline

Botnet

1006

C2

176.123.9.142:14845

Attributes
  • auth_value

    b5da80860b093905c2bba6f9377af704

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b3ed329b47e2b7162409b682aa61653.exe
    "C:\Users\Admin\AppData\Local\Temp\3b3ed329b47e2b7162409b682aa61653.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4452-133-0x0000000002180000-0x00000000021B0000-memory.dmp

    Filesize

    192KB

  • memory/4452-137-0x000000000A5E0000-0x000000000ABF8000-memory.dmp

    Filesize

    6.1MB

  • memory/4452-138-0x0000000009FF0000-0x000000000A0FA000-memory.dmp

    Filesize

    1.0MB

  • memory/4452-139-0x000000000A130000-0x000000000A142000-memory.dmp

    Filesize

    72KB

  • memory/4452-140-0x000000000A150000-0x000000000A18C000-memory.dmp

    Filesize

    240KB

  • memory/4452-141-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4452-142-0x000000000A330000-0x000000000A3A6000-memory.dmp

    Filesize

    472KB

  • memory/4452-143-0x000000000A4B0000-0x000000000A542000-memory.dmp

    Filesize

    584KB

  • memory/4452-144-0x000000000AC00000-0x000000000B1A4000-memory.dmp

    Filesize

    5.6MB

  • memory/4452-145-0x000000000B1B0000-0x000000000B216000-memory.dmp

    Filesize

    408KB

  • memory/4452-146-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4452-147-0x0000000002590000-0x00000000025E0000-memory.dmp

    Filesize

    320KB

  • memory/4452-148-0x000000000B980000-0x000000000BB42000-memory.dmp

    Filesize

    1.8MB

  • memory/4452-149-0x000000000BB50000-0x000000000C07C000-memory.dmp

    Filesize

    5.2MB