Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2023, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
5bec555084177862a21eba17b75d068f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5bec555084177862a21eba17b75d068f.exe
Resource
win10v2004-20230703-en
General
-
Target
5bec555084177862a21eba17b75d068f.exe
-
Size
1.6MB
-
MD5
5bec555084177862a21eba17b75d068f
-
SHA1
5492298dc817a9d9cf2af44b7c228770541da2ce
-
SHA256
c9030652b5ad2388542a4f54208bb717b82fb19d1ff34289a77ebb65e9ee7b66
-
SHA512
cd5809d3f40e944177e0e8d64a2df71d60872cbe41cab8b530eacecfa2615646dbd53ad035659e384ac1bdad9841e7495c5cb44bd17698863bc3efab0514abb9
-
SSDEEP
12288:hzFb61WSg1Hf4J/gjbrVkH0HprhYkfDFQJ2i1Z/cqOWehbDFuDjR8j97OM+fwQ:tr1HfY/gjbrVrB8/cqOWaDHkbfw
Malware Config
Extracted
redline
1red1
77.246.110.195:8599
-
auth_value
743c159c0234992dee4975bf5855347b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3336 winx32apideftype.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3296 set thread context of 4188 3296 5bec555084177862a21eba17b75d068f.exe 87 PID 3336 set thread context of 4560 3336 winx32apideftype.exe 100 -
Program crash 2 IoCs
pid pid_target Process procid_target 3544 3296 WerFault.exe 84 3844 3336 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4188 AppLaunch.exe 4188 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4188 AppLaunch.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3296 wrote to memory of 4188 3296 5bec555084177862a21eba17b75d068f.exe 87 PID 3296 wrote to memory of 4188 3296 5bec555084177862a21eba17b75d068f.exe 87 PID 3296 wrote to memory of 4188 3296 5bec555084177862a21eba17b75d068f.exe 87 PID 3296 wrote to memory of 4188 3296 5bec555084177862a21eba17b75d068f.exe 87 PID 3296 wrote to memory of 4188 3296 5bec555084177862a21eba17b75d068f.exe 87 PID 4188 wrote to memory of 3336 4188 AppLaunch.exe 98 PID 4188 wrote to memory of 3336 4188 AppLaunch.exe 98 PID 4188 wrote to memory of 3336 4188 AppLaunch.exe 98 PID 3336 wrote to memory of 4560 3336 winx32apideftype.exe 100 PID 3336 wrote to memory of 4560 3336 winx32apideftype.exe 100 PID 3336 wrote to memory of 4560 3336 winx32apideftype.exe 100 PID 3336 wrote to memory of 4560 3336 winx32apideftype.exe 100 PID 3336 wrote to memory of 4560 3336 winx32apideftype.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bec555084177862a21eba17b75d068f.exe"C:\Users\Admin\AppData\Local\Temp\5bec555084177862a21eba17b75d068f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\winx32apideftype.exe"C:\Users\Admin\AppData\Local\Temp\winx32apideftype.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 3004⤵
- Program crash
PID:3844
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 1522⤵
- Program crash
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3296 -ip 32961⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3336 -ip 33361⤵PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD55e940e205fc8cd397c28682a5092cf40
SHA1245cc5d940b7cdb15e705b58ba89d0b2326fb257
SHA256042931c5b993c3d97a74c618e8e4bfe98915747014dc91c6d4ebd019588e5d00
SHA512aad86c4e26a4b9c2d9eaa0cc5c70a699ec793691095dd659b9b0b16fac2a5f449df92a362df29aca5c6431614321fad6123ceb511119a7a069aa0b11a0dc4478
-
Filesize
4.4MB
MD55e940e205fc8cd397c28682a5092cf40
SHA1245cc5d940b7cdb15e705b58ba89d0b2326fb257
SHA256042931c5b993c3d97a74c618e8e4bfe98915747014dc91c6d4ebd019588e5d00
SHA512aad86c4e26a4b9c2d9eaa0cc5c70a699ec793691095dd659b9b0b16fac2a5f449df92a362df29aca5c6431614321fad6123ceb511119a7a069aa0b11a0dc4478
-
Filesize
4.4MB
MD55e940e205fc8cd397c28682a5092cf40
SHA1245cc5d940b7cdb15e705b58ba89d0b2326fb257
SHA256042931c5b993c3d97a74c618e8e4bfe98915747014dc91c6d4ebd019588e5d00
SHA512aad86c4e26a4b9c2d9eaa0cc5c70a699ec793691095dd659b9b0b16fac2a5f449df92a362df29aca5c6431614321fad6123ceb511119a7a069aa0b11a0dc4478