Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2023, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
cd3b625cb2fe094def21db9f7261c9d83873471dd3ef060345c391bd12af84b8_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
cd3b625cb2fe094def21db9f7261c9d83873471dd3ef060345c391bd12af84b8_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
cd3b625cb2fe094def21db9f7261c9d83873471dd3ef060345c391bd12af84b8_JC.exe
-
Size
361KB
-
MD5
43bbed8db3d574acd479bb95fdaeb89f
-
SHA1
3cbd4ff5252f1505471ba80608345d5fd8b300a8
-
SHA256
cd3b625cb2fe094def21db9f7261c9d83873471dd3ef060345c391bd12af84b8
-
SHA512
0a765113eddc4e0bac10bc9ccb69000fab17df13fa7fd0f634f87a8adefc3344369d508cc0bbf638f994c04ca6cd6ccbf89dc236dfb2773296d94f31fe6b50ab
-
SSDEEP
6144:kChTLg/abRhtQ8c4UrZqlvnTfbCEJ/faO2DR+huD4NA:ksE/abRhK4UeXfaOqw04NA
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral2/memory/4400-140-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-141-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-143-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-145-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-147-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-151-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-153-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-149-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-155-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-157-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-159-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-161-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-163-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-165-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-167-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-169-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-171-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-173-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-175-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-177-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-179-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-181-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-183-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-185-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-187-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-189-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-191-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-193-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-195-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-197-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-199-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-201-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline behavioral2/memory/4400-203-0x0000000003B70000-0x0000000003BAA000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4400 cd3b625cb2fe094def21db9f7261c9d83873471dd3ef060345c391bd12af84b8_JC.exe 4400 cd3b625cb2fe094def21db9f7261c9d83873471dd3ef060345c391bd12af84b8_JC.exe 4400 cd3b625cb2fe094def21db9f7261c9d83873471dd3ef060345c391bd12af84b8_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4400 cd3b625cb2fe094def21db9f7261c9d83873471dd3ef060345c391bd12af84b8_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd3b625cb2fe094def21db9f7261c9d83873471dd3ef060345c391bd12af84b8_JC.exe"C:\Users\Admin\AppData\Local\Temp\cd3b625cb2fe094def21db9f7261c9d83873471dd3ef060345c391bd12af84b8_JC.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400