Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/10/2023, 04:34 UTC
Behavioral task
behavioral1
Sample
dbcd0bd3d290667882c1ab2dba469f61.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dbcd0bd3d290667882c1ab2dba469f61.exe
Resource
win10v2004-20230915-en
General
-
Target
dbcd0bd3d290667882c1ab2dba469f61.exe
-
Size
3.2MB
-
MD5
dbcd0bd3d290667882c1ab2dba469f61
-
SHA1
6a8392b6cc84d5fe11eebe5c7608017aec5fcdfc
-
SHA256
f36b1f58aebb51a74d55b774fb51849fb1668ef7c9915ac6da56d7d43fbf6782
-
SHA512
ee4185b58b124129d31f93e4c5152b236a4ab6ca1c340a6d09f200eba653f4a9908096fb72e241a1e38ff67bf71aae3e500490c1a798c44e55ac5d4d843fd83d
-
SSDEEP
49152:DOpya1VuZQol8eADmnYviG3yqpuhhofJr37Qtcb7KD1licT6HQMb:Cpya1Vw2eADpvbyqpyhofpCcbSnIQ
Malware Config
Extracted
redline
seevpalpadin-930
38.181.25.43:3325
-
auth_value
e6927db74f64e90a4b02f736972d9d7c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dbcd0bd3d290667882c1ab2dba469f61.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dbcd0bd3d290667882c1ab2dba469f61.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dbcd0bd3d290667882c1ab2dba469f61.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 dbcd0bd3d290667882c1ab2dba469f61.exe -
resource yara_rule behavioral1/memory/2936-18-0x0000000000CA0000-0x000000000134A000-memory.dmp themida behavioral1/memory/2936-58-0x0000000000CA0000-0x000000000134A000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dbcd0bd3d290667882c1ab2dba469f61.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2936 dbcd0bd3d290667882c1ab2dba469f61.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2936 set thread context of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 2620 AppLaunch.exe 2620 AppLaunch.exe 2620 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2620 AppLaunch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28 PID 2936 wrote to memory of 2620 2936 dbcd0bd3d290667882c1ab2dba469f61.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbcd0bd3d290667882c1ab2dba469f61.exe"C:\Users\Admin\AppData\Local\Temp\dbcd0bd3d290667882c1ab2dba469f61.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719