Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
autorun.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
autorun.exe
Resource
win10v2004-20230915-en
General
-
Target
autorun.exe
-
Size
1.0MB
-
MD5
4e3304bd81a45a4a02d298dc508194c0
-
SHA1
b09d6899f03e48da77fee9e905741793064e116e
-
SHA256
613f058b34419fa46aaf71c61ec0afe963c133e023b6f75d889fb67395ddaf1b
-
SHA512
eecf0d026900af4157ec4f53428dd9af54ee29ca10187d08e9227f64265d6ac4c86a85bcb54bdc4f301d9ee8d842711db36653225c30a188073ed655ad44a901
-
SSDEEP
24576:YM573oyJAzoy99wIqjQfgia8gzhkxsWSPjmJRGYPVs:YM573oyy99wICQB22x/m
Malware Config
Extracted
redline
unique285
194.169.175.232:45451
-
auth_value
1ed06994a9a19d3729019cb69c1f61a6
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4696 set thread context of 1872 4696 autorun.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1872 vbc.exe 1872 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1872 vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4696 wrote to memory of 1872 4696 autorun.exe 89 PID 4696 wrote to memory of 1872 4696 autorun.exe 89 PID 4696 wrote to memory of 1872 4696 autorun.exe 89 PID 4696 wrote to memory of 1872 4696 autorun.exe 89 PID 4696 wrote to memory of 1872 4696 autorun.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\autorun.exe"C:\Users\Admin\AppData\Local\Temp\autorun.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-