Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
ee88a284fb166e55f13a75ea3096d22c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ee88a284fb166e55f13a75ea3096d22c.exe
Resource
win10v2004-20230915-en
General
-
Target
ee88a284fb166e55f13a75ea3096d22c.exe
-
Size
1.3MB
-
MD5
ee88a284fb166e55f13a75ea3096d22c
-
SHA1
8d1ca81068a1286f89ce4bc23a4ce3d3e5bf64e4
-
SHA256
0fc6f52cae946a367dca16728eab871b1610fc044c2bc3d5ab640a71e49e50a1
-
SHA512
aadde4249c9ee5db44abc503dcc58e06ab305951b2ee37c432f1013cfed67e8734eb7dc833cf920784f79a7e599125ee8a10ba95cbe769779bea562799080dc7
-
SSDEEP
24576:qg9yLp0HmYObBpsiWo/8M8zmssIpcbiLq96:FJHmYOb0gPWg
Malware Config
Extracted
redline
LegendaryInstalls_20230918
62.72.23.19:80
-
auth_value
7e2e28855818d91285389c56372566f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1960 set thread context of 1164 1960 ee88a284fb166e55f13a75ea3096d22c.exe 28 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1164 1960 ee88a284fb166e55f13a75ea3096d22c.exe 28 PID 1960 wrote to memory of 1164 1960 ee88a284fb166e55f13a75ea3096d22c.exe 28 PID 1960 wrote to memory of 1164 1960 ee88a284fb166e55f13a75ea3096d22c.exe 28 PID 1960 wrote to memory of 1164 1960 ee88a284fb166e55f13a75ea3096d22c.exe 28 PID 1960 wrote to memory of 1164 1960 ee88a284fb166e55f13a75ea3096d22c.exe 28 PID 1960 wrote to memory of 1164 1960 ee88a284fb166e55f13a75ea3096d22c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee88a284fb166e55f13a75ea3096d22c.exe"C:\Users\Admin\AppData\Local\Temp\ee88a284fb166e55f13a75ea3096d22c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:1164
-