Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
339s -
max time network
354s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
03/11/2023, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
4se182zn.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
4se182zn.exe
Resource
win10-20231020-en
General
-
Target
4se182zn.exe
-
Size
1.1MB
-
MD5
a3d9d2941072762f79cd51e9033cfe7c
-
SHA1
2d8b476eed489e9b412bf1a2fe0737bc975c9f4d
-
SHA256
5ed69e5d911b8e81da107ec15d7989c44edca8689517970d84354a9db4b98653
-
SHA512
fdb95bb2023f1502903e20e49690a0ab5d76a2c4db82b28a26f09196255441e8189329d963720e163f2ac65efde1eaa8d57cf53cf5edac48782c60509831d160
-
SSDEEP
12288:XrB5IZ2nfkPenJ2U7vq/wMR5Sunrv90pxf1xh9uuSVKhAjviJeP3xnto:vg2fkPenJ2U7vqvbnrvwF0gqht
Malware Config
Extracted
redline
plost
77.91.124.86:19084
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/memory/2128-2-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/2128-3-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/2128-5-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/2128-7-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/2128-9-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/2128-11-0x0000000007250000-0x0000000007290000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1264 set thread context of 2128 1264 4se182zn.exe 28 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28 PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28 PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28 PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28 PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28 PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28 PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28 PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28 PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28 PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28 PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28 PID 1264 wrote to memory of 2128 1264 4se182zn.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4se182zn.exe"C:\Users\Admin\AppData\Local\Temp\4se182zn.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2128
-