Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2023, 20:23

General

  • Target

    NEAS.27f915cf01316657f79e30a14c2bdf757acec51dfa2e1eac21de9b3adc2bcab5.exe

  • Size

    448KB

  • MD5

    6fa89a27beea1335ca92e08985602e79

  • SHA1

    a60f9bc55d5c86818e9681500c6db14b4e8a073e

  • SHA256

    27f915cf01316657f79e30a14c2bdf757acec51dfa2e1eac21de9b3adc2bcab5

  • SHA512

    50ce69f1dc57cbe3fa79e2bace8800780bb54f82993683b1c78241d48656ee84245bb14f9561d95b6f1446030889c04f7f2f9a8e905f9fee11344f4f9eac8402

  • SSDEEP

    6144:qRPUbTZuMaXliaXF7A9bipAoTWryiYx2OU54ik1QNZGGq1cpF2l+O3la:uMHZWXHF7A9KS0IIGNMGq1i2l+J

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.27f915cf01316657f79e30a14c2bdf757acec51dfa2e1eac21de9b3adc2bcab5.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.27f915cf01316657f79e30a14c2bdf757acec51dfa2e1eac21de9b3adc2bcab5.exe"
    1⤵
      PID:2084
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:1512
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4156

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2084-0-0x0000000000400000-0x0000000000472000-memory.dmp

        Filesize

        456KB

      • memory/2084-1-0x0000000000550000-0x00000000005AA000-memory.dmp

        Filesize

        360KB

      • memory/2084-5-0x0000000074D70000-0x0000000075520000-memory.dmp

        Filesize

        7.7MB

      • memory/2084-6-0x0000000007040000-0x00000000075E4000-memory.dmp

        Filesize

        5.6MB

      • memory/2084-7-0x0000000007630000-0x00000000076C2000-memory.dmp

        Filesize

        584KB

      • memory/2084-8-0x00000000077B0000-0x00000000077C0000-memory.dmp

        Filesize

        64KB

      • memory/2084-9-0x0000000007730000-0x000000000773A000-memory.dmp

        Filesize

        40KB

      • memory/2084-10-0x0000000007FC0000-0x00000000085D8000-memory.dmp

        Filesize

        6.1MB

      • memory/2084-11-0x0000000007800000-0x0000000007812000-memory.dmp

        Filesize

        72KB

      • memory/2084-12-0x00000000079A0000-0x0000000007AAA000-memory.dmp

        Filesize

        1.0MB

      • memory/2084-13-0x0000000007820000-0x000000000785C000-memory.dmp

        Filesize

        240KB

      • memory/2084-14-0x0000000007AF0000-0x0000000007B3C000-memory.dmp

        Filesize

        304KB

      • memory/2084-15-0x0000000000400000-0x0000000000472000-memory.dmp

        Filesize

        456KB

      • memory/2084-16-0x0000000074D70000-0x0000000075520000-memory.dmp

        Filesize

        7.7MB

      • memory/2084-17-0x00000000077B0000-0x00000000077C0000-memory.dmp

        Filesize

        64KB

      • memory/4156-18-0x000001A089E40000-0x000001A089E50000-memory.dmp

        Filesize

        64KB

      • memory/4156-34-0x000001A089F40000-0x000001A089F50000-memory.dmp

        Filesize

        64KB

      • memory/4156-50-0x000001A092290000-0x000001A092291000-memory.dmp

        Filesize

        4KB

      • memory/4156-52-0x000001A0922C0000-0x000001A0922C1000-memory.dmp

        Filesize

        4KB

      • memory/4156-53-0x000001A0922C0000-0x000001A0922C1000-memory.dmp

        Filesize

        4KB

      • memory/4156-54-0x000001A0923D0000-0x000001A0923D1000-memory.dmp

        Filesize

        4KB