Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
73c6c588e1e97b13b7ba6f4c922c2d76.exe
Resource
win7-20231215-en
General
-
Target
73c6c588e1e97b13b7ba6f4c922c2d76.exe
-
Size
316KB
-
MD5
73c6c588e1e97b13b7ba6f4c922c2d76
-
SHA1
9d1479c0cb6161d3f3cb59da7ebab105d087bf25
-
SHA256
50d3b68fda2ef87e977cc92bc744516f5d9dc93c2e3f8b2020b695364a52eba9
-
SHA512
317bc1d1dc41745c128b44f44ddf6a988e130b9edb9cdfd8094ddf3c752f68232d1dc1503d1ff081f6b0b7c1ea26f7d40b33a9a97872381afd374ed1df13ced1
-
SSDEEP
6144:b6osaMuV1NcUybSsFtE4ZMAb45ogLXax8t9:Xs9uDNc3bSiE4CxTXLt9
Malware Config
Extracted
redline
scamne
209.54.104.19:21416
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3112-6-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/3112-6-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4636 set thread context of 3112 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 96 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe Token: SeDebugPrivilege 3112 73c6c588e1e97b13b7ba6f4c922c2d76.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4636 wrote to memory of 1952 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 95 PID 4636 wrote to memory of 1952 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 95 PID 4636 wrote to memory of 1952 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 95 PID 4636 wrote to memory of 3112 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 96 PID 4636 wrote to memory of 3112 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 96 PID 4636 wrote to memory of 3112 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 96 PID 4636 wrote to memory of 3112 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 96 PID 4636 wrote to memory of 3112 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 96 PID 4636 wrote to memory of 3112 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 96 PID 4636 wrote to memory of 3112 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 96 PID 4636 wrote to memory of 3112 4636 73c6c588e1e97b13b7ba6f4c922c2d76.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\73c6c588e1e97b13b7ba6f4c922c2d76.exe"C:\Users\Admin\AppData\Local\Temp\73c6c588e1e97b13b7ba6f4c922c2d76.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\73c6c588e1e97b13b7ba6f4c922c2d76.exeC:\Users\Admin\AppData\Local\Temp\73c6c588e1e97b13b7ba6f4c922c2d76.exe2⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\73c6c588e1e97b13b7ba6f4c922c2d76.exeC:\Users\Admin\AppData\Local\Temp\73c6c588e1e97b13b7ba6f4c922c2d76.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\73c6c588e1e97b13b7ba6f4c922c2d76.exe.log
Filesize605B
MD53654bd2c6957761095206ffdf92b0cb9
SHA16f10f7b5867877de7629afcff644c265e79b4ad3
SHA256c2a4be94cf4ed33d698d9838f4ffb47047da796e733ec11562463a1621212ab4
SHA512e2a81248cca7732ce098088d5237897493fd3629e28d66bc13e5f9191f72cd52893f4a53905906af12d5c6de475738b6c7f6b718a32869e9ee0deb3a54672f79