Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
CoffeeInjector.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CoffeeInjector.exe
Resource
win10v2004-20231222-en
General
-
Target
CoffeeInjector.exe
-
Size
2.3MB
-
MD5
e7696bfd625a70e8f23d37d50f934f62
-
SHA1
e4bc43ef26f877d8c99a6bbead92880e6956197e
-
SHA256
d85c505f6b29d7e16ae188e53b8e9aa2cd2e74f2d7ca8d9109efbc67cb09418a
-
SHA512
844cdd551daf809b945d6c286d773e92c93613e8c54735c70ac87a7a07e82aed1757f7052935c7f0c2b9de38b91ac7e3d57095c073e9bed0a67d0201cc4c3212
-
SSDEEP
24576:ftxI82/duR8vWOGzltK2FU12NGXCja6az1HGMTREz+q/pGzVLgioox:1+BdgWWBQ2FxNoCj2ZHGOlcl
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/776-4-0x0000000000DD0000-0x0000000000E00000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1608 set thread context of 776 1608 CoffeeInjector.exe 96 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 776 jsc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 776 jsc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1608 wrote to memory of 776 1608 CoffeeInjector.exe 96 PID 1608 wrote to memory of 776 1608 CoffeeInjector.exe 96 PID 1608 wrote to memory of 776 1608 CoffeeInjector.exe 96 PID 1608 wrote to memory of 776 1608 CoffeeInjector.exe 96 PID 1608 wrote to memory of 776 1608 CoffeeInjector.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\CoffeeInjector.exe"C:\Users\Admin\AppData\Local\Temp\CoffeeInjector.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:776
-