Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 18:26

General

  • Target

    61CF87A0E4C2026B1D7D12013D328FED.exe

  • Size

    95KB

  • MD5

    61cf87a0e4c2026b1d7d12013d328fed

  • SHA1

    744bc773ce2830534459431fc038ff39de54e9d7

  • SHA256

    e7de4739f4a09e23015d232e46d6c7dc431ae40b7be1c35f6cfaa48b20136481

  • SHA512

    0fcf0ef523a5c2baa3e652fdb29b6a3018e6dc4dd3134b73c99c4e3f8cc77bdd7f4caf71a0470ec8e4ba58a7a6b508a205bab41eaa5318e6524f9a2ab11c806e

  • SSDEEP

    1536:9qsINqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed243teulgS6pY:rAMOY3+zi0ZbYe1g0ujyzdmY

Malware Config

Extracted

Family

redline

Botnet

cheat

C2

185.222.58.83:55615

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61CF87A0E4C2026B1D7D12013D328FED.exe
    "C:\Users\Admin\AppData\Local\Temp\61CF87A0E4C2026B1D7D12013D328FED.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab278F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar27A2.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\tmp2D90.tmp

    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmp2DA6.tmp

    Filesize

    92KB

    MD5

    bbe71b58e84c50336ee2d3bad3609c39

    SHA1

    bdd3227b48977e583127425cbc2f86ff4077ba10

    SHA256

    b25b7e57924b2382d3178696782b51fa62b68fa7e763081d7a53471cccc1ff3c

    SHA512

    07fcac6778f114fb372dac7ed489624b8e0aed347bc14af77ec36b5201df8b3d99e2a69a384756606030bb146f5c0780f39a274dc5a4b4f6863746ec7fa2ca2a

  • memory/2084-0-0x00000000010C0000-0x00000000010DE000-memory.dmp

    Filesize

    120KB

  • memory/2084-1-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2084-2-0x0000000000FE0000-0x0000000001020000-memory.dmp

    Filesize

    256KB

  • memory/2084-121-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB