Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2024, 05:38

General

  • Target

    cd3f88a43b2764c4896ab8f879fb2c10.exe

  • Size

    653KB

  • MD5

    cd3f88a43b2764c4896ab8f879fb2c10

  • SHA1

    bb85a6645a908be90ff4015e069904194cb282cf

  • SHA256

    0a7f5f666fb7a1cdda25353191ddaced97674f596af7230d58af2ee14ea14819

  • SHA512

    9f9987b804d0e8cff9c383651fd0b88d98ca21e3f318643b0afc9c05d352f66a9a7baa048644ab89e9bfee94e92e90fa433f3fb4b99e70d5c457eb9052bdd1f1

  • SSDEEP

    6144:LQBD8ozQzHR21FJLgGz0kUTVvSERat1Hin2n+jX/oKrcqIyfm/a7bB3+Xv:LQBD8DWsvS+ICn2n0AKgqIyfmE

Malware Config

Extracted

Family

redline

Botnet

CRYPTO

C2

212.86.102.139:32600

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd3f88a43b2764c4896ab8f879fb2c10.exe
    "C:\Users\Admin\AppData\Local\Temp\cd3f88a43b2764c4896ab8f879fb2c10.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\cd3f88a43b2764c4896ab8f879fb2c10.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2708
    • C:\Users\Admin\AppData\Local\Temp\cd3f88a43b2764c4896ab8f879fb2c10.exe
      "C:\Users\Admin\AppData\Local\Temp\cd3f88a43b2764c4896ab8f879fb2c10.exe"
      2⤵
        PID:2752
      • C:\Users\Admin\AppData\Local\Temp\cd3f88a43b2764c4896ab8f879fb2c10.exe
        "C:\Users\Admin\AppData\Local\Temp\cd3f88a43b2764c4896ab8f879fb2c10.exe"
        2⤵
          PID:2872

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2084-19-0x0000000074270000-0x000000007495E000-memory.dmp

        Filesize

        6.9MB

      • memory/2084-1-0x0000000074270000-0x000000007495E000-memory.dmp

        Filesize

        6.9MB

      • memory/2084-2-0x0000000005060000-0x00000000050A0000-memory.dmp

        Filesize

        256KB

      • memory/2084-3-0x0000000000410000-0x000000000042C000-memory.dmp

        Filesize

        112KB

      • memory/2084-4-0x0000000074270000-0x000000007495E000-memory.dmp

        Filesize

        6.9MB

      • memory/2084-5-0x0000000005060000-0x00000000050A0000-memory.dmp

        Filesize

        256KB

      • memory/2084-6-0x0000000004B60000-0x0000000004BB8000-memory.dmp

        Filesize

        352KB

      • memory/2084-7-0x0000000000AD0000-0x0000000000AF2000-memory.dmp

        Filesize

        136KB

      • memory/2084-0-0x0000000000D20000-0x0000000000DCA000-memory.dmp

        Filesize

        680KB

      • memory/2708-26-0x0000000002890000-0x00000000028D0000-memory.dmp

        Filesize

        256KB

      • memory/2708-27-0x0000000070D20000-0x00000000712CB000-memory.dmp

        Filesize

        5.7MB

      • memory/2708-30-0x0000000070D20000-0x00000000712CB000-memory.dmp

        Filesize

        5.7MB

      • memory/2708-29-0x0000000070D20000-0x00000000712CB000-memory.dmp

        Filesize

        5.7MB

      • memory/2708-28-0x0000000002890000-0x00000000028D0000-memory.dmp

        Filesize

        256KB

      • memory/2872-17-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2872-22-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2872-20-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2872-25-0x0000000072660000-0x0000000072D4E000-memory.dmp

        Filesize

        6.9MB

      • memory/2872-8-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2872-10-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2872-11-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2872-15-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2872-13-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2872-31-0x0000000072660000-0x0000000072D4E000-memory.dmp

        Filesize

        6.9MB