Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe
Resource
win11-20240426-en
General
-
Target
83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe
-
Size
315KB
-
MD5
f74808a0cb7b3ce6a8ff12875f93d5dc
-
SHA1
8c4104605e2c55218b0422b6589ea825cebe4b62
-
SHA256
83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4
-
SHA512
6f06898ad7fb1a1e3d779e0831683707e3dc3bc2e2622681758f72540f3568a0271eee641d2d9f9b1b2d9fffe459bda36b24359d775c45075e5d91054f2a8dc3
-
SSDEEP
6144:C89pI60nbM8uPZy3+8KID/MuO/S8JvFbxGQnM6XwQTCyvl2XaXHS:t9+60nbnuEMzLJvFbk6gQ2c2X0HS
Malware Config
Extracted
redline
7001210066
https://pastebin.com/raw/KE5Mft0T
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3464-0-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 pastebin.com 23 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1868 set thread context of 3464 1868 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 87 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe 3464 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3464 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1868 wrote to memory of 3464 1868 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 87 PID 1868 wrote to memory of 3464 1868 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 87 PID 1868 wrote to memory of 3464 1868 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 87 PID 1868 wrote to memory of 3464 1868 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 87 PID 1868 wrote to memory of 3464 1868 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 87 PID 1868 wrote to memory of 3464 1868 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 87 PID 1868 wrote to memory of 3464 1868 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 87 PID 1868 wrote to memory of 3464 1868 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe"C:\Users\Admin\AppData\Local\Temp\83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-