Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/05/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe
Resource
win11-20240426-en
General
-
Target
83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe
-
Size
315KB
-
MD5
f74808a0cb7b3ce6a8ff12875f93d5dc
-
SHA1
8c4104605e2c55218b0422b6589ea825cebe4b62
-
SHA256
83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4
-
SHA512
6f06898ad7fb1a1e3d779e0831683707e3dc3bc2e2622681758f72540f3568a0271eee641d2d9f9b1b2d9fffe459bda36b24359d775c45075e5d91054f2a8dc3
-
SSDEEP
6144:C89pI60nbM8uPZy3+8KID/MuO/S8JvFbxGQnM6XwQTCyvl2XaXHS:t9+60nbnuEMzLJvFbk6gQ2c2X0HS
Malware Config
Extracted
redline
7001210066
https://pastebin.com/raw/KE5Mft0T
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4108-1-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3164 set thread context of 4108 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 83 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4108 RegAsm.exe 4108 RegAsm.exe 4108 RegAsm.exe 4108 RegAsm.exe 4108 RegAsm.exe 4108 RegAsm.exe 4108 RegAsm.exe 4108 RegAsm.exe 4108 RegAsm.exe 4108 RegAsm.exe 4108 RegAsm.exe 4108 RegAsm.exe 4108 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4108 RegAsm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3164 wrote to memory of 2004 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 82 PID 3164 wrote to memory of 2004 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 82 PID 3164 wrote to memory of 2004 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 82 PID 3164 wrote to memory of 4108 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 83 PID 3164 wrote to memory of 4108 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 83 PID 3164 wrote to memory of 4108 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 83 PID 3164 wrote to memory of 4108 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 83 PID 3164 wrote to memory of 4108 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 83 PID 3164 wrote to memory of 4108 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 83 PID 3164 wrote to memory of 4108 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 83 PID 3164 wrote to memory of 4108 3164 83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe"C:\Users\Admin\AppData\Local\Temp\83d9f77c09f624b493653c9f77230a052d1d729212c2ee73a630d9d59cb96ac4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108
-