Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/05/2024, 00:37 UTC
Static task
static1
Behavioral task
behavioral1
Sample
cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe
Resource
win11-20240419-en
General
-
Target
cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe
-
Size
314KB
-
MD5
d17e839ac938c0fe1b5ae61e458e2879
-
SHA1
5f5d2368b3c5d91560af9ba4a3dc6a8907c4d81d
-
SHA256
cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15
-
SHA512
0a3b91c8fbb04aa49716a3fef14e6828376c5004607138b74bc3c422e1dc5e70d7c0d9b4ad56b0d94d3e1d15082ad577922d3d9878741efd01a88d2fc765b261
-
SSDEEP
6144:l5npI60nbM8uPZy3+8KID1BurfcqslPdDMQ44I1XrZXHS:7n+60nbnuuBcvQp54vNHS
Malware Config
Extracted
redline
5637482599
https://pastebin.com/raw/NgsUAPya
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2024-0-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4628 set thread context of 2024 4628 cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe 81 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2024 RegAsm.exe 2024 RegAsm.exe 2024 RegAsm.exe 2024 RegAsm.exe 2024 RegAsm.exe 2024 RegAsm.exe 2024 RegAsm.exe 2024 RegAsm.exe 2024 RegAsm.exe 2024 RegAsm.exe 2024 RegAsm.exe 2024 RegAsm.exe 2024 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2024 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4628 wrote to memory of 2024 4628 cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe 81 PID 4628 wrote to memory of 2024 4628 cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe 81 PID 4628 wrote to memory of 2024 4628 cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe 81 PID 4628 wrote to memory of 2024 4628 cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe 81 PID 4628 wrote to memory of 2024 4628 cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe 81 PID 4628 wrote to memory of 2024 4628 cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe 81 PID 4628 wrote to memory of 2024 4628 cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe 81 PID 4628 wrote to memory of 2024 4628 cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe"C:\Users\Admin\AppData\Local\Temp\cf3b53988f8ac41ceb4e2941d1ae3f36dcd34766f527e1c51f7513869d8b4a15.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
Network
-
Remote address:8.8.8.8:53Requestpastebin.comIN AResponsepastebin.comIN A104.20.3.235pastebin.comIN A104.20.4.235pastebin.comIN A172.67.19.24
-
Remote address:8.8.8.8:53Request235.3.20.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestaifiller.sbsIN AResponseaifiller.sbsIN A116.203.6.63
-
Remote address:8.8.8.8:53Request63.6.203.116.in-addr.arpaIN PTRResponse63.6.203.116.in-addr.arpaIN PTRstatic636203116clientsyour-serverde
-
Remote address:8.8.8.8:53Requestnexusrules.officeapps.live.comIN AResponsenexusrules.officeapps.live.comIN CNAMEprod.nexusrules.live.com.akadns.netprod.nexusrules.live.com.akadns.netIN A52.111.227.11
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestself.events.data.microsoft.comIN AResponseself.events.data.microsoft.comIN CNAMEself-events-data.trafficmanager.netself-events-data.trafficmanager.netIN CNAMEonedscolprdcus19.centralus.cloudapp.azure.comonedscolprdcus19.centralus.cloudapp.azure.comIN A52.182.143.214
-
Remote address:8.8.8.8:53Request214.143.182.52.in-addr.arpaIN PTRResponse
-
805 B 6.0kB 8 8
-
1.0MB 19.9kB 754 313
-
555 B 1.1kB 8 8
DNS Request
pastebin.com
DNS Response
104.20.3.235104.20.4.235172.67.19.24
DNS Request
235.3.20.104.in-addr.arpa
DNS Request
aifiller.sbs
DNS Response
116.203.6.63
DNS Request
63.6.203.116.in-addr.arpa
DNS Request
nexusrules.officeapps.live.com
DNS Response
52.111.227.11
DNS Request
11.227.111.52.in-addr.arpa
DNS Request
self.events.data.microsoft.com
DNS Response
52.182.143.214
DNS Request
214.143.182.52.in-addr.arpa