Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe
Resource
win11-20240426-en
General
-
Target
6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe
-
Size
332KB
-
MD5
2785970b40ee59c74ed08a80f670cf59
-
SHA1
3bd513a047d07542923fdda12233b6bfb0d3d4e9
-
SHA256
6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6
-
SHA512
1f433a2b25742ef7ae3ec4038d4d42b27b209a33b6feece35f8570925a368b5d5e6edf48d4c100be27c550c5deab479209c33d62f45b07aa4e1e7d1d85033f9c
-
SSDEEP
6144:T1Bwp/lwz9PI8/T6f5mUz7S3RMyghw1PPmfwjWlltD+0Xp:TPjz9PI8/TzeygSdPIwjWNy0Xp
Malware Config
Extracted
redline
7001210066
https://pastebin.com/raw/KE5Mft0T
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3488-1-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 627 pastebin.com 658 pastebin.com 529 pastebin.com 164 pastebin.com 619 pastebin.com 944 pastebin.com 101 pastebin.com 720 pastebin.com 405 pastebin.com 508 pastebin.com 909 pastebin.com 981 pastebin.com 138 pastebin.com 823 pastebin.com 1027 pastebin.com 401 pastebin.com 194 pastebin.com 402 pastebin.com 407 pastebin.com 499 pastebin.com 50 pastebin.com 365 pastebin.com 684 pastebin.com 837 pastebin.com 901 pastebin.com 261 pastebin.com 110 pastebin.com 256 pastebin.com 465 pastebin.com 882 pastebin.com 1001 pastebin.com 81 pastebin.com 559 pastebin.com 609 pastebin.com 479 pastebin.com 515 pastebin.com 518 pastebin.com 641 pastebin.com 773 pastebin.com 939 pastebin.com 502 pastebin.com 587 pastebin.com 617 pastebin.com 660 pastebin.com 790 pastebin.com 879 pastebin.com 124 pastebin.com 620 pastebin.com 812 pastebin.com 321 pastebin.com 451 pastebin.com 994 pastebin.com 6 pastebin.com 1012 pastebin.com 205 pastebin.com 135 pastebin.com 146 pastebin.com 169 pastebin.com 497 pastebin.com 534 pastebin.com 848 pastebin.com 33 pastebin.com 743 pastebin.com 655 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4488 set thread context of 3488 4488 6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe 85 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3488 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3488 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4488 wrote to memory of 3488 4488 6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe 85 PID 4488 wrote to memory of 3488 4488 6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe 85 PID 4488 wrote to memory of 3488 4488 6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe 85 PID 4488 wrote to memory of 3488 4488 6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe 85 PID 4488 wrote to memory of 3488 4488 6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe 85 PID 4488 wrote to memory of 3488 4488 6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe 85 PID 4488 wrote to memory of 3488 4488 6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe 85 PID 4488 wrote to memory of 3488 4488 6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe"C:\Users\Admin\AppData\Local\Temp\6741290e801efcde6acb6ff03e3b543463bf7bd399a10f6544af419f932321c6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3488
-