Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    191s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/05/2024, 23:05

General

  • Target

    7090723b5821d015e801d537ad745b7de3046ade870b4fd7a3ee8a5ad7d16a46.exe

  • Size

    5.0MB

  • MD5

    004baadff1a627a2f86e6a8345233037

  • SHA1

    9447e67628b6e61adf1f21ad4169481b822d54fe

  • SHA256

    7090723b5821d015e801d537ad745b7de3046ade870b4fd7a3ee8a5ad7d16a46

  • SHA512

    20b437eab89aaccba30c687b254a2ab3834cd78f774b794cf54ac6cae33f3c95a7a793a3f87beb20968e31b23cff711ceab5a6cd1923875380e53512fb9c581e

  • SSDEEP

    98304:a3Txn5/Y05WHbdPn+eT4Om2pZ90XYis5VfIcm:azg05WHbdmPeZ90XYis5V0

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.129:2353

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7090723b5821d015e801d537ad745b7de3046ade870b4fd7a3ee8a5ad7d16a46.exe
    "C:\Users\Admin\AppData\Local\Temp\7090723b5821d015e801d537ad745b7de3046ade870b4fd7a3ee8a5ad7d16a46.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
      2⤵
        PID:4088
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1944-67-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/1944-69-0x0000000073610000-0x0000000073CFE000-memory.dmp

      Filesize

      6.9MB

    • memory/1944-70-0x00000000056D0000-0x0000000005BCE000-memory.dmp

      Filesize

      5.0MB

    • memory/1944-71-0x0000000005280000-0x0000000005312000-memory.dmp

      Filesize

      584KB

    • memory/1944-73-0x0000000073610000-0x0000000073CFE000-memory.dmp

      Filesize

      6.9MB

    • memory/1944-85-0x0000000073610000-0x0000000073CFE000-memory.dmp

      Filesize

      6.9MB

    • memory/1944-83-0x0000000007560000-0x0000000007A8C000-memory.dmp

      Filesize

      5.2MB

    • memory/1944-82-0x0000000006E60000-0x0000000007022000-memory.dmp

      Filesize

      1.8MB

    • memory/1944-81-0x0000000006B40000-0x0000000006B90000-memory.dmp

      Filesize

      320KB

    • memory/1944-80-0x0000000005D50000-0x0000000005DB6000-memory.dmp

      Filesize

      408KB

    • memory/1944-79-0x00000000055A0000-0x00000000055EB000-memory.dmp

      Filesize

      300KB

    • memory/1944-78-0x0000000005560000-0x000000000559E000-memory.dmp

      Filesize

      248KB

    • memory/1944-77-0x0000000005500000-0x0000000005512000-memory.dmp

      Filesize

      72KB

    • memory/1944-76-0x0000000005BD0000-0x0000000005CDA000-memory.dmp

      Filesize

      1.0MB

    • memory/1944-75-0x00000000061E0000-0x00000000067E6000-memory.dmp

      Filesize

      6.0MB

    • memory/1944-74-0x0000000005330000-0x000000000533A000-memory.dmp

      Filesize

      40KB

    • memory/4092-25-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-53-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-43-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-41-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-39-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-37-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-35-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-31-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-29-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-27-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-61-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-23-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-21-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-19-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-17-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-13-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-59-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-57-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-55-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-45-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-51-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-49-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-47-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-72-0x0000000073610000-0x0000000073CFE000-memory.dmp

      Filesize

      6.9MB

    • memory/4092-11-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-9-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-7-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-65-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-66-0x0000000073610000-0x0000000073CFE000-memory.dmp

      Filesize

      6.9MB

    • memory/4092-63-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-33-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-15-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB

    • memory/4092-5-0x0000000005070000-0x000000000508C000-memory.dmp

      Filesize

      112KB

    • memory/4092-4-0x0000000005220000-0x0000000005304000-memory.dmp

      Filesize

      912KB

    • memory/4092-3-0x0000000073610000-0x0000000073CFE000-memory.dmp

      Filesize

      6.9MB

    • memory/4092-2-0x0000000005180000-0x000000000521C000-memory.dmp

      Filesize

      624KB

    • memory/4092-1-0x00000000003C0000-0x00000000008C4000-memory.dmp

      Filesize

      5.0MB

    • memory/4092-0-0x000000007361E000-0x000000007361F000-memory.dmp

      Filesize

      4KB

    • memory/4092-6-0x0000000005070000-0x0000000005085000-memory.dmp

      Filesize

      84KB