Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
13s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
OBS-Studio-30.1.2-Full-Installer-x64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
OBS-Studio-30.1.2-Full-Installer-x64.exe
Resource
win10v2004-20240508-en
General
-
Target
OBS-Studio-30.1.2-Full-Installer-x64.exe
-
Size
128.3MB
-
MD5
bce9a48d09577df4232002803be8b7e7
-
SHA1
89651d5a375fbe6c0b03e03d7bbd62dac314e2f2
-
SHA256
a4a57464834be9fcea74d15fe5712dcf86e7c673d82706cdf8cfbc5aa9fea17f
-
SHA512
1d31e7b8a356db0d48f614b2f17ad760a9e4a0cd1e358613c328bf5a66c45094618ee520f5d2b1cfce9d5eeb5bd52b95bbe31a1390ead30c699c4cdf1a1084d9
-
SSDEEP
3145728:AxJfr5z+wXxayKEFtlKvbA7Nj3bfmSRcgQ/zjpcazd7jpk:UfVzHFt0U7NTD+ljpcaRZ
Malware Config
Extracted
redline
xXx
185.236.228.125:15140
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/memory/2672-109-0x0000000000090000-0x00000000000E0000-memory.dmp family_redline behavioral1/memory/2672-117-0x0000000000090000-0x00000000000E0000-memory.dmp family_redline behavioral1/memory/2672-114-0x0000000000090000-0x00000000000E0000-memory.dmp family_redline behavioral1/memory/2672-110-0x0000000000090000-0x00000000000E0000-memory.dmp family_redline -
Executes dropped EXE 2 IoCs
pid Process 2944 OBS-Studio-30.1.2-Full-Installer-x64.exe 2516 obstudio.exe -
Loads dropped DLL 3 IoCs
pid Process 2944 OBS-Studio-30.1.2-Full-Installer-x64.exe 2944 OBS-Studio-30.1.2-Full-Installer-x64.exe 2944 OBS-Studio-30.1.2-Full-Installer-x64.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0034000000016cc9-12.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2516 set thread context of 2672 2516 obstudio.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2516 obstudio.exe 2516 obstudio.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2516 obstudio.exe 2516 obstudio.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2516 obstudio.exe 2516 obstudio.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2944 1040 OBS-Studio-30.1.2-Full-Installer-x64.exe 28 PID 1040 wrote to memory of 2944 1040 OBS-Studio-30.1.2-Full-Installer-x64.exe 28 PID 1040 wrote to memory of 2944 1040 OBS-Studio-30.1.2-Full-Installer-x64.exe 28 PID 1040 wrote to memory of 2944 1040 OBS-Studio-30.1.2-Full-Installer-x64.exe 28 PID 1040 wrote to memory of 2944 1040 OBS-Studio-30.1.2-Full-Installer-x64.exe 28 PID 1040 wrote to memory of 2944 1040 OBS-Studio-30.1.2-Full-Installer-x64.exe 28 PID 1040 wrote to memory of 2944 1040 OBS-Studio-30.1.2-Full-Installer-x64.exe 28 PID 1040 wrote to memory of 2516 1040 OBS-Studio-30.1.2-Full-Installer-x64.exe 29 PID 1040 wrote to memory of 2516 1040 OBS-Studio-30.1.2-Full-Installer-x64.exe 29 PID 1040 wrote to memory of 2516 1040 OBS-Studio-30.1.2-Full-Installer-x64.exe 29 PID 1040 wrote to memory of 2516 1040 OBS-Studio-30.1.2-Full-Installer-x64.exe 29 PID 2516 wrote to memory of 2672 2516 obstudio.exe 30 PID 2516 wrote to memory of 2672 2516 obstudio.exe 30 PID 2516 wrote to memory of 2672 2516 obstudio.exe 30 PID 2516 wrote to memory of 2672 2516 obstudio.exe 30 PID 2516 wrote to memory of 2672 2516 obstudio.exe 30 PID 2516 wrote to memory of 2672 2516 obstudio.exe 30 PID 2516 wrote to memory of 2672 2516 obstudio.exe 30 PID 2516 wrote to memory of 2672 2516 obstudio.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\OBS-Studio-30.1.2-Full-Installer-x64.exe"C:\Users\Admin\AppData\Local\Temp\OBS-Studio-30.1.2-Full-Installer-x64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Roaming\OBS-Studio-30.1.2-Full-Installer-x64.exe"C:\Users\Admin\AppData\Roaming\OBS-Studio-30.1.2-Full-Installer-x64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944
-
-
C:\Users\Admin\AppData\Roaming\obstudio.exe"C:\Users\Admin\AppData\Roaming\obstudio.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Roaming\obstudio.exe"3⤵PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d3d0c39ec78d8c5e6eed2b1be77a01e4
SHA1b0924538310ed82ace33388d6399d4caeb0dd3b1
SHA256d7f4698a843a642a18bfb1139b0935d3fefe87a1333b02806eef53995ab90eae
SHA51240e4cc55f3ceed2ec99dde5018d15b0ceee38964c086107baa0f9df15668b7acd85330bbf54867900ef82df315619ab01929249edc5544145c1d08ea219b3b23
-
Filesize
1.1MB
MD546ab0cc1ea09e53e3239f1c520be7e63
SHA1f7e2cd72077c4c743539a666ff5c358419eac21a
SHA25652ff4c3befd8b1a1eec11b92f94d03f29bef0f86f733edc6f1d79388b04017a1
SHA51263de10d2bce14a609e7cbb6827c02a5f10095b9e1f30379ab2f721a163017c05f78a5886bf553ddd2e8df5b35895ab631099ffac9d05ec96a9ac67c9ed538ac4
-
Filesize
15KB
MD5d095b082b7c5ba4665d40d9c5042af6d
SHA12220277304af105ca6c56219f56f04e894b28d27
SHA256b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c
SHA51261fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d