Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
OBS-Studio-30.1.2-Full-Installer-x64.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
OBS-Studio-30.1.2-Full-Installer-x64.exe
Resource
win10v2004-20240508-en
General
-
Target
OBS-Studio-30.1.2-Full-Installer-x64.exe
-
Size
128.3MB
-
MD5
bce9a48d09577df4232002803be8b7e7
-
SHA1
89651d5a375fbe6c0b03e03d7bbd62dac314e2f2
-
SHA256
a4a57464834be9fcea74d15fe5712dcf86e7c673d82706cdf8cfbc5aa9fea17f
-
SHA512
1d31e7b8a356db0d48f614b2f17ad760a9e4a0cd1e358613c328bf5a66c45094618ee520f5d2b1cfce9d5eeb5bd52b95bbe31a1390ead30c699c4cdf1a1084d9
-
SSDEEP
3145728:AxJfr5z+wXxayKEFtlKvbA7Nj3bfmSRcgQ/zjpcazd7jpk:UfVzHFt0U7NTD+ljpcaRZ
Malware Config
Extracted
redline
xXx
185.236.228.125:15140
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4916-118-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation OBS-Studio-30.1.2-Full-Installer-x64.exe -
Executes dropped EXE 2 IoCs
pid Process 3288 OBS-Studio-30.1.2-Full-Installer-x64.exe 3580 obstudio.exe -
Loads dropped DLL 2 IoCs
pid Process 3288 OBS-Studio-30.1.2-Full-Installer-x64.exe 3288 OBS-Studio-30.1.2-Full-Installer-x64.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023403-18.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3580 set thread context of 4916 3580 obstudio.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3580 obstudio.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3580 obstudio.exe 3580 obstudio.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3580 obstudio.exe 3580 obstudio.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 6124 wrote to memory of 3288 6124 OBS-Studio-30.1.2-Full-Installer-x64.exe 81 PID 6124 wrote to memory of 3288 6124 OBS-Studio-30.1.2-Full-Installer-x64.exe 81 PID 6124 wrote to memory of 3288 6124 OBS-Studio-30.1.2-Full-Installer-x64.exe 81 PID 6124 wrote to memory of 3580 6124 OBS-Studio-30.1.2-Full-Installer-x64.exe 84 PID 6124 wrote to memory of 3580 6124 OBS-Studio-30.1.2-Full-Installer-x64.exe 84 PID 6124 wrote to memory of 3580 6124 OBS-Studio-30.1.2-Full-Installer-x64.exe 84 PID 3580 wrote to memory of 4916 3580 obstudio.exe 86 PID 3580 wrote to memory of 4916 3580 obstudio.exe 86 PID 3580 wrote to memory of 4916 3580 obstudio.exe 86 PID 3580 wrote to memory of 4916 3580 obstudio.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\OBS-Studio-30.1.2-Full-Installer-x64.exe"C:\Users\Admin\AppData\Local\Temp\OBS-Studio-30.1.2-Full-Installer-x64.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:6124 -
C:\Users\Admin\AppData\Roaming\OBS-Studio-30.1.2-Full-Installer-x64.exe"C:\Users\Admin\AppData\Roaming\OBS-Studio-30.1.2-Full-Installer-x64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3288
-
-
C:\Users\Admin\AppData\Roaming\obstudio.exe"C:\Users\Admin\AppData\Roaming\obstudio.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Roaming\obstudio.exe"3⤵PID:4916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5d095b082b7c5ba4665d40d9c5042af6d
SHA12220277304af105ca6c56219f56f04e894b28d27
SHA256b2091205e225fc07daf1101218c64ce62a4690cacac9c3d0644d12e93e4c213c
SHA51261fb5cf84028437d8a63d0fda53d9fe0f521d8fe04e96853a5b7a22050c4c4fb5528ff0cdbb3ae6bc74a5033563fc417fc7537e4778227c9fd6633ae844c47d9
-
Filesize
1KB
MD55b7263339e43072ae2f2c54643861a45
SHA1c44cc76b51c2f2dbba2835a79765136863e3d77d
SHA256122e95e00a5e1b82fa8bcd217a1be422ba4113a0a9aa6b161bde06ff11b965ed
SHA5120ac9e1cb1086e556abc5d3f603b85998918e8bfc4109b1b44abc96b64609338cb58b2b52f04b0c7db5386599bbf224d3608753c7c912012270b8a954bc306ece
-
Filesize
1.1MB
MD546ab0cc1ea09e53e3239f1c520be7e63
SHA1f7e2cd72077c4c743539a666ff5c358419eac21a
SHA25652ff4c3befd8b1a1eec11b92f94d03f29bef0f86f733edc6f1d79388b04017a1
SHA51263de10d2bce14a609e7cbb6827c02a5f10095b9e1f30379ab2f721a163017c05f78a5886bf553ddd2e8df5b35895ab631099ffac9d05ec96a9ac67c9ed538ac4