Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
CHEMICAL LIST.exe
Resource
win7-20240508-en
General
-
Target
CHEMICAL LIST.exe
-
Size
3.0MB
-
MD5
abf2600458f712d9645e5edbb16440b7
-
SHA1
60bc8ef5de29369989939b4532a0eed1ec767a34
-
SHA256
eb8e955c0cda1d5166d4492eeabd1c00b5db7fb2371ce09cd3921ae16c70712e
-
SHA512
b297b2b6569e9b8c85b8923e61c63f757882f86adda66c6c03ee043d07a387af005faba72e43676ba8ecfdd2cf369a35cfa2d98f9687cc075482864263a1c79a
-
SSDEEP
12288:ucTJNESVs3XLF4d5LeIFuuffY6o4XQ/tLN5FmH9L1:uAjbVa4dxeIFu8L1X6ZNg9h
Malware Config
Extracted
redline
halle
194.55.186.180:55123
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2168-8-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2168-10-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2168-7-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2168-12-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2168-14-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 5 IoCs
resource yara_rule behavioral1/memory/2168-8-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2168-10-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2168-7-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2168-12-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2168-14-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 308 set thread context of 2168 308 CHEMICAL LIST.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 jsc.exe 2168 jsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 308 CHEMICAL LIST.exe Token: SeDebugPrivilege 2168 jsc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 308 wrote to memory of 2168 308 CHEMICAL LIST.exe 29 PID 308 wrote to memory of 2168 308 CHEMICAL LIST.exe 29 PID 308 wrote to memory of 2168 308 CHEMICAL LIST.exe 29 PID 308 wrote to memory of 2168 308 CHEMICAL LIST.exe 29 PID 308 wrote to memory of 2168 308 CHEMICAL LIST.exe 29 PID 308 wrote to memory of 2168 308 CHEMICAL LIST.exe 29 PID 308 wrote to memory of 2168 308 CHEMICAL LIST.exe 29 PID 308 wrote to memory of 2168 308 CHEMICAL LIST.exe 29 PID 308 wrote to memory of 2168 308 CHEMICAL LIST.exe 29 PID 308 wrote to memory of 1708 308 CHEMICAL LIST.exe 31 PID 308 wrote to memory of 1708 308 CHEMICAL LIST.exe 31 PID 308 wrote to memory of 1708 308 CHEMICAL LIST.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\CHEMICAL LIST.exe"C:\Users\Admin\AppData\Local\Temp\CHEMICAL LIST.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 308 -s 6162⤵PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD55f914a013176785e26d70d07234c605c
SHA15336e9ed6aeb682b46a0472f4f80ec24c4504210
SHA25672b56bbce7e5e07702bf46a002c75cb3a8994fd390b190b989628d387d21975b
SHA512103eff502bec0df1a36bd19a97ca1d10cc34da2183480fe146434ec916020011c8af003b66ab5f6f4886e95b21749be8d8c3c3ebf3ae1b2e5c6db216e8b4e1b2