Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
86s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe
Resource
win10v2004-20240704-en
General
-
Target
364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe
-
Size
648KB
-
MD5
602a4ddfabfe7c1b5fa31290e5295a89
-
SHA1
faf33c2b48f6f4f9f6937cbd63655bcd7072677a
-
SHA256
364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba
-
SHA512
8a18dd7501e9a509558f858ac684dd5030aff62a073f6307de4d4d27c0a6b39d824f637c7305c648cab23ad68d54a6eb8b62d23e667c3f04c01641e22ca56ad1
-
SSDEEP
6144:YgZCAQw89v2xG/o58ZsyW0YRpM8q94nhOc8mf4H444l:SAu8OWe8q9wOcr4H444l
Malware Config
Extracted
redline
foz
79.110.62.16:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/672-4878-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3728 set thread context of 672 3728 364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe 93 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 672 aspnet_compiler.exe 672 aspnet_compiler.exe 672 aspnet_compiler.exe 672 aspnet_compiler.exe 672 aspnet_compiler.exe 672 aspnet_compiler.exe 672 aspnet_compiler.exe 672 aspnet_compiler.exe 672 aspnet_compiler.exe 672 aspnet_compiler.exe 672 aspnet_compiler.exe 672 aspnet_compiler.exe 672 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3728 364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe Token: SeDebugPrivilege 3728 364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe Token: SeDebugPrivilege 672 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3728 wrote to memory of 672 3728 364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe 93 PID 3728 wrote to memory of 672 3728 364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe 93 PID 3728 wrote to memory of 672 3728 364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe 93 PID 3728 wrote to memory of 672 3728 364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe 93 PID 3728 wrote to memory of 672 3728 364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe 93 PID 3728 wrote to memory of 672 3728 364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe 93 PID 3728 wrote to memory of 672 3728 364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe 93 PID 3728 wrote to memory of 672 3728 364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe"C:\Users\Admin\AppData\Local\Temp\364e1e1ec53644f83d25bc6457b64f5517c3ae19cf17cc725c91fd3faeba17ba.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4180,i,13036770025638384416,811858527135662588,262144 --variations-seed-version --mojo-platform-channel-handle=4148 /prefetch:81⤵PID:3984