Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 08:43 UTC

General

  • Target

    1/e886016e48bf0e3cd100d627678f345743509fd5f57f3c9b182f2833352bd451.exe

  • Size

    338KB

  • MD5

    f5607d12bfd66fa6205cfd6b078e8080

  • SHA1

    2c4f15f916b1dea8b76ebb06468e1700a2122b78

  • SHA256

    e886016e48bf0e3cd100d627678f345743509fd5f57f3c9b182f2833352bd451

  • SHA512

    74df2af255a0d0e6802ab13ffa2f44b26ed11d2bd4388d7659214ab42c5daa2319e1a924af4e8418e294678ee27508e908ac43becc544a8a7fa05cfccb230e94

  • SSDEEP

    6144:uwTSx/BpP+AegMMtRvu3LqBOkQWr3Yf0aldxZsakM2di8MEO:uJpP6gMEhEfjldxZei8MEO

Malware Config

Extracted

Family

redline

Botnet

6951125327

C2

https://t.me/+7Lir0e4Gw381MDhi*https://steamcommunity.com/profiles/76561199038841443

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1\e886016e48bf0e3cd100d627678f345743509fd5f57f3c9b182f2833352bd451.exe
    "C:\Users\Admin\AppData\Local\Temp\1\e886016e48bf0e3cd100d627678f345743509fd5f57f3c9b182f2833352bd451.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3660

Network

  • flag-us
    DNS
    t.me
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    t.me
    IN A
    Response
    t.me
    IN A
    149.154.167.99
  • flag-us
    DNS
    t.me
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    t.me
    IN A
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    4.181.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    4.181.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    4.181.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    4.181.190.20.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    73.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.144.22.2.in-addr.arpa
    IN PTR
    Response
    73.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-73deploystaticakamaitechnologiescom
  • flag-us
    DNS
    73.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    73.144.22.2.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    g.bing.com
    Remote address:
    8.8.8.8:53
    Request
    g.bing.com
    IN A
    Response
    g.bing.com
    IN CNAME
    g-bing-com.dual-a-0034.a-msedge.net
    g-bing-com.dual-a-0034.a-msedge.net
    IN CNAME
    dual-a-0034.a-msedge.net
    dual-a-0034.a-msedge.net
    IN A
    204.79.197.237
    dual-a-0034.a-msedge.net
    IN A
    13.107.21.237
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1d0021addcbd468eb82eb1ed17d37aa6&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=
    Remote address:
    204.79.197.237:443
    Request
    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1d0021addcbd468eb82eb1ed17d37aa6&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MUID=2AC647378019623F1B0D538A81A2630D; domain=.bing.com; expires=Sat, 09-Aug-2025 08:44:19 GMT; path=/; SameSite=None; Secure; Priority=High;
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 14EC7DBEA3064B5D8DB0809EAAD868AB Ref B: LON04EDGE0807 Ref C: 2024-07-15T08:44:19Z
    date: Mon, 15 Jul 2024 08:44:18 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=1d0021addcbd468eb82eb1ed17d37aa6&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=
    Remote address:
    204.79.197.237:443
    Request
    GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=1d0021addcbd468eb82eb1ed17d37aa6&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=2AC647378019623F1B0D538A81A2630D
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    set-cookie: MSPTC=a0_XfmycsuP2nSfI75PF92mJuuwHNejvDH1EuMnWqXg; domain=.bing.com; expires=Sat, 09-Aug-2025 08:44:19 GMT; path=/; Partitioned; secure; SameSite=None
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: BB9C181D9DB847C59B525EE1DA7465FB Ref B: LON04EDGE0807 Ref C: 2024-07-15T08:44:19Z
    date: Mon, 15 Jul 2024 08:44:18 GMT
  • flag-us
    GET
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1d0021addcbd468eb82eb1ed17d37aa6&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=
    Remote address:
    204.79.197.237:443
    Request
    GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1d0021addcbd468eb82eb1ed17d37aa6&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid= HTTP/2.0
    host: g.bing.com
    accept-encoding: gzip, deflate
    user-agent: WindowsShellClient/9.0.40929.0 (Windows)
    cookie: MUID=2AC647378019623F1B0D538A81A2630D; MSPTC=a0_XfmycsuP2nSfI75PF92mJuuwHNejvDH1EuMnWqXg
    Response
    HTTP/2.0 204
    cache-control: no-cache, must-revalidate
    pragma: no-cache
    expires: Fri, 01 Jan 1990 00:00:00 GMT
    strict-transport-security: max-age=31536000; includeSubDomains; preload
    access-control-allow-origin: *
    x-cache: CONFIG_NOCACHE
    accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
    x-msedge-ref: Ref A: 1D198995C7824F88A459E56FE65748C3 Ref B: LON04EDGE0807 Ref C: 2024-07-15T08:44:19Z
    date: Mon, 15 Jul 2024 08:44:18 GMT
  • flag-us
    DNS
    237.197.79.204.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    237.197.79.204.in-addr.arpa
    IN PTR
    Response
  • flag-nl
    GET
    https://t.me/+7Lir0e4Gw381MDhi
    RegAsm.exe
    Remote address:
    149.154.167.99:443
    Request
    GET /+7Lir0e4Gw381MDhi HTTP/1.1
    Host: t.me
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: nginx/1.18.0
    Date: Mon, 15 Jul 2024 08:44:19 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 12296
    Connection: keep-alive
    Set-Cookie: stel_ssid=46d15efc720eb3ae2a_13369694411317731083; expires=Tue, 16 Jul 2024 08:44:19 GMT; path=/; samesite=None; secure; HttpOnly
    Pragma: no-cache
    Cache-control: no-store
    X-Frame-Options: ALLOW-FROM https://web.telegram.org
    Content-Security-Policy: frame-ancestors https://web.telegram.org
    Strict-Transport-Security: max-age=35768000
  • flag-us
    DNS
    o0.u2024.icu
    RegAsm.exe
    Remote address:
    8.8.8.8:53
    Request
    o0.u2024.icu
    IN A
    Response
    o0.u2024.icu
    IN A
    95.217.245.123
  • flag-us
    DNS
    43.58.199.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.58.199.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    99.167.154.149.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    99.167.154.149.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    123.245.217.95.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    123.245.217.95.in-addr.arpa
    IN PTR
    Response
    123.245.217.95.in-addr.arpa
    IN PTR
    static12324521795clients your-serverde
  • flag-us
    DNS
    50.23.12.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.23.12.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    15.164.165.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    15.164.165.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    192.142.123.92.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    192.142.123.92.in-addr.arpa
    IN PTR
    Response
    192.142.123.92.in-addr.arpa
    IN PTR
    a92-123-142-192deploystaticakamaitechnologiescom
  • flag-us
    DNS
    81.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    81.144.22.2.in-addr.arpa
    IN PTR
    Response
    81.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-81deploystaticakamaitechnologiescom
  • flag-us
    DNS
    22.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.236.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    83.210.23.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    83.210.23.2.in-addr.arpa
    IN PTR
    Response
    83.210.23.2.in-addr.arpa
    IN PTR
    a2-23-210-83deploystaticakamaitechnologiescom
  • flag-us
    DNS
    18.173.189.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.173.189.20.in-addr.arpa
    IN PTR
    Response
  • 204.79.197.237:443
    https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1d0021addcbd468eb82eb1ed17d37aa6&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=
    tls, http2
    2.4kB
    9.3kB
    23
    19

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1d0021addcbd468eb82eb1ed17d37aa6&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=1d0021addcbd468eb82eb1ed17d37aa6&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=

    HTTP Response

    204

    HTTP Request

    GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=1d0021addcbd468eb82eb1ed17d37aa6&localId=w:02CFF369-7177-605D-73C2-BA4DB418EA60&deviceId=6896204246996124&anid=

    HTTP Response

    204
  • 149.154.167.99:443
    https://t.me/+7Lir0e4Gw381MDhi
    tls, http
    RegAsm.exe
    1.0kB
    19.4kB
    15
    20

    HTTP Request

    GET https://t.me/+7Lir0e4Gw381MDhi

    HTTP Response

    200
  • 95.217.245.123:443
    o0.u2024.icu
    https
    RegAsm.exe
    3.2MB
    58.9kB
    2311
    1140
  • 8.8.8.8:53
    t.me
    dns
    RegAsm.exe
    100 B
    66 B
    2
    1

    DNS Request

    t.me

    DNS Request

    t.me

    DNS Response

    149.154.167.99

  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    132 B
    90 B
    2
    1

    DNS Request

    8.8.8.8.in-addr.arpa

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    4.181.190.20.in-addr.arpa
    dns
    142 B
    157 B
    2
    1

    DNS Request

    4.181.190.20.in-addr.arpa

    DNS Request

    4.181.190.20.in-addr.arpa

  • 8.8.8.8:53
    73.144.22.2.in-addr.arpa
    dns
    140 B
    133 B
    2
    1

    DNS Request

    73.144.22.2.in-addr.arpa

    DNS Request

    73.144.22.2.in-addr.arpa

  • 8.8.8.8:53
    g.bing.com
    dns
    56 B
    151 B
    1
    1

    DNS Request

    g.bing.com

    DNS Response

    204.79.197.237
    13.107.21.237

  • 8.8.8.8:53
    237.197.79.204.in-addr.arpa
    dns
    73 B
    143 B
    1
    1

    DNS Request

    237.197.79.204.in-addr.arpa

  • 8.8.8.8:53
    o0.u2024.icu
    dns
    RegAsm.exe
    58 B
    74 B
    1
    1

    DNS Request

    o0.u2024.icu

    DNS Response

    95.217.245.123

  • 8.8.8.8:53
    43.58.199.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    43.58.199.20.in-addr.arpa

  • 8.8.8.8:53
    99.167.154.149.in-addr.arpa
    dns
    73 B
    166 B
    1
    1

    DNS Request

    99.167.154.149.in-addr.arpa

  • 8.8.8.8:53
    123.245.217.95.in-addr.arpa
    dns
    73 B
    131 B
    1
    1

    DNS Request

    123.245.217.95.in-addr.arpa

  • 8.8.8.8:53
    50.23.12.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    50.23.12.20.in-addr.arpa

  • 8.8.8.8:53
    15.164.165.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    15.164.165.52.in-addr.arpa

  • 8.8.8.8:53
    192.142.123.92.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    192.142.123.92.in-addr.arpa

  • 8.8.8.8:53
    81.144.22.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    81.144.22.2.in-addr.arpa

  • 8.8.8.8:53
    22.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    22.236.111.52.in-addr.arpa

  • 8.8.8.8:53
    83.210.23.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    83.210.23.2.in-addr.arpa

  • 8.8.8.8:53
    18.173.189.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    18.173.189.20.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2268-0-0x0000000003230000-0x0000000003231000-memory.dmp

    Filesize

    4KB

  • memory/3660-1-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/3660-2-0x00000000745BE000-0x00000000745BF000-memory.dmp

    Filesize

    4KB

  • memory/3660-3-0x0000000005070000-0x00000000050D6000-memory.dmp

    Filesize

    408KB

  • memory/3660-4-0x0000000005B40000-0x0000000006158000-memory.dmp

    Filesize

    6.1MB

  • memory/3660-5-0x00000000055C0000-0x00000000055D2000-memory.dmp

    Filesize

    72KB

  • memory/3660-6-0x00000000056F0000-0x00000000057FA000-memory.dmp

    Filesize

    1.0MB

  • memory/3660-7-0x00000000745B0000-0x0000000074D60000-memory.dmp

    Filesize

    7.7MB

  • memory/3660-8-0x00000000063A0000-0x00000000063DC000-memory.dmp

    Filesize

    240KB

  • memory/3660-9-0x00000000063E0000-0x000000000642C000-memory.dmp

    Filesize

    304KB

  • memory/3660-10-0x0000000006730000-0x00000000068F2000-memory.dmp

    Filesize

    1.8MB

  • memory/3660-11-0x0000000006E30000-0x000000000735C000-memory.dmp

    Filesize

    5.2MB

  • memory/3660-12-0x0000000007910000-0x0000000007EB4000-memory.dmp

    Filesize

    5.6MB

  • memory/3660-13-0x0000000006B40000-0x0000000006BD2000-memory.dmp

    Filesize

    584KB

  • memory/3660-14-0x0000000006980000-0x00000000069F6000-memory.dmp

    Filesize

    472KB

  • memory/3660-15-0x0000000006900000-0x000000000691E000-memory.dmp

    Filesize

    120KB

  • memory/3660-16-0x0000000006CE0000-0x0000000006D30000-memory.dmp

    Filesize

    320KB

  • memory/3660-17-0x00000000745BE000-0x00000000745BF000-memory.dmp

    Filesize

    4KB

  • memory/3660-18-0x00000000745B0000-0x0000000074D60000-memory.dmp

    Filesize

    7.7MB

  • memory/3660-20-0x00000000745B0000-0x0000000074D60000-memory.dmp

    Filesize

    7.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.