Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 01:15

General

  • Target

    10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe

  • Size

    1.1MB

  • MD5

    603ddcf7d38452d0ba19362c82622e58

  • SHA1

    96fb4f2f21ee3f48a921f270bde6339b7706ed04

  • SHA256

    10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af

  • SHA512

    b6c71b92d3eea1d067e0b8c852d3e398b0bb2aafaf55e5ab580b71e6c01f14214ebfa1b10501b01be7ddad340d72d0b4986b6763a121be96e20b8b0c4829c0b6

  • SSDEEP

    24576:Jy48Lx+qmMyt7gtzl6RMGRfXAdylOigMA53UbcUtbp25bPxKrwksIv:8lxAM6R71XPOiTwU1p21E6I

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe
    "C:\Users\Admin\AppData\Local\Temp\10de917b1e05cd00692e4fc858a8af4098df9b090365926ca273e2e356b393af.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3214298.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3214298.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3095975.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3095975.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4464
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4313612.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4313612.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3214298.exe

    Filesize

    750KB

    MD5

    fe82b5301b2c76aa3cb4728b9f4ada70

    SHA1

    dfcfc0a5491f830a84218504a4377cd31bb5a6fd

    SHA256

    c8be141662b86c573a4e687185286fc085cb87a3920f8b9962e11d155e6af04f

    SHA512

    59d2112093170658ff98ddf5f9b003182a3d08ee6911c87f91b5fc9780e34419afee05c7d61817473781d32fa007525d8d8035cc44b8f635d1eba59066857bd6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3095975.exe

    Filesize

    305KB

    MD5

    8dc79b766579851029ebcc38e3c665ff

    SHA1

    2c0211f5f9996c840442e3e2a304b9531ec7f0e5

    SHA256

    617cd5ceddca55d5c02c0a6f4241142b856994d5f64b2e367ed4e61fdab8c6f1

    SHA512

    b63d3952ab0a0b7f6bf97f580c4c1d244eec63c2ca16b7e535ab42550d1d70fe9629ae01901129cb275b176a1e70d88240473cb6f3a982bf55fa940dc673b60c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4313612.exe

    Filesize

    145KB

    MD5

    72a989ad13f5e0097446b1968eb470a7

    SHA1

    f0448ffacdb062f1b7718e6c7dc2572515597484

    SHA256

    2374127867ed3d61a6f165a97c5e5229759da9492d6869a64f8f37e55d4abbbe

    SHA512

    f36a906032ca1bfd1f4b3a4bd741eb83c515ff97c034e284c38b20a20b62be53cf880c7572dc5fac22d66376349059eed1a5fa7979812c61ae1178374867e0c9

  • memory/3664-21-0x0000000000540000-0x000000000056A000-memory.dmp

    Filesize

    168KB

  • memory/3664-22-0x0000000005490000-0x0000000005AA8000-memory.dmp

    Filesize

    6.1MB

  • memory/3664-23-0x0000000005010000-0x000000000511A000-memory.dmp

    Filesize

    1.0MB

  • memory/3664-24-0x0000000004F40000-0x0000000004F52000-memory.dmp

    Filesize

    72KB

  • memory/3664-25-0x0000000005120000-0x000000000515C000-memory.dmp

    Filesize

    240KB

  • memory/3664-26-0x0000000004FA0000-0x0000000004FEC000-memory.dmp

    Filesize

    304KB