Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 01:29

General

  • Target

    95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe

  • Size

    480KB

  • MD5

    a335e43c4f994ad9217a02b1afd10cef

  • SHA1

    02e280e606d5631b5f483c16dbd5ace0add25f5f

  • SHA256

    95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6

  • SHA512

    b28a39bc1f8333e5e51857900b3d5bf869363c1b3d56a2bad50b82bf48b5dfe15350d30757ddf1f82add93997bdc56631b352d54324416efea5de28b51e848e4

  • SSDEEP

    12288:4MrLy905Lh23CKqu225yrxdo36DCUxx1M:zyChqCKqu228rf91M

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Redline family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe
    "C:\Users\Admin\AppData\Local\Temp\95caee2e43797b5f1c199cc1696eb4fd9ab036e842d974f1a1f852268d49f1a6.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8597964.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8597964.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8243327.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8243327.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8597964.exe

    Filesize

    308KB

    MD5

    559e1fef62802080660720c0a17265a3

    SHA1

    53e1c408bc9caca9ced9ab03b89ef18ea971adad

    SHA256

    59b2bd04a7a8f0f91180e4acbd2dd40aabca9d2a8e89531f42da892b2e5eaae8

    SHA512

    c57ad6bf6dc3d2d1ee46860b179842a50e92e25f675e69c521589d694d0d1f64a8824b86577cd99c54d3d894e9a535184d2323b2ed71efd2f0aa2728efacbaea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8243327.exe

    Filesize

    136KB

    MD5

    62b511f868b541fcab2d80602c748cef

    SHA1

    57ecbb2e7c5f3619932d80d0bbfe112be96b5e47

    SHA256

    e1e30646e8f820ef0892561925d6b83e0a46f75c6311bc1a9bd9df2977dc1acb

    SHA512

    3fa75015978742bb2de8126875e73db884a0783a0a08972c6e01622268e4ddc8183cb5c44f42fb465f8b61cc48ce86fa821cd6f1323c4c0e3c7241c46b6c1895

  • memory/4560-14-0x0000000074A0E000-0x0000000074A0F000-memory.dmp

    Filesize

    4KB

  • memory/4560-15-0x0000000000920000-0x0000000000948000-memory.dmp

    Filesize

    160KB

  • memory/4560-16-0x0000000007DD0000-0x00000000083E8000-memory.dmp

    Filesize

    6.1MB

  • memory/4560-17-0x00000000077D0000-0x00000000077E2000-memory.dmp

    Filesize

    72KB

  • memory/4560-18-0x0000000007900000-0x0000000007A0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4560-19-0x0000000007830000-0x000000000786C000-memory.dmp

    Filesize

    240KB

  • memory/4560-20-0x0000000074A00000-0x00000000751B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4560-21-0x0000000002D70000-0x0000000002DBC000-memory.dmp

    Filesize

    304KB

  • memory/4560-22-0x0000000074A0E000-0x0000000074A0F000-memory.dmp

    Filesize

    4KB

  • memory/4560-23-0x0000000074A00000-0x00000000751B0000-memory.dmp

    Filesize

    7.7MB