Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2025, 07:03 UTC

General

  • Target

    JaffaCakes118_54453a790722fad02b6be80e54277a9f.exe

  • Size

    517KB

  • MD5

    54453a790722fad02b6be80e54277a9f

  • SHA1

    3beb6c1a15ee4abea90d1155f4b795b576a7a5b5

  • SHA256

    e8677a10f830b2bb1bb24d7b0aa6bca09e96f15b819ec127ca02d31a02166210

  • SHA512

    c2e9309a210b14b7f27fe563940b03ec4bd5b1edd7c9d1cb5c775b9db535349973c639969845d0f7cb6dbcec0bd0d9e6c67fee02e30e0421dd3b5c56f84f4b06

  • SSDEEP

    3072:2sntJc4BAEoQmW+ipSKSwkjwLelL02oyPs7hwNXunlFpoyxL0:2stJcv1QmWDs2Lep0nyPeZWyxQ

Malware Config

Extracted

Family

redline

C2

141.94.188.138:46419

Attributes
  • auth_value

    3f48b95855158031ae9e7dafcb203009

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • Redline family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_54453a790722fad02b6be80e54277a9f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_54453a790722fad02b6be80e54277a9f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      #cmd
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2384

Network

    No results found
  • 141.94.188.138:46419
    RegAsm.exe
    152 B
    3
  • 141.94.188.138:46419
    RegAsm.exe
    152 B
    3
  • 141.94.188.138:46419
    RegAsm.exe
    152 B
    3
  • 141.94.188.138:46419
    RegAsm.exe
    152 B
    3
  • 141.94.188.138:46419
    RegAsm.exe
    152 B
    3
  • 141.94.188.138:46419
    RegAsm.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2232-0-0x000007FEF5D23000-0x000007FEF5D24000-memory.dmp

    Filesize

    4KB

  • memory/2232-1-0x0000000000E20000-0x0000000000EA4000-memory.dmp

    Filesize

    528KB

  • memory/2232-2-0x000007FEF5D20000-0x000007FEF670C000-memory.dmp

    Filesize

    9.9MB

  • memory/2232-14-0x000007FEF5D20000-0x000007FEF670C000-memory.dmp

    Filesize

    9.9MB

  • memory/2384-3-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2384-9-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2384-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2384-7-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2384-13-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2384-11-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2384-6-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2384-5-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.