Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
37s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
29/06/2023, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe
Resource
win10v2004-20230621-en
General
-
Target
63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe
-
Size
3.9MB
-
MD5
73423b603a3a819764da2d2892a610a1
-
SHA1
37894a72f197b0d45c66b686bb29bf059329310e
-
SHA256
63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4
-
SHA512
e2620d5f6cbadb5ef99cf1fd72a2761fca78c54bbaa1d8b7412a8dcb2b04368b3fb8ab34ae1fd50beecfbb32f500c6f10f09166c06a2e6c500dc43194cc62ff7
-
SSDEEP
98304:fj/xb0tfRGDCgVG+Rf74pVwX+5DEpraStT:fdQtRGzVGeT4pVwX+5DEdaS1
Malware Config
Extracted
redline
smoke
83.97.73.131:19071
-
auth_value
aaa47198b84c95fcce9397339e8af9d4
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/700-83-0x0000000000250000-0x000000000025A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3416601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3416601.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k3416601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3416601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3416601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3416601.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 668 y6875097.exe 700 k3416601.exe 1244 l0816126.exe -
Loads dropped DLL 8 IoCs
pid Process 1312 63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe 668 y6875097.exe 668 y6875097.exe 668 y6875097.exe 700 k3416601.exe 668 y6875097.exe 668 y6875097.exe 1244 l0816126.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k3416601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3416601.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6875097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y6875097.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 700 k3416601.exe 700 k3416601.exe 1244 l0816126.exe 1244 l0816126.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 700 k3416601.exe Token: SeDebugPrivilege 1244 l0816126.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1312 wrote to memory of 668 1312 63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe 28 PID 1312 wrote to memory of 668 1312 63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe 28 PID 1312 wrote to memory of 668 1312 63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe 28 PID 1312 wrote to memory of 668 1312 63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe 28 PID 1312 wrote to memory of 668 1312 63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe 28 PID 1312 wrote to memory of 668 1312 63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe 28 PID 1312 wrote to memory of 668 1312 63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe 28 PID 668 wrote to memory of 700 668 y6875097.exe 29 PID 668 wrote to memory of 700 668 y6875097.exe 29 PID 668 wrote to memory of 700 668 y6875097.exe 29 PID 668 wrote to memory of 700 668 y6875097.exe 29 PID 668 wrote to memory of 700 668 y6875097.exe 29 PID 668 wrote to memory of 700 668 y6875097.exe 29 PID 668 wrote to memory of 700 668 y6875097.exe 29 PID 668 wrote to memory of 1244 668 y6875097.exe 31 PID 668 wrote to memory of 1244 668 y6875097.exe 31 PID 668 wrote to memory of 1244 668 y6875097.exe 31 PID 668 wrote to memory of 1244 668 y6875097.exe 31 PID 668 wrote to memory of 1244 668 y6875097.exe 31 PID 668 wrote to memory of 1244 668 y6875097.exe 31 PID 668 wrote to memory of 1244 668 y6875097.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe"C:\Users\Admin\AppData\Local\Temp\63ffebbe4a88dfcc781e6d38de5cbffc7fc8f938f9f230352f4f31a6c6eee1c4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6875097.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y6875097.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3416601.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3416601.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0816126.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0816126.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD5a4ce30ad74d674a9d893b53b22cb3af9
SHA113cfcfa1c611da1867c6e8762f76f3960a23e2ed
SHA256df6126ad5fb656845b3a1f246f8a50bc66fbfc81a3b5076cc043c5f695913f0c
SHA512c7c90f49ab2cea497e56a12affc5ad579337225c5b7be39968e1c87e6965327f68c9970611873c6aeb3de79074d60bcee6fda7f6deb16e052291eec6fc12cce4
-
Filesize
407KB
MD5a4ce30ad74d674a9d893b53b22cb3af9
SHA113cfcfa1c611da1867c6e8762f76f3960a23e2ed
SHA256df6126ad5fb656845b3a1f246f8a50bc66fbfc81a3b5076cc043c5f695913f0c
SHA512c7c90f49ab2cea497e56a12affc5ad579337225c5b7be39968e1c87e6965327f68c9970611873c6aeb3de79074d60bcee6fda7f6deb16e052291eec6fc12cce4
-
Filesize
185KB
MD5c6a2956cbdb0aea1ffc3561bd87296b7
SHA1ef149ff74458eba08af92ffb883e455c5b8c698f
SHA256b17ed5cc69630288792213729a647ca11c9c946e776327ec016be12f79750340
SHA5121985d49c54a1d815d4fb0f1430e5b8d6e8c8fda45fb6229902c508bcc14bd3feebb8d7082d9bb2f2a1ab7c36a4d33b3986b50e1e76ac6d97098c88a4860ee9f8
-
Filesize
185KB
MD5c6a2956cbdb0aea1ffc3561bd87296b7
SHA1ef149ff74458eba08af92ffb883e455c5b8c698f
SHA256b17ed5cc69630288792213729a647ca11c9c946e776327ec016be12f79750340
SHA5121985d49c54a1d815d4fb0f1430e5b8d6e8c8fda45fb6229902c508bcc14bd3feebb8d7082d9bb2f2a1ab7c36a4d33b3986b50e1e76ac6d97098c88a4860ee9f8
-
Filesize
185KB
MD5c6a2956cbdb0aea1ffc3561bd87296b7
SHA1ef149ff74458eba08af92ffb883e455c5b8c698f
SHA256b17ed5cc69630288792213729a647ca11c9c946e776327ec016be12f79750340
SHA5121985d49c54a1d815d4fb0f1430e5b8d6e8c8fda45fb6229902c508bcc14bd3feebb8d7082d9bb2f2a1ab7c36a4d33b3986b50e1e76ac6d97098c88a4860ee9f8
-
Filesize
1.3MB
MD5e8811bf59e9488c31469313c856e2b28
SHA11b253a3baf7f169040f63f0dc9616b5c25c451b0
SHA2566766cdcf7c860f8659dd53dfa239e43b30dd4ab93f36b5e65d6f9703a1f47b62
SHA512b828d482dd12704385c50716eca638cf58000d10c9360da75fa23d6eef2f4d4f2fedece722f9eb6901fea2618da885a6ba4a709c51c1f71a910ab0b6e76a14cf
-
Filesize
1.3MB
MD5e8811bf59e9488c31469313c856e2b28
SHA11b253a3baf7f169040f63f0dc9616b5c25c451b0
SHA2566766cdcf7c860f8659dd53dfa239e43b30dd4ab93f36b5e65d6f9703a1f47b62
SHA512b828d482dd12704385c50716eca638cf58000d10c9360da75fa23d6eef2f4d4f2fedece722f9eb6901fea2618da885a6ba4a709c51c1f71a910ab0b6e76a14cf
-
Filesize
1.3MB
MD5e8811bf59e9488c31469313c856e2b28
SHA11b253a3baf7f169040f63f0dc9616b5c25c451b0
SHA2566766cdcf7c860f8659dd53dfa239e43b30dd4ab93f36b5e65d6f9703a1f47b62
SHA512b828d482dd12704385c50716eca638cf58000d10c9360da75fa23d6eef2f4d4f2fedece722f9eb6901fea2618da885a6ba4a709c51c1f71a910ab0b6e76a14cf
-
Filesize
407KB
MD5a4ce30ad74d674a9d893b53b22cb3af9
SHA113cfcfa1c611da1867c6e8762f76f3960a23e2ed
SHA256df6126ad5fb656845b3a1f246f8a50bc66fbfc81a3b5076cc043c5f695913f0c
SHA512c7c90f49ab2cea497e56a12affc5ad579337225c5b7be39968e1c87e6965327f68c9970611873c6aeb3de79074d60bcee6fda7f6deb16e052291eec6fc12cce4
-
Filesize
407KB
MD5a4ce30ad74d674a9d893b53b22cb3af9
SHA113cfcfa1c611da1867c6e8762f76f3960a23e2ed
SHA256df6126ad5fb656845b3a1f246f8a50bc66fbfc81a3b5076cc043c5f695913f0c
SHA512c7c90f49ab2cea497e56a12affc5ad579337225c5b7be39968e1c87e6965327f68c9970611873c6aeb3de79074d60bcee6fda7f6deb16e052291eec6fc12cce4
-
Filesize
185KB
MD5c6a2956cbdb0aea1ffc3561bd87296b7
SHA1ef149ff74458eba08af92ffb883e455c5b8c698f
SHA256b17ed5cc69630288792213729a647ca11c9c946e776327ec016be12f79750340
SHA5121985d49c54a1d815d4fb0f1430e5b8d6e8c8fda45fb6229902c508bcc14bd3feebb8d7082d9bb2f2a1ab7c36a4d33b3986b50e1e76ac6d97098c88a4860ee9f8
-
Filesize
185KB
MD5c6a2956cbdb0aea1ffc3561bd87296b7
SHA1ef149ff74458eba08af92ffb883e455c5b8c698f
SHA256b17ed5cc69630288792213729a647ca11c9c946e776327ec016be12f79750340
SHA5121985d49c54a1d815d4fb0f1430e5b8d6e8c8fda45fb6229902c508bcc14bd3feebb8d7082d9bb2f2a1ab7c36a4d33b3986b50e1e76ac6d97098c88a4860ee9f8
-
Filesize
185KB
MD5c6a2956cbdb0aea1ffc3561bd87296b7
SHA1ef149ff74458eba08af92ffb883e455c5b8c698f
SHA256b17ed5cc69630288792213729a647ca11c9c946e776327ec016be12f79750340
SHA5121985d49c54a1d815d4fb0f1430e5b8d6e8c8fda45fb6229902c508bcc14bd3feebb8d7082d9bb2f2a1ab7c36a4d33b3986b50e1e76ac6d97098c88a4860ee9f8
-
Filesize
1.3MB
MD5e8811bf59e9488c31469313c856e2b28
SHA11b253a3baf7f169040f63f0dc9616b5c25c451b0
SHA2566766cdcf7c860f8659dd53dfa239e43b30dd4ab93f36b5e65d6f9703a1f47b62
SHA512b828d482dd12704385c50716eca638cf58000d10c9360da75fa23d6eef2f4d4f2fedece722f9eb6901fea2618da885a6ba4a709c51c1f71a910ab0b6e76a14cf
-
Filesize
1.3MB
MD5e8811bf59e9488c31469313c856e2b28
SHA11b253a3baf7f169040f63f0dc9616b5c25c451b0
SHA2566766cdcf7c860f8659dd53dfa239e43b30dd4ab93f36b5e65d6f9703a1f47b62
SHA512b828d482dd12704385c50716eca638cf58000d10c9360da75fa23d6eef2f4d4f2fedece722f9eb6901fea2618da885a6ba4a709c51c1f71a910ab0b6e76a14cf
-
Filesize
1.3MB
MD5e8811bf59e9488c31469313c856e2b28
SHA11b253a3baf7f169040f63f0dc9616b5c25c451b0
SHA2566766cdcf7c860f8659dd53dfa239e43b30dd4ab93f36b5e65d6f9703a1f47b62
SHA512b828d482dd12704385c50716eca638cf58000d10c9360da75fa23d6eef2f4d4f2fedece722f9eb6901fea2618da885a6ba4a709c51c1f71a910ab0b6e76a14cf