Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
97ee2d781edd8f7f0962c4e0971e22f1.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
97ee2d781edd8f7f0962c4e0971e22f1.exe
Resource
win10v2004-20230703-en
General
-
Target
97ee2d781edd8f7f0962c4e0971e22f1.exe
-
Size
3.9MB
-
MD5
97ee2d781edd8f7f0962c4e0971e22f1
-
SHA1
76101d9fb77f2a982536f0f3cf861ef9cb5d7162
-
SHA256
340b6e3ddd092332bc5ccf534cbed6908cd5d50b6fd5dced96d3bc1f153ecbb5
-
SHA512
dcb2a1afc36c4c7f4063eb14c1aba4d467f184383df40fafd1b77572ee2126eecabb874fe4df83b3b4b23b3d076db9aedbf51e502f3ee574c9658a22ef24bc39
-
SSDEEP
49152:lwvqFij7iSFBuP+gemoVTXgorHYHdaHgIcZwxUoqSL9ZvdP/PXpIMPcaHOYU/Pm3:4wzsVb5pAEvxxpJpIXaLU/Jg
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/3808-153-0x00000000001F0000-0x00000000001FA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1340022.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation n2592917.exe Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation rugen.exe -
Executes dropped EXE 7 IoCs
pid Process 2904 y8040865.exe 3808 k1340022.exe 232 l1500827.exe 3860 n2592917.exe 1244 rugen.exe 1560 rugen.exe 3516 rugen.exe -
Loads dropped DLL 1 IoCs
pid Process 412 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1340022.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1340022.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 97ee2d781edd8f7f0962c4e0971e22f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 97ee2d781edd8f7f0962c4e0971e22f1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8040865.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8040865.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3580 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3808 k1340022.exe 3808 k1340022.exe 232 l1500827.exe 232 l1500827.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3808 k1340022.exe Token: SeDebugPrivilege 232 l1500827.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3860 n2592917.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4968 wrote to memory of 2904 4968 97ee2d781edd8f7f0962c4e0971e22f1.exe 84 PID 4968 wrote to memory of 2904 4968 97ee2d781edd8f7f0962c4e0971e22f1.exe 84 PID 4968 wrote to memory of 2904 4968 97ee2d781edd8f7f0962c4e0971e22f1.exe 84 PID 2904 wrote to memory of 3808 2904 y8040865.exe 85 PID 2904 wrote to memory of 3808 2904 y8040865.exe 85 PID 2904 wrote to memory of 3808 2904 y8040865.exe 85 PID 2904 wrote to memory of 232 2904 y8040865.exe 87 PID 2904 wrote to memory of 232 2904 y8040865.exe 87 PID 2904 wrote to memory of 232 2904 y8040865.exe 87 PID 4968 wrote to memory of 3860 4968 97ee2d781edd8f7f0962c4e0971e22f1.exe 90 PID 4968 wrote to memory of 3860 4968 97ee2d781edd8f7f0962c4e0971e22f1.exe 90 PID 4968 wrote to memory of 3860 4968 97ee2d781edd8f7f0962c4e0971e22f1.exe 90 PID 3860 wrote to memory of 1244 3860 n2592917.exe 91 PID 3860 wrote to memory of 1244 3860 n2592917.exe 91 PID 3860 wrote to memory of 1244 3860 n2592917.exe 91 PID 1244 wrote to memory of 3580 1244 rugen.exe 92 PID 1244 wrote to memory of 3580 1244 rugen.exe 92 PID 1244 wrote to memory of 3580 1244 rugen.exe 92 PID 1244 wrote to memory of 2112 1244 rugen.exe 94 PID 1244 wrote to memory of 2112 1244 rugen.exe 94 PID 1244 wrote to memory of 2112 1244 rugen.exe 94 PID 2112 wrote to memory of 3660 2112 cmd.exe 96 PID 2112 wrote to memory of 3660 2112 cmd.exe 96 PID 2112 wrote to memory of 3660 2112 cmd.exe 96 PID 2112 wrote to memory of 4584 2112 cmd.exe 97 PID 2112 wrote to memory of 4584 2112 cmd.exe 97 PID 2112 wrote to memory of 4584 2112 cmd.exe 97 PID 2112 wrote to memory of 4284 2112 cmd.exe 98 PID 2112 wrote to memory of 4284 2112 cmd.exe 98 PID 2112 wrote to memory of 4284 2112 cmd.exe 98 PID 2112 wrote to memory of 4752 2112 cmd.exe 99 PID 2112 wrote to memory of 4752 2112 cmd.exe 99 PID 2112 wrote to memory of 4752 2112 cmd.exe 99 PID 2112 wrote to memory of 1292 2112 cmd.exe 100 PID 2112 wrote to memory of 1292 2112 cmd.exe 100 PID 2112 wrote to memory of 1292 2112 cmd.exe 100 PID 2112 wrote to memory of 820 2112 cmd.exe 101 PID 2112 wrote to memory of 820 2112 cmd.exe 101 PID 2112 wrote to memory of 820 2112 cmd.exe 101 PID 1244 wrote to memory of 412 1244 rugen.exe 104 PID 1244 wrote to memory of 412 1244 rugen.exe 104 PID 1244 wrote to memory of 412 1244 rugen.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\97ee2d781edd8f7f0962c4e0971e22f1.exe"C:\Users\Admin\AppData\Local\Temp\97ee2d781edd8f7f0962c4e0971e22f1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8040865.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8040865.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1340022.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1340022.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1500827.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1500827.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2592917.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2592917.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:3580
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:4584
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:4284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:1292
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:820
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:1560
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:3516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
402KB
MD5ea66ebb629dfdc5a17e9ba52c672d471
SHA1bc086e6b7f884e4b4b11c59cef6a1dd3dff0fbcd
SHA256813a18184d0e5c3af47d0b53d5038175f06325f361a854b7b8531f0b212888e3
SHA512cfee867f8de6130f0d8b65d7fad4dd386743107891a4de87b4fe6b9f5498f618a7b373f91556d2fecda5c3dbf41131555486dab817e3ba65da87813f9f5b043c
-
Filesize
402KB
MD5ea66ebb629dfdc5a17e9ba52c672d471
SHA1bc086e6b7f884e4b4b11c59cef6a1dd3dff0fbcd
SHA256813a18184d0e5c3af47d0b53d5038175f06325f361a854b7b8531f0b212888e3
SHA512cfee867f8de6130f0d8b65d7fad4dd386743107891a4de87b4fe6b9f5498f618a7b373f91556d2fecda5c3dbf41131555486dab817e3ba65da87813f9f5b043c
-
Filesize
185KB
MD5ca338b54586954a5dbe4bbe285836571
SHA1f4bd3bd2f47ad2f36b774abac3e2a378c4c53604
SHA256f5eefa3b9c8cc01a9ffaceb3583c45c2cb10dc9bcb584772533ada3b6a66ec6e
SHA51203419618bcfca461a7c95638819645263659485d8149330e08cb16c50e45cf397f2030d8f8bf5a5ec2ccdb2d6653dce1609570ce88d318d3dd4b4cf551bc3b10
-
Filesize
185KB
MD5ca338b54586954a5dbe4bbe285836571
SHA1f4bd3bd2f47ad2f36b774abac3e2a378c4c53604
SHA256f5eefa3b9c8cc01a9ffaceb3583c45c2cb10dc9bcb584772533ada3b6a66ec6e
SHA51203419618bcfca461a7c95638819645263659485d8149330e08cb16c50e45cf397f2030d8f8bf5a5ec2ccdb2d6653dce1609570ce88d318d3dd4b4cf551bc3b10
-
Filesize
1.3MB
MD57d7506f9a5e142b81b7acb3e3765585c
SHA1b8f388b4ae7f6c942302d17f0e746d1303b7c517
SHA256ac76c152af44b05618f45f5da3df3c9a999c8fc83ab39382cd5ca42c746305d1
SHA512385676d04b22cf0a106bc9ead2827eb4d0930d5c22a4f1d531c8bf9cf9525dfe1a3f6fe3227586abf5d56f18598898daa8da64b3a8ec1293506092f8c7dc9902
-
Filesize
1.3MB
MD57d7506f9a5e142b81b7acb3e3765585c
SHA1b8f388b4ae7f6c942302d17f0e746d1303b7c517
SHA256ac76c152af44b05618f45f5da3df3c9a999c8fc83ab39382cd5ca42c746305d1
SHA512385676d04b22cf0a106bc9ead2827eb4d0930d5c22a4f1d531c8bf9cf9525dfe1a3f6fe3227586abf5d56f18598898daa8da64b3a8ec1293506092f8c7dc9902
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d