Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
61b58351b6c4f111d36c99a0b2423d39.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
61b58351b6c4f111d36c99a0b2423d39.exe
Resource
win10v2004-20230703-en
General
-
Target
61b58351b6c4f111d36c99a0b2423d39.exe
-
Size
529KB
-
MD5
61b58351b6c4f111d36c99a0b2423d39
-
SHA1
2b702240763744c9e93f19905f744530d551cf3c
-
SHA256
7f8953281cf918422ed33f6126aab3fe22a9ffe10a04a003320f348c96172cad
-
SHA512
acad90e6dbee95ab217e9ebaabcf58cd7764590403305da89f95bccb3ce65954d94ab5847790594d606aee18e07b053187de190c27b340bdd4900dbff6b761f3
-
SSDEEP
12288:2MgsfvmaRdnQgOtHKec+85cDJc3IhJFoQTDkgx:2Mgmvm82gGHPtACu4Dkgx
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/1764-83-0x0000000000020000-0x000000000002A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0636062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0636062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0636062.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k0636062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0636062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0636062.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2324 y5490391.exe 1764 k0636062.exe 2912 l2107065.exe -
Loads dropped DLL 8 IoCs
pid Process 1336 61b58351b6c4f111d36c99a0b2423d39.exe 2324 y5490391.exe 2324 y5490391.exe 2324 y5490391.exe 1764 k0636062.exe 2324 y5490391.exe 2324 y5490391.exe 2912 l2107065.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k0636062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0636062.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5490391.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5490391.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 61b58351b6c4f111d36c99a0b2423d39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 61b58351b6c4f111d36c99a0b2423d39.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1764 k0636062.exe 1764 k0636062.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1764 k0636062.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1336 wrote to memory of 2324 1336 61b58351b6c4f111d36c99a0b2423d39.exe 30 PID 1336 wrote to memory of 2324 1336 61b58351b6c4f111d36c99a0b2423d39.exe 30 PID 1336 wrote to memory of 2324 1336 61b58351b6c4f111d36c99a0b2423d39.exe 30 PID 1336 wrote to memory of 2324 1336 61b58351b6c4f111d36c99a0b2423d39.exe 30 PID 1336 wrote to memory of 2324 1336 61b58351b6c4f111d36c99a0b2423d39.exe 30 PID 1336 wrote to memory of 2324 1336 61b58351b6c4f111d36c99a0b2423d39.exe 30 PID 1336 wrote to memory of 2324 1336 61b58351b6c4f111d36c99a0b2423d39.exe 30 PID 2324 wrote to memory of 1764 2324 y5490391.exe 31 PID 2324 wrote to memory of 1764 2324 y5490391.exe 31 PID 2324 wrote to memory of 1764 2324 y5490391.exe 31 PID 2324 wrote to memory of 1764 2324 y5490391.exe 31 PID 2324 wrote to memory of 1764 2324 y5490391.exe 31 PID 2324 wrote to memory of 1764 2324 y5490391.exe 31 PID 2324 wrote to memory of 1764 2324 y5490391.exe 31 PID 2324 wrote to memory of 2912 2324 y5490391.exe 33 PID 2324 wrote to memory of 2912 2324 y5490391.exe 33 PID 2324 wrote to memory of 2912 2324 y5490391.exe 33 PID 2324 wrote to memory of 2912 2324 y5490391.exe 33 PID 2324 wrote to memory of 2912 2324 y5490391.exe 33 PID 2324 wrote to memory of 2912 2324 y5490391.exe 33 PID 2324 wrote to memory of 2912 2324 y5490391.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\61b58351b6c4f111d36c99a0b2423d39.exe"C:\Users\Admin\AppData\Local\Temp\61b58351b6c4f111d36c99a0b2423d39.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5490391.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5490391.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0636062.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0636062.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2107065.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2107065.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2912
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5158369a68427f760955993a82c6cf6c1
SHA13ac577746adafbf4247ceceb2fdf79b7899857d6
SHA2565a3bfd93f1a6251f884a110a582177f9238b0cf0aaebcaba59648e2e9c367cce
SHA512dcff982504ba9c8d33f026bbc9deb3b1d020f0bb90144abe1cea7d1064dbf2ec8815e6d1856581af29f31090986108c67499eef31c21fcfa8a9e8b6ea58801fd
-
Filesize
260KB
MD5158369a68427f760955993a82c6cf6c1
SHA13ac577746adafbf4247ceceb2fdf79b7899857d6
SHA2565a3bfd93f1a6251f884a110a582177f9238b0cf0aaebcaba59648e2e9c367cce
SHA512dcff982504ba9c8d33f026bbc9deb3b1d020f0bb90144abe1cea7d1064dbf2ec8815e6d1856581af29f31090986108c67499eef31c21fcfa8a9e8b6ea58801fd
-
Filesize
96KB
MD529d389c10ced1d150f8c5d8206c3b798
SHA10403c9a42287e4c077219da03f5bf5b0df1fe12c
SHA256a890b005219be450e2107de584dbf36b19f071db4a011352e241032f97bc7b27
SHA5125312054895d83f55441e08b327714b27359c2e374d35a9c3e1cb50728a41d514ed88bdfae4889c0e620d1cbf71f15bd86494c11eb93ab234490158d30865126f
-
Filesize
96KB
MD529d389c10ced1d150f8c5d8206c3b798
SHA10403c9a42287e4c077219da03f5bf5b0df1fe12c
SHA256a890b005219be450e2107de584dbf36b19f071db4a011352e241032f97bc7b27
SHA5125312054895d83f55441e08b327714b27359c2e374d35a9c3e1cb50728a41d514ed88bdfae4889c0e620d1cbf71f15bd86494c11eb93ab234490158d30865126f
-
Filesize
96KB
MD529d389c10ced1d150f8c5d8206c3b798
SHA10403c9a42287e4c077219da03f5bf5b0df1fe12c
SHA256a890b005219be450e2107de584dbf36b19f071db4a011352e241032f97bc7b27
SHA5125312054895d83f55441e08b327714b27359c2e374d35a9c3e1cb50728a41d514ed88bdfae4889c0e620d1cbf71f15bd86494c11eb93ab234490158d30865126f
-
Filesize
257KB
MD542d183766ce86938595cec7adf64190d
SHA1c7b0b5ebf7fd48dcc31b773b96d004930f736c00
SHA2569dd14c32dfba7d12faa9823549585e40d21e9b33055f5aaea37d224156ed6011
SHA51289f1ca220984e127516fa1e30615b53a36e7f386ddeaeb85db438c9ebf32db7a14de48b8e1939a9eafb06f8c18518fa45847c47a7d96595639098308468d0e4e
-
Filesize
257KB
MD542d183766ce86938595cec7adf64190d
SHA1c7b0b5ebf7fd48dcc31b773b96d004930f736c00
SHA2569dd14c32dfba7d12faa9823549585e40d21e9b33055f5aaea37d224156ed6011
SHA51289f1ca220984e127516fa1e30615b53a36e7f386ddeaeb85db438c9ebf32db7a14de48b8e1939a9eafb06f8c18518fa45847c47a7d96595639098308468d0e4e
-
Filesize
257KB
MD542d183766ce86938595cec7adf64190d
SHA1c7b0b5ebf7fd48dcc31b773b96d004930f736c00
SHA2569dd14c32dfba7d12faa9823549585e40d21e9b33055f5aaea37d224156ed6011
SHA51289f1ca220984e127516fa1e30615b53a36e7f386ddeaeb85db438c9ebf32db7a14de48b8e1939a9eafb06f8c18518fa45847c47a7d96595639098308468d0e4e
-
Filesize
260KB
MD5158369a68427f760955993a82c6cf6c1
SHA13ac577746adafbf4247ceceb2fdf79b7899857d6
SHA2565a3bfd93f1a6251f884a110a582177f9238b0cf0aaebcaba59648e2e9c367cce
SHA512dcff982504ba9c8d33f026bbc9deb3b1d020f0bb90144abe1cea7d1064dbf2ec8815e6d1856581af29f31090986108c67499eef31c21fcfa8a9e8b6ea58801fd
-
Filesize
260KB
MD5158369a68427f760955993a82c6cf6c1
SHA13ac577746adafbf4247ceceb2fdf79b7899857d6
SHA2565a3bfd93f1a6251f884a110a582177f9238b0cf0aaebcaba59648e2e9c367cce
SHA512dcff982504ba9c8d33f026bbc9deb3b1d020f0bb90144abe1cea7d1064dbf2ec8815e6d1856581af29f31090986108c67499eef31c21fcfa8a9e8b6ea58801fd
-
Filesize
96KB
MD529d389c10ced1d150f8c5d8206c3b798
SHA10403c9a42287e4c077219da03f5bf5b0df1fe12c
SHA256a890b005219be450e2107de584dbf36b19f071db4a011352e241032f97bc7b27
SHA5125312054895d83f55441e08b327714b27359c2e374d35a9c3e1cb50728a41d514ed88bdfae4889c0e620d1cbf71f15bd86494c11eb93ab234490158d30865126f
-
Filesize
96KB
MD529d389c10ced1d150f8c5d8206c3b798
SHA10403c9a42287e4c077219da03f5bf5b0df1fe12c
SHA256a890b005219be450e2107de584dbf36b19f071db4a011352e241032f97bc7b27
SHA5125312054895d83f55441e08b327714b27359c2e374d35a9c3e1cb50728a41d514ed88bdfae4889c0e620d1cbf71f15bd86494c11eb93ab234490158d30865126f
-
Filesize
96KB
MD529d389c10ced1d150f8c5d8206c3b798
SHA10403c9a42287e4c077219da03f5bf5b0df1fe12c
SHA256a890b005219be450e2107de584dbf36b19f071db4a011352e241032f97bc7b27
SHA5125312054895d83f55441e08b327714b27359c2e374d35a9c3e1cb50728a41d514ed88bdfae4889c0e620d1cbf71f15bd86494c11eb93ab234490158d30865126f
-
Filesize
257KB
MD542d183766ce86938595cec7adf64190d
SHA1c7b0b5ebf7fd48dcc31b773b96d004930f736c00
SHA2569dd14c32dfba7d12faa9823549585e40d21e9b33055f5aaea37d224156ed6011
SHA51289f1ca220984e127516fa1e30615b53a36e7f386ddeaeb85db438c9ebf32db7a14de48b8e1939a9eafb06f8c18518fa45847c47a7d96595639098308468d0e4e
-
Filesize
257KB
MD542d183766ce86938595cec7adf64190d
SHA1c7b0b5ebf7fd48dcc31b773b96d004930f736c00
SHA2569dd14c32dfba7d12faa9823549585e40d21e9b33055f5aaea37d224156ed6011
SHA51289f1ca220984e127516fa1e30615b53a36e7f386ddeaeb85db438c9ebf32db7a14de48b8e1939a9eafb06f8c18518fa45847c47a7d96595639098308468d0e4e
-
Filesize
257KB
MD542d183766ce86938595cec7adf64190d
SHA1c7b0b5ebf7fd48dcc31b773b96d004930f736c00
SHA2569dd14c32dfba7d12faa9823549585e40d21e9b33055f5aaea37d224156ed6011
SHA51289f1ca220984e127516fa1e30615b53a36e7f386ddeaeb85db438c9ebf32db7a14de48b8e1939a9eafb06f8c18518fa45847c47a7d96595639098308468d0e4e