Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
09/07/2023, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
bf7c2c05d933486717d3ed336.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
bf7c2c05d933486717d3ed336.exe
Resource
win10v2004-20230703-en
General
-
Target
bf7c2c05d933486717d3ed336.exe
-
Size
522KB
-
MD5
bf7c2c05d933486717d3ed3367b3aa74
-
SHA1
fb4deb60a9f81ce8d8dab70d2faaa24a9e794b3d
-
SHA256
3bd00d683822dec340705519745286e08cc08af7ea9f6d48732bb45c260db3c4
-
SHA512
62b95692f4eefafc3d0b0afd05765014fc667b347157dd324010bb887d366bb0063952b1cde6e9c4f179fb6a45e820f5bffa6cf3e91dd248b820fb0cd3740ed4
-
SSDEEP
12288:wWJufvMaRdnQgzp7qBM8fc41jsfO7B7TMDkmCim:wWJ0vM82gtKEeom7B7TMG
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/1172-83-0x0000000000020000-0x000000000002A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8043421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8043421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8043421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8043421.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k8043421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8043421.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1116 y9557247.exe 1172 k8043421.exe 1400 l9720053.exe -
Loads dropped DLL 8 IoCs
pid Process 2056 bf7c2c05d933486717d3ed336.exe 1116 y9557247.exe 1116 y9557247.exe 1116 y9557247.exe 1172 k8043421.exe 1116 y9557247.exe 1116 y9557247.exe 1400 l9720053.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k8043421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8043421.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf7c2c05d933486717d3ed336.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9557247.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9557247.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce bf7c2c05d933486717d3ed336.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1172 k8043421.exe 1172 k8043421.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1172 k8043421.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1116 2056 bf7c2c05d933486717d3ed336.exe 29 PID 2056 wrote to memory of 1116 2056 bf7c2c05d933486717d3ed336.exe 29 PID 2056 wrote to memory of 1116 2056 bf7c2c05d933486717d3ed336.exe 29 PID 2056 wrote to memory of 1116 2056 bf7c2c05d933486717d3ed336.exe 29 PID 2056 wrote to memory of 1116 2056 bf7c2c05d933486717d3ed336.exe 29 PID 2056 wrote to memory of 1116 2056 bf7c2c05d933486717d3ed336.exe 29 PID 2056 wrote to memory of 1116 2056 bf7c2c05d933486717d3ed336.exe 29 PID 1116 wrote to memory of 1172 1116 y9557247.exe 30 PID 1116 wrote to memory of 1172 1116 y9557247.exe 30 PID 1116 wrote to memory of 1172 1116 y9557247.exe 30 PID 1116 wrote to memory of 1172 1116 y9557247.exe 30 PID 1116 wrote to memory of 1172 1116 y9557247.exe 30 PID 1116 wrote to memory of 1172 1116 y9557247.exe 30 PID 1116 wrote to memory of 1172 1116 y9557247.exe 30 PID 1116 wrote to memory of 1400 1116 y9557247.exe 32 PID 1116 wrote to memory of 1400 1116 y9557247.exe 32 PID 1116 wrote to memory of 1400 1116 y9557247.exe 32 PID 1116 wrote to memory of 1400 1116 y9557247.exe 32 PID 1116 wrote to memory of 1400 1116 y9557247.exe 32 PID 1116 wrote to memory of 1400 1116 y9557247.exe 32 PID 1116 wrote to memory of 1400 1116 y9557247.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7c2c05d933486717d3ed336.exe"C:\Users\Admin\AppData\Local\Temp\bf7c2c05d933486717d3ed336.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9557247.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9557247.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8043421.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8043421.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9720053.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9720053.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1400
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD58a252d4e3636b6d3c07d45c838bb7c42
SHA133153632f62bd86779bc68272c077f36c84f8660
SHA25685a8d2a1741e7b61845d49bb6ac1bdfbff7a4c171ec68b1fcc9d60f9e173cc80
SHA51281c1fc2863a100f0dd251d0d50f8446af75a2d3358d69906797647af84c93ab2a902dd0717a41c6325cb354886ca0307577dfdc3154d9b96072831bcacc35f82
-
Filesize
257KB
MD58a252d4e3636b6d3c07d45c838bb7c42
SHA133153632f62bd86779bc68272c077f36c84f8660
SHA25685a8d2a1741e7b61845d49bb6ac1bdfbff7a4c171ec68b1fcc9d60f9e173cc80
SHA51281c1fc2863a100f0dd251d0d50f8446af75a2d3358d69906797647af84c93ab2a902dd0717a41c6325cb354886ca0307577dfdc3154d9b96072831bcacc35f82
-
Filesize
93KB
MD519ed7a7d92a08233181282d06f1be84e
SHA1396bd987d8bf834964971aa9fb3d1778ee603a02
SHA256f64dd1f2ac82f6011cee686f784030b9c435b83a8a321455de7e028534792ba8
SHA512caf82a86d6e6cbf5cd096b732bb23d114d38c95ac6b526258e94d6df43b1dd6598f157f06c0bff2188228cc497697d5264bfb7c739aac8b18a591823fc6f62f0
-
Filesize
93KB
MD519ed7a7d92a08233181282d06f1be84e
SHA1396bd987d8bf834964971aa9fb3d1778ee603a02
SHA256f64dd1f2ac82f6011cee686f784030b9c435b83a8a321455de7e028534792ba8
SHA512caf82a86d6e6cbf5cd096b732bb23d114d38c95ac6b526258e94d6df43b1dd6598f157f06c0bff2188228cc497697d5264bfb7c739aac8b18a591823fc6f62f0
-
Filesize
93KB
MD519ed7a7d92a08233181282d06f1be84e
SHA1396bd987d8bf834964971aa9fb3d1778ee603a02
SHA256f64dd1f2ac82f6011cee686f784030b9c435b83a8a321455de7e028534792ba8
SHA512caf82a86d6e6cbf5cd096b732bb23d114d38c95ac6b526258e94d6df43b1dd6598f157f06c0bff2188228cc497697d5264bfb7c739aac8b18a591823fc6f62f0
-
Filesize
254KB
MD5414754432f015a16fd920ef48f21722b
SHA1c3f14ccdf493d7c3a17168478d320a30ac07247f
SHA256ed40089661c08b45ea0909917607b7c6e9767f8109745237d373bc988e7a55fa
SHA5122e5cec7d5739bc3317c771d1bd6f0a631f82317b9c44bfade2ae49085583134e6230ca7fb62c8b52c827bff2600b453be697c8ea0b31525273a6b85550b660a8
-
Filesize
254KB
MD5414754432f015a16fd920ef48f21722b
SHA1c3f14ccdf493d7c3a17168478d320a30ac07247f
SHA256ed40089661c08b45ea0909917607b7c6e9767f8109745237d373bc988e7a55fa
SHA5122e5cec7d5739bc3317c771d1bd6f0a631f82317b9c44bfade2ae49085583134e6230ca7fb62c8b52c827bff2600b453be697c8ea0b31525273a6b85550b660a8
-
Filesize
254KB
MD5414754432f015a16fd920ef48f21722b
SHA1c3f14ccdf493d7c3a17168478d320a30ac07247f
SHA256ed40089661c08b45ea0909917607b7c6e9767f8109745237d373bc988e7a55fa
SHA5122e5cec7d5739bc3317c771d1bd6f0a631f82317b9c44bfade2ae49085583134e6230ca7fb62c8b52c827bff2600b453be697c8ea0b31525273a6b85550b660a8
-
Filesize
257KB
MD58a252d4e3636b6d3c07d45c838bb7c42
SHA133153632f62bd86779bc68272c077f36c84f8660
SHA25685a8d2a1741e7b61845d49bb6ac1bdfbff7a4c171ec68b1fcc9d60f9e173cc80
SHA51281c1fc2863a100f0dd251d0d50f8446af75a2d3358d69906797647af84c93ab2a902dd0717a41c6325cb354886ca0307577dfdc3154d9b96072831bcacc35f82
-
Filesize
257KB
MD58a252d4e3636b6d3c07d45c838bb7c42
SHA133153632f62bd86779bc68272c077f36c84f8660
SHA25685a8d2a1741e7b61845d49bb6ac1bdfbff7a4c171ec68b1fcc9d60f9e173cc80
SHA51281c1fc2863a100f0dd251d0d50f8446af75a2d3358d69906797647af84c93ab2a902dd0717a41c6325cb354886ca0307577dfdc3154d9b96072831bcacc35f82
-
Filesize
93KB
MD519ed7a7d92a08233181282d06f1be84e
SHA1396bd987d8bf834964971aa9fb3d1778ee603a02
SHA256f64dd1f2ac82f6011cee686f784030b9c435b83a8a321455de7e028534792ba8
SHA512caf82a86d6e6cbf5cd096b732bb23d114d38c95ac6b526258e94d6df43b1dd6598f157f06c0bff2188228cc497697d5264bfb7c739aac8b18a591823fc6f62f0
-
Filesize
93KB
MD519ed7a7d92a08233181282d06f1be84e
SHA1396bd987d8bf834964971aa9fb3d1778ee603a02
SHA256f64dd1f2ac82f6011cee686f784030b9c435b83a8a321455de7e028534792ba8
SHA512caf82a86d6e6cbf5cd096b732bb23d114d38c95ac6b526258e94d6df43b1dd6598f157f06c0bff2188228cc497697d5264bfb7c739aac8b18a591823fc6f62f0
-
Filesize
93KB
MD519ed7a7d92a08233181282d06f1be84e
SHA1396bd987d8bf834964971aa9fb3d1778ee603a02
SHA256f64dd1f2ac82f6011cee686f784030b9c435b83a8a321455de7e028534792ba8
SHA512caf82a86d6e6cbf5cd096b732bb23d114d38c95ac6b526258e94d6df43b1dd6598f157f06c0bff2188228cc497697d5264bfb7c739aac8b18a591823fc6f62f0
-
Filesize
254KB
MD5414754432f015a16fd920ef48f21722b
SHA1c3f14ccdf493d7c3a17168478d320a30ac07247f
SHA256ed40089661c08b45ea0909917607b7c6e9767f8109745237d373bc988e7a55fa
SHA5122e5cec7d5739bc3317c771d1bd6f0a631f82317b9c44bfade2ae49085583134e6230ca7fb62c8b52c827bff2600b453be697c8ea0b31525273a6b85550b660a8
-
Filesize
254KB
MD5414754432f015a16fd920ef48f21722b
SHA1c3f14ccdf493d7c3a17168478d320a30ac07247f
SHA256ed40089661c08b45ea0909917607b7c6e9767f8109745237d373bc988e7a55fa
SHA5122e5cec7d5739bc3317c771d1bd6f0a631f82317b9c44bfade2ae49085583134e6230ca7fb62c8b52c827bff2600b453be697c8ea0b31525273a6b85550b660a8
-
Filesize
254KB
MD5414754432f015a16fd920ef48f21722b
SHA1c3f14ccdf493d7c3a17168478d320a30ac07247f
SHA256ed40089661c08b45ea0909917607b7c6e9767f8109745237d373bc988e7a55fa
SHA5122e5cec7d5739bc3317c771d1bd6f0a631f82317b9c44bfade2ae49085583134e6230ca7fb62c8b52c827bff2600b453be697c8ea0b31525273a6b85550b660a8