Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
bf7c2c05d933486717d3ed336.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
bf7c2c05d933486717d3ed336.exe
Resource
win10v2004-20230703-en
General
-
Target
bf7c2c05d933486717d3ed336.exe
-
Size
522KB
-
MD5
bf7c2c05d933486717d3ed3367b3aa74
-
SHA1
fb4deb60a9f81ce8d8dab70d2faaa24a9e794b3d
-
SHA256
3bd00d683822dec340705519745286e08cc08af7ea9f6d48732bb45c260db3c4
-
SHA512
62b95692f4eefafc3d0b0afd05765014fc667b347157dd324010bb887d366bb0063952b1cde6e9c4f179fb6a45e820f5bffa6cf3e91dd248b820fb0cd3740ed4
-
SSDEEP
12288:wWJufvMaRdnQgzp7qBM8fc41jsfO7B7TMDkmCim:wWJ0vM82gtKEeom7B7TMG
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4444-153-0x00000000001F0000-0x00000000001FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8043421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8043421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8043421.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8043421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8043421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8043421.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 600 y9557247.exe 4444 k8043421.exe 1056 l9720053.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8043421.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8043421.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bf7c2c05d933486717d3ed336.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf7c2c05d933486717d3ed336.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9557247.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9557247.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4444 k8043421.exe 4444 k8043421.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4444 k8043421.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5088 wrote to memory of 600 5088 bf7c2c05d933486717d3ed336.exe 85 PID 5088 wrote to memory of 600 5088 bf7c2c05d933486717d3ed336.exe 85 PID 5088 wrote to memory of 600 5088 bf7c2c05d933486717d3ed336.exe 85 PID 600 wrote to memory of 4444 600 y9557247.exe 86 PID 600 wrote to memory of 4444 600 y9557247.exe 86 PID 600 wrote to memory of 4444 600 y9557247.exe 86 PID 600 wrote to memory of 1056 600 y9557247.exe 88 PID 600 wrote to memory of 1056 600 y9557247.exe 88 PID 600 wrote to memory of 1056 600 y9557247.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7c2c05d933486717d3ed336.exe"C:\Users\Admin\AppData\Local\Temp\bf7c2c05d933486717d3ed336.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9557247.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9557247.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8043421.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8043421.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9720053.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9720053.exe3⤵
- Executes dropped EXE
PID:1056
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
257KB
MD58a252d4e3636b6d3c07d45c838bb7c42
SHA133153632f62bd86779bc68272c077f36c84f8660
SHA25685a8d2a1741e7b61845d49bb6ac1bdfbff7a4c171ec68b1fcc9d60f9e173cc80
SHA51281c1fc2863a100f0dd251d0d50f8446af75a2d3358d69906797647af84c93ab2a902dd0717a41c6325cb354886ca0307577dfdc3154d9b96072831bcacc35f82
-
Filesize
257KB
MD58a252d4e3636b6d3c07d45c838bb7c42
SHA133153632f62bd86779bc68272c077f36c84f8660
SHA25685a8d2a1741e7b61845d49bb6ac1bdfbff7a4c171ec68b1fcc9d60f9e173cc80
SHA51281c1fc2863a100f0dd251d0d50f8446af75a2d3358d69906797647af84c93ab2a902dd0717a41c6325cb354886ca0307577dfdc3154d9b96072831bcacc35f82
-
Filesize
93KB
MD519ed7a7d92a08233181282d06f1be84e
SHA1396bd987d8bf834964971aa9fb3d1778ee603a02
SHA256f64dd1f2ac82f6011cee686f784030b9c435b83a8a321455de7e028534792ba8
SHA512caf82a86d6e6cbf5cd096b732bb23d114d38c95ac6b526258e94d6df43b1dd6598f157f06c0bff2188228cc497697d5264bfb7c739aac8b18a591823fc6f62f0
-
Filesize
93KB
MD519ed7a7d92a08233181282d06f1be84e
SHA1396bd987d8bf834964971aa9fb3d1778ee603a02
SHA256f64dd1f2ac82f6011cee686f784030b9c435b83a8a321455de7e028534792ba8
SHA512caf82a86d6e6cbf5cd096b732bb23d114d38c95ac6b526258e94d6df43b1dd6598f157f06c0bff2188228cc497697d5264bfb7c739aac8b18a591823fc6f62f0
-
Filesize
254KB
MD5414754432f015a16fd920ef48f21722b
SHA1c3f14ccdf493d7c3a17168478d320a30ac07247f
SHA256ed40089661c08b45ea0909917607b7c6e9767f8109745237d373bc988e7a55fa
SHA5122e5cec7d5739bc3317c771d1bd6f0a631f82317b9c44bfade2ae49085583134e6230ca7fb62c8b52c827bff2600b453be697c8ea0b31525273a6b85550b660a8
-
Filesize
254KB
MD5414754432f015a16fd920ef48f21722b
SHA1c3f14ccdf493d7c3a17168478d320a30ac07247f
SHA256ed40089661c08b45ea0909917607b7c6e9767f8109745237d373bc988e7a55fa
SHA5122e5cec7d5739bc3317c771d1bd6f0a631f82317b9c44bfade2ae49085583134e6230ca7fb62c8b52c827bff2600b453be697c8ea0b31525273a6b85550b660a8