Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2023, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
46289fbd720d181b131e84076.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
46289fbd720d181b131e84076.exe
Resource
win10v2004-20230703-en
General
-
Target
46289fbd720d181b131e84076.exe
-
Size
538KB
-
MD5
46289fbd720d181b131e840766a46c16
-
SHA1
87d449dbec7aa8bdd22522da33dabb38d519fe11
-
SHA256
851383b5b30ec60fea9270264a30cd79f9d0b922e9e4556e4c71efd30756f1e4
-
SHA512
6180081589e8a0e8803d1b0ea219cee2b67321e528425a5a6d218bdeb1442c3386288a0deed3807d97a9e748526b08a02daf7705e2f743c7f64c7ab055732316
-
SSDEEP
12288:UU8J1z47GDbYuM/1Tbp51vIxPT7cT+CiFJV:4N473h/HbvIxPT7bzF3
Malware Config
Extracted
redline
kira
77.91.68.48:19071
-
auth_value
1677a40fd8997eb89377e1681911e9c6
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4264-153-0x00000000001F0000-0x00000000001FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8491295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8491295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8491295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8491295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8491295.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8491295.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4476 y2593794.exe 4264 k8491295.exe 1436 l2729734.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8491295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8491295.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2593794.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 46289fbd720d181b131e84076.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 46289fbd720d181b131e84076.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2593794.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4264 k8491295.exe 4264 k8491295.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4264 k8491295.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1476 wrote to memory of 4476 1476 46289fbd720d181b131e84076.exe 84 PID 1476 wrote to memory of 4476 1476 46289fbd720d181b131e84076.exe 84 PID 1476 wrote to memory of 4476 1476 46289fbd720d181b131e84076.exe 84 PID 4476 wrote to memory of 4264 4476 y2593794.exe 86 PID 4476 wrote to memory of 4264 4476 y2593794.exe 86 PID 4476 wrote to memory of 4264 4476 y2593794.exe 86 PID 4476 wrote to memory of 1436 4476 y2593794.exe 88 PID 4476 wrote to memory of 1436 4476 y2593794.exe 88 PID 4476 wrote to memory of 1436 4476 y2593794.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\46289fbd720d181b131e84076.exe"C:\Users\Admin\AppData\Local\Temp\46289fbd720d181b131e84076.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2593794.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2593794.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8491295.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8491295.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2729734.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2729734.exe3⤵
- Executes dropped EXE
PID:1436
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
261KB
MD531a4754e4f792a24cbeaa2625ce22a84
SHA159d6e5794be9c5e176578619e6641a432ddf4110
SHA256cadab1bc4e0ffb7e48db78fa4dcb7c22d061ba6740a37d5f8e358bc9d3742f24
SHA5122f5c48b0a51b8f9f2f92917204253d92304c5203409528ae0a86209d64eaed2df13329ab2e388e8348423ae7fb6f0d55ecc1c984ab2595e77205a348abcc6d5f
-
Filesize
261KB
MD531a4754e4f792a24cbeaa2625ce22a84
SHA159d6e5794be9c5e176578619e6641a432ddf4110
SHA256cadab1bc4e0ffb7e48db78fa4dcb7c22d061ba6740a37d5f8e358bc9d3742f24
SHA5122f5c48b0a51b8f9f2f92917204253d92304c5203409528ae0a86209d64eaed2df13329ab2e388e8348423ae7fb6f0d55ecc1c984ab2595e77205a348abcc6d5f
-
Filesize
104KB
MD5f7953f9edd4e8427e85ea68e76c38ade
SHA194fa1e691fb87b2a520aa813e51bc220d1807dfa
SHA256263689b81a7e17336f7b41d68844558e26927d6f241386141237307331562a22
SHA5123b126bcf44aaec79191e985fc705cdfdf7b7ec862568fda32c74b79d3a27846ada2ea0f0b8e25ea10456caab7fca75663c53a1f36441008fc81d9ff05222e4e9
-
Filesize
104KB
MD5f7953f9edd4e8427e85ea68e76c38ade
SHA194fa1e691fb87b2a520aa813e51bc220d1807dfa
SHA256263689b81a7e17336f7b41d68844558e26927d6f241386141237307331562a22
SHA5123b126bcf44aaec79191e985fc705cdfdf7b7ec862568fda32c74b79d3a27846ada2ea0f0b8e25ea10456caab7fca75663c53a1f36441008fc81d9ff05222e4e9
-
Filesize
266KB
MD583369b5d8c1817b87dce9cdfa589721a
SHA14a069e96417323524603fbf30536a61e7b6c9471
SHA2568554551130bf0574cba8b2048045a69dd0a85dd7709fb4e713de6f0d5894aa79
SHA5126260758f310ac23a70e0dd1e4a76a38ba7e742c218ad7320f66c4a9249bd03c1840392df4c61e094b4c33fdb753bc273acd2b0d3d0faa864b783b2ba5f77de81
-
Filesize
266KB
MD583369b5d8c1817b87dce9cdfa589721a
SHA14a069e96417323524603fbf30536a61e7b6c9471
SHA2568554551130bf0574cba8b2048045a69dd0a85dd7709fb4e713de6f0d5894aa79
SHA5126260758f310ac23a70e0dd1e4a76a38ba7e742c218ad7320f66c4a9249bd03c1840392df4c61e094b4c33fdb753bc273acd2b0d3d0faa864b783b2ba5f77de81