Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16/07/2023, 07:23
Static task
static1
Behavioral task
behavioral1
Sample
4266390a3e460f4dbe90ce7d9d091d2b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4266390a3e460f4dbe90ce7d9d091d2b.exe
Resource
win10v2004-20230703-en
General
-
Target
4266390a3e460f4dbe90ce7d9d091d2b.exe
-
Size
921KB
-
MD5
4266390a3e460f4dbe90ce7d9d091d2b
-
SHA1
16bf185400157eaae1561b62196add6bca53b84a
-
SHA256
627c0990f7c6fa8cc9a276966f3e2b428f8323bdd73c68bdf8034799f948f0d9
-
SHA512
be25bfb86b8ef7a9f13a9e770e35e4273132920989e37a02fc90887d61208461d41b1b5e0dc419e6a1e53491c6243ad5221040d3f7d854c9b9496f3a19fe54fd
-
SSDEEP
12288:EMrBy90qgmVH2qW5mA+49iYIvuPRQ3ijJbcrmVVhlheKO83eRs850M2ztvv:ty7gmx2qW5mSVPRQAJlzD/GIv
Malware Config
Extracted
redline
lamp
77.91.68.56:19071
-
auth_value
ee1df63bcdbe3de70f52810d94eaff7d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/2964-94-0x00000000002A0000-0x00000000002DE000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5131175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5131175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5131175.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k5131175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5131175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5131175.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1696 y7974264.exe 2792 y4610638.exe 2964 k5131175.exe 2820 l1966405.exe -
Loads dropped DLL 10 IoCs
pid Process 1908 4266390a3e460f4dbe90ce7d9d091d2b.exe 1696 y7974264.exe 1696 y7974264.exe 2792 y4610638.exe 2792 y4610638.exe 2792 y4610638.exe 2964 k5131175.exe 2792 y4610638.exe 2792 y4610638.exe 2820 l1966405.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5131175.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features k5131175.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7974264.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4610638.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4610638.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4266390a3e460f4dbe90ce7d9d091d2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4266390a3e460f4dbe90ce7d9d091d2b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7974264.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2964 k5131175.exe 2964 k5131175.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2964 k5131175.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1696 1908 4266390a3e460f4dbe90ce7d9d091d2b.exe 28 PID 1908 wrote to memory of 1696 1908 4266390a3e460f4dbe90ce7d9d091d2b.exe 28 PID 1908 wrote to memory of 1696 1908 4266390a3e460f4dbe90ce7d9d091d2b.exe 28 PID 1908 wrote to memory of 1696 1908 4266390a3e460f4dbe90ce7d9d091d2b.exe 28 PID 1908 wrote to memory of 1696 1908 4266390a3e460f4dbe90ce7d9d091d2b.exe 28 PID 1908 wrote to memory of 1696 1908 4266390a3e460f4dbe90ce7d9d091d2b.exe 28 PID 1908 wrote to memory of 1696 1908 4266390a3e460f4dbe90ce7d9d091d2b.exe 28 PID 1696 wrote to memory of 2792 1696 y7974264.exe 29 PID 1696 wrote to memory of 2792 1696 y7974264.exe 29 PID 1696 wrote to memory of 2792 1696 y7974264.exe 29 PID 1696 wrote to memory of 2792 1696 y7974264.exe 29 PID 1696 wrote to memory of 2792 1696 y7974264.exe 29 PID 1696 wrote to memory of 2792 1696 y7974264.exe 29 PID 1696 wrote to memory of 2792 1696 y7974264.exe 29 PID 2792 wrote to memory of 2964 2792 y4610638.exe 30 PID 2792 wrote to memory of 2964 2792 y4610638.exe 30 PID 2792 wrote to memory of 2964 2792 y4610638.exe 30 PID 2792 wrote to memory of 2964 2792 y4610638.exe 30 PID 2792 wrote to memory of 2964 2792 y4610638.exe 30 PID 2792 wrote to memory of 2964 2792 y4610638.exe 30 PID 2792 wrote to memory of 2964 2792 y4610638.exe 30 PID 2792 wrote to memory of 2820 2792 y4610638.exe 32 PID 2792 wrote to memory of 2820 2792 y4610638.exe 32 PID 2792 wrote to memory of 2820 2792 y4610638.exe 32 PID 2792 wrote to memory of 2820 2792 y4610638.exe 32 PID 2792 wrote to memory of 2820 2792 y4610638.exe 32 PID 2792 wrote to memory of 2820 2792 y4610638.exe 32 PID 2792 wrote to memory of 2820 2792 y4610638.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4266390a3e460f4dbe90ce7d9d091d2b.exe"C:\Users\Admin\AppData\Local\Temp\4266390a3e460f4dbe90ce7d9d091d2b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7974264.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7974264.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4610638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4610638.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5131175.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5131175.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1966405.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1966405.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2820
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
766KB
MD5dce92bfe290f2bfc8fcdaa8d79cfb428
SHA1821836e9a2a75af557dc76b876d24cd2f29402b2
SHA2561111e92ca559d16e157e3b9f162502a32061cfd7418cdf8da2ae2337b4a552d1
SHA512bbe7210caa78acf6df00164ccee955ce79dc4c77fb71fc780243239936c7c1b7a01f59ccda25981bc3915ba127028bfc0c6ce6469c2a920fbc54fce6e01b73a6
-
Filesize
766KB
MD5dce92bfe290f2bfc8fcdaa8d79cfb428
SHA1821836e9a2a75af557dc76b876d24cd2f29402b2
SHA2561111e92ca559d16e157e3b9f162502a32061cfd7418cdf8da2ae2337b4a552d1
SHA512bbe7210caa78acf6df00164ccee955ce79dc4c77fb71fc780243239936c7c1b7a01f59ccda25981bc3915ba127028bfc0c6ce6469c2a920fbc54fce6e01b73a6
-
Filesize
583KB
MD5c3a728452be74e46d86fcc43e340e0c7
SHA1398d2ea4ede704d9634e73d8050c9bf4c2e78931
SHA256ac29c80de2d63a3c7aa65b0cc01240c9e3ca6d8d5c57a99cb2a24d4bad04d664
SHA512f726c838bf300f0bb0a91cf88e1bd80aaee2e7f4b6e36b74a2df10407c8328a06b9f5e65ce856a94d88079b07139a78efcada57dde97048304eead99466f58f6
-
Filesize
583KB
MD5c3a728452be74e46d86fcc43e340e0c7
SHA1398d2ea4ede704d9634e73d8050c9bf4c2e78931
SHA256ac29c80de2d63a3c7aa65b0cc01240c9e3ca6d8d5c57a99cb2a24d4bad04d664
SHA512f726c838bf300f0bb0a91cf88e1bd80aaee2e7f4b6e36b74a2df10407c8328a06b9f5e65ce856a94d88079b07139a78efcada57dde97048304eead99466f58f6
-
Filesize
294KB
MD50051f204743bf30a487630bccbe89d83
SHA1bd044684a695e3b660e2caecc04c509547ffff6c
SHA2561e47d6f87dad561d141323a430f88acaf6efdd7db516cf552a46d791454c49d5
SHA512821893692261d68a3e03c5bb6fd6bfcd483c2a3e09da6fae99b8880e6feb0bb55e3a379a3d7a93d6a601fc9d3a6fe05e989b2fdf316b8252787ceed4e574456f
-
Filesize
294KB
MD50051f204743bf30a487630bccbe89d83
SHA1bd044684a695e3b660e2caecc04c509547ffff6c
SHA2561e47d6f87dad561d141323a430f88acaf6efdd7db516cf552a46d791454c49d5
SHA512821893692261d68a3e03c5bb6fd6bfcd483c2a3e09da6fae99b8880e6feb0bb55e3a379a3d7a93d6a601fc9d3a6fe05e989b2fdf316b8252787ceed4e574456f
-
Filesize
294KB
MD50051f204743bf30a487630bccbe89d83
SHA1bd044684a695e3b660e2caecc04c509547ffff6c
SHA2561e47d6f87dad561d141323a430f88acaf6efdd7db516cf552a46d791454c49d5
SHA512821893692261d68a3e03c5bb6fd6bfcd483c2a3e09da6fae99b8880e6feb0bb55e3a379a3d7a93d6a601fc9d3a6fe05e989b2fdf316b8252787ceed4e574456f
-
Filesize
492KB
MD54ea677b1f5913f8b1d657574f8d52fdb
SHA11758af24eacb654e8f89c70f156c8021c0252870
SHA2569322b7c8ce8041c56014fe9831c2127493924b1dd65468d994a76273f40ada58
SHA512fa9418a8fca76d7780980c064ef5783046faa580587e9f88f8c439b15afba5984f44865341b45d20c97ac1df16a2e05a3c20ebc170fcb17e08adf5e9029e7544
-
Filesize
492KB
MD54ea677b1f5913f8b1d657574f8d52fdb
SHA11758af24eacb654e8f89c70f156c8021c0252870
SHA2569322b7c8ce8041c56014fe9831c2127493924b1dd65468d994a76273f40ada58
SHA512fa9418a8fca76d7780980c064ef5783046faa580587e9f88f8c439b15afba5984f44865341b45d20c97ac1df16a2e05a3c20ebc170fcb17e08adf5e9029e7544
-
Filesize
492KB
MD54ea677b1f5913f8b1d657574f8d52fdb
SHA11758af24eacb654e8f89c70f156c8021c0252870
SHA2569322b7c8ce8041c56014fe9831c2127493924b1dd65468d994a76273f40ada58
SHA512fa9418a8fca76d7780980c064ef5783046faa580587e9f88f8c439b15afba5984f44865341b45d20c97ac1df16a2e05a3c20ebc170fcb17e08adf5e9029e7544
-
Filesize
766KB
MD5dce92bfe290f2bfc8fcdaa8d79cfb428
SHA1821836e9a2a75af557dc76b876d24cd2f29402b2
SHA2561111e92ca559d16e157e3b9f162502a32061cfd7418cdf8da2ae2337b4a552d1
SHA512bbe7210caa78acf6df00164ccee955ce79dc4c77fb71fc780243239936c7c1b7a01f59ccda25981bc3915ba127028bfc0c6ce6469c2a920fbc54fce6e01b73a6
-
Filesize
766KB
MD5dce92bfe290f2bfc8fcdaa8d79cfb428
SHA1821836e9a2a75af557dc76b876d24cd2f29402b2
SHA2561111e92ca559d16e157e3b9f162502a32061cfd7418cdf8da2ae2337b4a552d1
SHA512bbe7210caa78acf6df00164ccee955ce79dc4c77fb71fc780243239936c7c1b7a01f59ccda25981bc3915ba127028bfc0c6ce6469c2a920fbc54fce6e01b73a6
-
Filesize
583KB
MD5c3a728452be74e46d86fcc43e340e0c7
SHA1398d2ea4ede704d9634e73d8050c9bf4c2e78931
SHA256ac29c80de2d63a3c7aa65b0cc01240c9e3ca6d8d5c57a99cb2a24d4bad04d664
SHA512f726c838bf300f0bb0a91cf88e1bd80aaee2e7f4b6e36b74a2df10407c8328a06b9f5e65ce856a94d88079b07139a78efcada57dde97048304eead99466f58f6
-
Filesize
583KB
MD5c3a728452be74e46d86fcc43e340e0c7
SHA1398d2ea4ede704d9634e73d8050c9bf4c2e78931
SHA256ac29c80de2d63a3c7aa65b0cc01240c9e3ca6d8d5c57a99cb2a24d4bad04d664
SHA512f726c838bf300f0bb0a91cf88e1bd80aaee2e7f4b6e36b74a2df10407c8328a06b9f5e65ce856a94d88079b07139a78efcada57dde97048304eead99466f58f6
-
Filesize
294KB
MD50051f204743bf30a487630bccbe89d83
SHA1bd044684a695e3b660e2caecc04c509547ffff6c
SHA2561e47d6f87dad561d141323a430f88acaf6efdd7db516cf552a46d791454c49d5
SHA512821893692261d68a3e03c5bb6fd6bfcd483c2a3e09da6fae99b8880e6feb0bb55e3a379a3d7a93d6a601fc9d3a6fe05e989b2fdf316b8252787ceed4e574456f
-
Filesize
294KB
MD50051f204743bf30a487630bccbe89d83
SHA1bd044684a695e3b660e2caecc04c509547ffff6c
SHA2561e47d6f87dad561d141323a430f88acaf6efdd7db516cf552a46d791454c49d5
SHA512821893692261d68a3e03c5bb6fd6bfcd483c2a3e09da6fae99b8880e6feb0bb55e3a379a3d7a93d6a601fc9d3a6fe05e989b2fdf316b8252787ceed4e574456f
-
Filesize
294KB
MD50051f204743bf30a487630bccbe89d83
SHA1bd044684a695e3b660e2caecc04c509547ffff6c
SHA2561e47d6f87dad561d141323a430f88acaf6efdd7db516cf552a46d791454c49d5
SHA512821893692261d68a3e03c5bb6fd6bfcd483c2a3e09da6fae99b8880e6feb0bb55e3a379a3d7a93d6a601fc9d3a6fe05e989b2fdf316b8252787ceed4e574456f
-
Filesize
492KB
MD54ea677b1f5913f8b1d657574f8d52fdb
SHA11758af24eacb654e8f89c70f156c8021c0252870
SHA2569322b7c8ce8041c56014fe9831c2127493924b1dd65468d994a76273f40ada58
SHA512fa9418a8fca76d7780980c064ef5783046faa580587e9f88f8c439b15afba5984f44865341b45d20c97ac1df16a2e05a3c20ebc170fcb17e08adf5e9029e7544
-
Filesize
492KB
MD54ea677b1f5913f8b1d657574f8d52fdb
SHA11758af24eacb654e8f89c70f156c8021c0252870
SHA2569322b7c8ce8041c56014fe9831c2127493924b1dd65468d994a76273f40ada58
SHA512fa9418a8fca76d7780980c064ef5783046faa580587e9f88f8c439b15afba5984f44865341b45d20c97ac1df16a2e05a3c20ebc170fcb17e08adf5e9029e7544
-
Filesize
492KB
MD54ea677b1f5913f8b1d657574f8d52fdb
SHA11758af24eacb654e8f89c70f156c8021c0252870
SHA2569322b7c8ce8041c56014fe9831c2127493924b1dd65468d994a76273f40ada58
SHA512fa9418a8fca76d7780980c064ef5783046faa580587e9f88f8c439b15afba5984f44865341b45d20c97ac1df16a2e05a3c20ebc170fcb17e08adf5e9029e7544