Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
17/07/2023, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe
Resource
win10-20230703-en
General
-
Target
80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe
-
Size
390KB
-
MD5
288f60b62371456c3c74a54606f2babb
-
SHA1
42f2c641bedebd606b81c7c7ceb1b8fdf4364e99
-
SHA256
80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563
-
SHA512
967c46485c311682847a9924b66c0e5ccc9bdb8486293035e152054308dcf3bc908309152fff38db6d6db9131fe4b37d6bd051b3935bf5cc28abc4f48cafe87b
-
SSDEEP
12288:UMr+y90Lukm/CKeHc6iUOOnH3cHnl9pYJRvUK:iyoukmqnjXHMH9YJtUK
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
redline
zahar
77.91.68.56:19071
-
auth_value
94c55a31fcf1761f07eeb4a0c6fb74fa
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afc6-132.dat healer behavioral1/files/0x000700000001afc6-133.dat healer behavioral1/memory/4552-134-0x00000000000A0000-0x00000000000AA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7891691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7891691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7891691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7891691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7891691.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4852 y9412958.exe 4552 k7891691.exe 3148 l2612060.exe 1912 danke.exe 1752 n2760335.exe 2628 danke.exe 4900 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 868 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k7891691.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9412958.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9412958.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4552 k7891691.exe 4552 k7891691.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4552 k7891691.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3148 l2612060.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4976 wrote to memory of 4852 4976 80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe 69 PID 4976 wrote to memory of 4852 4976 80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe 69 PID 4976 wrote to memory of 4852 4976 80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe 69 PID 4852 wrote to memory of 4552 4852 y9412958.exe 70 PID 4852 wrote to memory of 4552 4852 y9412958.exe 70 PID 4852 wrote to memory of 3148 4852 y9412958.exe 71 PID 4852 wrote to memory of 3148 4852 y9412958.exe 71 PID 4852 wrote to memory of 3148 4852 y9412958.exe 71 PID 3148 wrote to memory of 1912 3148 l2612060.exe 72 PID 3148 wrote to memory of 1912 3148 l2612060.exe 72 PID 3148 wrote to memory of 1912 3148 l2612060.exe 72 PID 4976 wrote to memory of 1752 4976 80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe 73 PID 4976 wrote to memory of 1752 4976 80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe 73 PID 4976 wrote to memory of 1752 4976 80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe 73 PID 1912 wrote to memory of 4512 1912 danke.exe 74 PID 1912 wrote to memory of 4512 1912 danke.exe 74 PID 1912 wrote to memory of 4512 1912 danke.exe 74 PID 1912 wrote to memory of 2192 1912 danke.exe 75 PID 1912 wrote to memory of 2192 1912 danke.exe 75 PID 1912 wrote to memory of 2192 1912 danke.exe 75 PID 2192 wrote to memory of 3788 2192 cmd.exe 78 PID 2192 wrote to memory of 3788 2192 cmd.exe 78 PID 2192 wrote to memory of 3788 2192 cmd.exe 78 PID 2192 wrote to memory of 2632 2192 cmd.exe 79 PID 2192 wrote to memory of 2632 2192 cmd.exe 79 PID 2192 wrote to memory of 2632 2192 cmd.exe 79 PID 2192 wrote to memory of 820 2192 cmd.exe 80 PID 2192 wrote to memory of 820 2192 cmd.exe 80 PID 2192 wrote to memory of 820 2192 cmd.exe 80 PID 2192 wrote to memory of 5100 2192 cmd.exe 81 PID 2192 wrote to memory of 5100 2192 cmd.exe 81 PID 2192 wrote to memory of 5100 2192 cmd.exe 81 PID 2192 wrote to memory of 212 2192 cmd.exe 82 PID 2192 wrote to memory of 212 2192 cmd.exe 82 PID 2192 wrote to memory of 212 2192 cmd.exe 82 PID 2192 wrote to memory of 2488 2192 cmd.exe 83 PID 2192 wrote to memory of 2488 2192 cmd.exe 83 PID 2192 wrote to memory of 2488 2192 cmd.exe 83 PID 1912 wrote to memory of 868 1912 danke.exe 85 PID 1912 wrote to memory of 868 1912 danke.exe 85 PID 1912 wrote to memory of 868 1912 danke.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe"C:\Users\Admin\AppData\Local\Temp\80df47d2d03ce5335964f63aec56775c993e4c013e2b433ff6ae945ee0c6e563.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9412958.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9412958.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7891691.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7891691.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2612060.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2612060.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F5⤵
- Creates scheduled task(s)
PID:4512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"6⤵PID:2632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E6⤵PID:820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"6⤵PID:212
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E6⤵PID:2488
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2760335.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2760335.exe2⤵
- Executes dropped EXE
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:2628
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
174KB
MD521816e08eb4a15928ab92bbdd200bd06
SHA19d1a9cb6457b677e377e9af9db800051381e24dd
SHA256ad87fd2df9ffef56e7e37b05c83bb88fcbf48bad95dca7b31205456371e65270
SHA5122cd574f9e66248944444c49608afd2593e91e0a0196e7f7f493f817819242792a1602f1add18870d59b6c5c0573b294d334670b05106abba989d05e99db8d91b
-
Filesize
174KB
MD521816e08eb4a15928ab92bbdd200bd06
SHA19d1a9cb6457b677e377e9af9db800051381e24dd
SHA256ad87fd2df9ffef56e7e37b05c83bb88fcbf48bad95dca7b31205456371e65270
SHA5122cd574f9e66248944444c49608afd2593e91e0a0196e7f7f493f817819242792a1602f1add18870d59b6c5c0573b294d334670b05106abba989d05e99db8d91b
-
Filesize
235KB
MD5e7a6d1b2b4b78559ebebe72f4ece6b4b
SHA1b28f22554563679203fa781e308a3abbd1b670fb
SHA256d8bba89ea8935723480ec23e4d47783906aeecc8e30b9706fe2a4f7b56c1f7bd
SHA5125b9087cc4636d9c5622df3b7d69d855f8bee5ac4ee7fe0de0826ee68521a2e2484ebbe528712a2e0d3e7d39fca7ce472023775338745e9f5dfb721b3db0adfed
-
Filesize
235KB
MD5e7a6d1b2b4b78559ebebe72f4ece6b4b
SHA1b28f22554563679203fa781e308a3abbd1b670fb
SHA256d8bba89ea8935723480ec23e4d47783906aeecc8e30b9706fe2a4f7b56c1f7bd
SHA5125b9087cc4636d9c5622df3b7d69d855f8bee5ac4ee7fe0de0826ee68521a2e2484ebbe528712a2e0d3e7d39fca7ce472023775338745e9f5dfb721b3db0adfed
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9