Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/07/2023, 22:10

General

  • Target

    aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe

  • Size

    389KB

  • MD5

    4069af214d80a18e083d1c14931b9fe4

  • SHA1

    35bd2fbb9c5490c15ca1c8e6de7652ab02d2bec8

  • SHA256

    aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2

  • SHA512

    963220f8221e74ce7830f53f37ee4f5da11d0272da178c01bc954d15e69e08bf728cb82042fcbcb518f59e14790058cf321b774f06435391d92e12e25e424f11

  • SSDEEP

    6144:K4y+bnr+Np0yN90QEZ11bMbz8xspx+FDDhMyNJSoyX6J/fdye3NH:cMr1y90TbLxsD+FhrNY6FMe3NH

Malware Config

Extracted

Family

redline

Botnet

roma

C2

77.91.68.56:19071

Attributes
  • auth_value

    f099c2cf92834dbc554a94e1456cf576

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe
    "C:\Users\Admin\AppData\Local\Temp\aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8665773.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8665773.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7330513.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7330513.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4145299.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4145299.exe
        3⤵
        • Executes dropped EXE
        PID:4168

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8665773.exe

    Filesize

    206KB

    MD5

    592b34a71a3509bc01a48e01eac2e3fa

    SHA1

    404237b8661c4442395d96ac148f54228e1659fe

    SHA256

    952fb5eb5e95358967be73dbbc9983c0c18c72a901c323b0c52eb7e4507d6207

    SHA512

    d734b33e2004d48754fc8b548d0973861b389e69dea4a683f70c341adbb84d21453cdfad62c20d60328905706461ff4af97561922cd5a4f986b0e6c1d1101fcc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8665773.exe

    Filesize

    206KB

    MD5

    592b34a71a3509bc01a48e01eac2e3fa

    SHA1

    404237b8661c4442395d96ac148f54228e1659fe

    SHA256

    952fb5eb5e95358967be73dbbc9983c0c18c72a901c323b0c52eb7e4507d6207

    SHA512

    d734b33e2004d48754fc8b548d0973861b389e69dea4a683f70c341adbb84d21453cdfad62c20d60328905706461ff4af97561922cd5a4f986b0e6c1d1101fcc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7330513.exe

    Filesize

    13KB

    MD5

    c3258aaa76a40b7468e21ab9b0a92f4a

    SHA1

    f275d8d85564f0a5c8e6525b7063e1fe0f0f87bb

    SHA256

    5e2dd0ee71477c0170de01ed16e9868c66d596a2c52f5795119f75ca0272fde6

    SHA512

    515f1190539d85a92fb5111371a4b7c00075c28531185a1d421e7f05ec536e750feaffeb7fc4a78ba32e31ee77aea244b5e01c6371fd45e5abce0bf5ef91a4ea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7330513.exe

    Filesize

    13KB

    MD5

    c3258aaa76a40b7468e21ab9b0a92f4a

    SHA1

    f275d8d85564f0a5c8e6525b7063e1fe0f0f87bb

    SHA256

    5e2dd0ee71477c0170de01ed16e9868c66d596a2c52f5795119f75ca0272fde6

    SHA512

    515f1190539d85a92fb5111371a4b7c00075c28531185a1d421e7f05ec536e750feaffeb7fc4a78ba32e31ee77aea244b5e01c6371fd45e5abce0bf5ef91a4ea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4145299.exe

    Filesize

    175KB

    MD5

    5c7b576ba427d0119cb93ea104b410d7

    SHA1

    94bcbd182ef41b596fd5bfbf0f63bf1d6528ef26

    SHA256

    e805071dfb62e54b0e451e9d5a6bbaefc520df4922588f8ba86c0b7a14c55ad2

    SHA512

    8b6ac0c88c6d6e0c647305027843998639dc94a5fbef7a79785800b4c257b20457f3c15000a9452cbfb73db4f1a9ca3f1d5855c2834a3cc17946b75fc59f8725

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4145299.exe

    Filesize

    175KB

    MD5

    5c7b576ba427d0119cb93ea104b410d7

    SHA1

    94bcbd182ef41b596fd5bfbf0f63bf1d6528ef26

    SHA256

    e805071dfb62e54b0e451e9d5a6bbaefc520df4922588f8ba86c0b7a14c55ad2

    SHA512

    8b6ac0c88c6d6e0c647305027843998639dc94a5fbef7a79785800b4c257b20457f3c15000a9452cbfb73db4f1a9ca3f1d5855c2834a3cc17946b75fc59f8725

  • memory/2800-147-0x0000000000050000-0x000000000005A000-memory.dmp

    Filesize

    40KB

  • memory/2800-150-0x00007FFDA76E0000-0x00007FFDA81A1000-memory.dmp

    Filesize

    10.8MB

  • memory/2800-148-0x00007FFDA76E0000-0x00007FFDA81A1000-memory.dmp

    Filesize

    10.8MB

  • memory/4168-154-0x0000000000920000-0x0000000000950000-memory.dmp

    Filesize

    192KB

  • memory/4168-155-0x00000000746A0000-0x0000000074E50000-memory.dmp

    Filesize

    7.7MB

  • memory/4168-156-0x000000000AD50000-0x000000000B368000-memory.dmp

    Filesize

    6.1MB

  • memory/4168-157-0x000000000A8D0000-0x000000000A9DA000-memory.dmp

    Filesize

    1.0MB

  • memory/4168-158-0x00000000051A0000-0x00000000051B0000-memory.dmp

    Filesize

    64KB

  • memory/4168-159-0x000000000A810000-0x000000000A822000-memory.dmp

    Filesize

    72KB

  • memory/4168-160-0x000000000A870000-0x000000000A8AC000-memory.dmp

    Filesize

    240KB

  • memory/4168-161-0x00000000746A0000-0x0000000074E50000-memory.dmp

    Filesize

    7.7MB

  • memory/4168-162-0x00000000051A0000-0x00000000051B0000-memory.dmp

    Filesize

    64KB