Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe
Resource
win10v2004-20230703-en
General
-
Target
aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe
-
Size
389KB
-
MD5
4069af214d80a18e083d1c14931b9fe4
-
SHA1
35bd2fbb9c5490c15ca1c8e6de7652ab02d2bec8
-
SHA256
aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2
-
SHA512
963220f8221e74ce7830f53f37ee4f5da11d0272da178c01bc954d15e69e08bf728cb82042fcbcb518f59e14790058cf321b774f06435391d92e12e25e424f11
-
SSDEEP
6144:K4y+bnr+Np0yN90QEZ11bMbz8xspx+FDDhMyNJSoyX6J/fdye3NH:cMr1y90TbLxsD+FhrNY6FMe3NH
Malware Config
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000231f1-144.dat healer behavioral1/files/0x00070000000231f1-146.dat healer behavioral1/memory/2800-147-0x0000000000050000-0x000000000005A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p7330513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p7330513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p7330513.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p7330513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p7330513.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p7330513.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3708 z8665773.exe 2800 p7330513.exe 4168 r4145299.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p7330513.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8665773.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8665773.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2800 p7330513.exe 2800 p7330513.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2800 p7330513.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2896 wrote to memory of 3708 2896 aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe 85 PID 2896 wrote to memory of 3708 2896 aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe 85 PID 2896 wrote to memory of 3708 2896 aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe 85 PID 3708 wrote to memory of 2800 3708 z8665773.exe 86 PID 3708 wrote to memory of 2800 3708 z8665773.exe 86 PID 3708 wrote to memory of 4168 3708 z8665773.exe 92 PID 3708 wrote to memory of 4168 3708 z8665773.exe 92 PID 3708 wrote to memory of 4168 3708 z8665773.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe"C:\Users\Admin\AppData\Local\Temp\aaedd449b4ce5b8e2fc833c25d827df2622fde78472add9d9c21d9ee4b5e8db2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8665773.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8665773.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7330513.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7330513.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4145299.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4145299.exe3⤵
- Executes dropped EXE
PID:4168
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5592b34a71a3509bc01a48e01eac2e3fa
SHA1404237b8661c4442395d96ac148f54228e1659fe
SHA256952fb5eb5e95358967be73dbbc9983c0c18c72a901c323b0c52eb7e4507d6207
SHA512d734b33e2004d48754fc8b548d0973861b389e69dea4a683f70c341adbb84d21453cdfad62c20d60328905706461ff4af97561922cd5a4f986b0e6c1d1101fcc
-
Filesize
206KB
MD5592b34a71a3509bc01a48e01eac2e3fa
SHA1404237b8661c4442395d96ac148f54228e1659fe
SHA256952fb5eb5e95358967be73dbbc9983c0c18c72a901c323b0c52eb7e4507d6207
SHA512d734b33e2004d48754fc8b548d0973861b389e69dea4a683f70c341adbb84d21453cdfad62c20d60328905706461ff4af97561922cd5a4f986b0e6c1d1101fcc
-
Filesize
13KB
MD5c3258aaa76a40b7468e21ab9b0a92f4a
SHA1f275d8d85564f0a5c8e6525b7063e1fe0f0f87bb
SHA2565e2dd0ee71477c0170de01ed16e9868c66d596a2c52f5795119f75ca0272fde6
SHA512515f1190539d85a92fb5111371a4b7c00075c28531185a1d421e7f05ec536e750feaffeb7fc4a78ba32e31ee77aea244b5e01c6371fd45e5abce0bf5ef91a4ea
-
Filesize
13KB
MD5c3258aaa76a40b7468e21ab9b0a92f4a
SHA1f275d8d85564f0a5c8e6525b7063e1fe0f0f87bb
SHA2565e2dd0ee71477c0170de01ed16e9868c66d596a2c52f5795119f75ca0272fde6
SHA512515f1190539d85a92fb5111371a4b7c00075c28531185a1d421e7f05ec536e750feaffeb7fc4a78ba32e31ee77aea244b5e01c6371fd45e5abce0bf5ef91a4ea
-
Filesize
175KB
MD55c7b576ba427d0119cb93ea104b410d7
SHA194bcbd182ef41b596fd5bfbf0f63bf1d6528ef26
SHA256e805071dfb62e54b0e451e9d5a6bbaefc520df4922588f8ba86c0b7a14c55ad2
SHA5128b6ac0c88c6d6e0c647305027843998639dc94a5fbef7a79785800b4c257b20457f3c15000a9452cbfb73db4f1a9ca3f1d5855c2834a3cc17946b75fc59f8725
-
Filesize
175KB
MD55c7b576ba427d0119cb93ea104b410d7
SHA194bcbd182ef41b596fd5bfbf0f63bf1d6528ef26
SHA256e805071dfb62e54b0e451e9d5a6bbaefc520df4922588f8ba86c0b7a14c55ad2
SHA5128b6ac0c88c6d6e0c647305027843998639dc94a5fbef7a79785800b4c257b20457f3c15000a9452cbfb73db4f1a9ca3f1d5855c2834a3cc17946b75fc59f8725