Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe
Resource
win10v2004-20230703-en
General
-
Target
e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe
-
Size
390KB
-
MD5
dd20ce1af54290548d4e8ddcba9e1920
-
SHA1
45d24027dd8eb5150c3a01d79d3941f6503f091f
-
SHA256
e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6
-
SHA512
a4e499ce1b19a99fef2682fddc7f223e180c37012fec325f735972da1b534986f4cca9a39cad4d9bcbb6254286afd07cc395df0f1e1c6d80323436b48cd5d70d
-
SSDEEP
12288:3Mr9y90g2tQ3nF8mgdvoCudPhQMcHnl922VadLBfh5:myIsgdwsHS2oH
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002320d-145.dat healer behavioral1/files/0x000700000002320d-146.dat healer behavioral1/memory/4764-147-0x0000000000C20000-0x0000000000C2A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5767972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5767972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5767972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5767972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5767972.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k5767972.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation l4689156.exe Key value queried \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 8 IoCs
pid Process 4984 y2821910.exe 4764 k5767972.exe 2560 l4689156.exe 2240 danke.exe 3032 n3459179.exe 856 danke.exe 3728 danke.exe 2760 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 3312 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k5767972.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2821910.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2821910.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4132 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4764 k5767972.exe 4764 k5767972.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4764 k5767972.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 l4689156.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2876 wrote to memory of 4984 2876 e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe 86 PID 2876 wrote to memory of 4984 2876 e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe 86 PID 2876 wrote to memory of 4984 2876 e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe 86 PID 4984 wrote to memory of 4764 4984 y2821910.exe 88 PID 4984 wrote to memory of 4764 4984 y2821910.exe 88 PID 4984 wrote to memory of 2560 4984 y2821910.exe 95 PID 4984 wrote to memory of 2560 4984 y2821910.exe 95 PID 4984 wrote to memory of 2560 4984 y2821910.exe 95 PID 2560 wrote to memory of 2240 2560 l4689156.exe 96 PID 2560 wrote to memory of 2240 2560 l4689156.exe 96 PID 2560 wrote to memory of 2240 2560 l4689156.exe 96 PID 2876 wrote to memory of 3032 2876 e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe 97 PID 2876 wrote to memory of 3032 2876 e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe 97 PID 2876 wrote to memory of 3032 2876 e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe 97 PID 2240 wrote to memory of 4700 2240 danke.exe 98 PID 2240 wrote to memory of 4700 2240 danke.exe 98 PID 2240 wrote to memory of 4700 2240 danke.exe 98 PID 2240 wrote to memory of 2752 2240 danke.exe 100 PID 2240 wrote to memory of 2752 2240 danke.exe 100 PID 2240 wrote to memory of 2752 2240 danke.exe 100 PID 2752 wrote to memory of 2352 2752 cmd.exe 103 PID 2752 wrote to memory of 2352 2752 cmd.exe 103 PID 2752 wrote to memory of 2352 2752 cmd.exe 103 PID 2752 wrote to memory of 4596 2752 cmd.exe 102 PID 2752 wrote to memory of 4596 2752 cmd.exe 102 PID 2752 wrote to memory of 4596 2752 cmd.exe 102 PID 2752 wrote to memory of 2576 2752 cmd.exe 104 PID 2752 wrote to memory of 2576 2752 cmd.exe 104 PID 2752 wrote to memory of 2576 2752 cmd.exe 104 PID 2752 wrote to memory of 4200 2752 cmd.exe 105 PID 2752 wrote to memory of 4200 2752 cmd.exe 105 PID 2752 wrote to memory of 4200 2752 cmd.exe 105 PID 2752 wrote to memory of 4968 2752 cmd.exe 106 PID 2752 wrote to memory of 4968 2752 cmd.exe 106 PID 2752 wrote to memory of 4968 2752 cmd.exe 106 PID 2752 wrote to memory of 1380 2752 cmd.exe 107 PID 2752 wrote to memory of 1380 2752 cmd.exe 107 PID 2752 wrote to memory of 1380 2752 cmd.exe 107 PID 2240 wrote to memory of 3312 2240 danke.exe 116 PID 2240 wrote to memory of 3312 2240 danke.exe 116 PID 2240 wrote to memory of 3312 2240 danke.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe"C:\Users\Admin\AppData\Local\Temp\e2cbc77b249a03c8aaf4f4cece20a27355a8a16980a88b7f575d2d29b1b8fcf6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2821910.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2821910.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5767972.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5767972.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4689156.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4689156.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F5⤵
- Creates scheduled task(s)
PID:4700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"6⤵PID:4596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E6⤵PID:2576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4200
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"6⤵PID:4968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E6⤵PID:1380
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3312
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n3459179.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n3459179.exe2⤵
- Executes dropped EXE
PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:856
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:3728
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4132
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:2760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
173KB
MD5195958153c030b4540d231d1902151c2
SHA1dab93a758e2ef140c2a43b7a419830c4bf394e61
SHA25640a8da531a72dcd75e36473a0ee533cc341758a601488102af1a668408736630
SHA5120c0a52bff22907f3f394cb53e778a1e16e74a05840480aadcbfadb11328f4f99d597f5dcb367259519424874efd93c9c9df8edf05a40623c8698a3bdb13679f4
-
Filesize
173KB
MD5195958153c030b4540d231d1902151c2
SHA1dab93a758e2ef140c2a43b7a419830c4bf394e61
SHA25640a8da531a72dcd75e36473a0ee533cc341758a601488102af1a668408736630
SHA5120c0a52bff22907f3f394cb53e778a1e16e74a05840480aadcbfadb11328f4f99d597f5dcb367259519424874efd93c9c9df8edf05a40623c8698a3bdb13679f4
-
Filesize
235KB
MD59719c35c379b422d12659157bed5fbb2
SHA12262d4b669f372ce223e68f8886927536d7c5196
SHA2568d8a76a6630cda47c3c4243eeca7244c5cb50868ef09b2e1a03b5445cf0abda1
SHA5127af8c6a66a9c8b76fc3d43fcdf1ab60387f5d91a7a36594f76c6e54782ca2b290f9231fcc9fa4023dc63a12c9d843e033708598656113dacaf53c3d968352f25
-
Filesize
235KB
MD59719c35c379b422d12659157bed5fbb2
SHA12262d4b669f372ce223e68f8886927536d7c5196
SHA2568d8a76a6630cda47c3c4243eeca7244c5cb50868ef09b2e1a03b5445cf0abda1
SHA5127af8c6a66a9c8b76fc3d43fcdf1ab60387f5d91a7a36594f76c6e54782ca2b290f9231fcc9fa4023dc63a12c9d843e033708598656113dacaf53c3d968352f25
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59