Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
ff6e66003ed52c6be563ba7a8d6470735770135863e7ea3e6950b9883bdfc4bb.exe
Resource
win10v2004-20230703-en
General
-
Target
ff6e66003ed52c6be563ba7a8d6470735770135863e7ea3e6950b9883bdfc4bb.exe
-
Size
388KB
-
MD5
c7aabe1fbaa80e3159dbb6ef29396860
-
SHA1
696e24c28afa08e6d1bd9b6745f4bff3846986c5
-
SHA256
ff6e66003ed52c6be563ba7a8d6470735770135863e7ea3e6950b9883bdfc4bb
-
SHA512
a5a84e0e8898937b0e8c285502717f157eac848d2bb35c8353d2b262c50892f86ea31d2209f188000846375d45872fdff238edb66d53ddba1372a50c5aba7a78
-
SSDEEP
6144:KGy+bnr+wp0yN90QEawwwbwgaNmRAwcuQ9Ckz5o4QdUSI92P9JVyqMjD:OMroy908obwBsVm9CkzO4QdS9S9yz3
Malware Config
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00080000000231be-145.dat healer behavioral1/files/0x00080000000231be-146.dat healer behavioral1/memory/216-147-0x0000000000FE0000-0x0000000000FEA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p5519354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p5519354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p5519354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p5519354.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p5519354.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p5519354.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4368 z4566425.exe 216 p5519354.exe 4888 r1873559.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p5519354.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ff6e66003ed52c6be563ba7a8d6470735770135863e7ea3e6950b9883bdfc4bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ff6e66003ed52c6be563ba7a8d6470735770135863e7ea3e6950b9883bdfc4bb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4566425.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4566425.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1016 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 216 p5519354.exe 216 p5519354.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 216 p5519354.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1328 wrote to memory of 4368 1328 ff6e66003ed52c6be563ba7a8d6470735770135863e7ea3e6950b9883bdfc4bb.exe 84 PID 1328 wrote to memory of 4368 1328 ff6e66003ed52c6be563ba7a8d6470735770135863e7ea3e6950b9883bdfc4bb.exe 84 PID 1328 wrote to memory of 4368 1328 ff6e66003ed52c6be563ba7a8d6470735770135863e7ea3e6950b9883bdfc4bb.exe 84 PID 4368 wrote to memory of 216 4368 z4566425.exe 85 PID 4368 wrote to memory of 216 4368 z4566425.exe 85 PID 4368 wrote to memory of 4888 4368 z4566425.exe 96 PID 4368 wrote to memory of 4888 4368 z4566425.exe 96 PID 4368 wrote to memory of 4888 4368 z4566425.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff6e66003ed52c6be563ba7a8d6470735770135863e7ea3e6950b9883bdfc4bb.exe"C:\Users\Admin\AppData\Local\Temp\ff6e66003ed52c6be563ba7a8d6470735770135863e7ea3e6950b9883bdfc4bb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4566425.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4566425.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5519354.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5519354.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1873559.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1873559.exe3⤵
- Executes dropped EXE
PID:4888
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5e92c953feb592ca494417cde1bcd7c96
SHA10b096e0544202b86febeaa2728a2f8629b6d81dc
SHA256a9de4215188f8068550f7b8dad2d8fa16b0b0955d8334484595a7c7380a5877f
SHA512ed642642e8e53efd01c3df4d0dd7a560c14bb2db60a24747d3f90ed91f58dc31216c2cbba56f63cceeb1f5bd83c37cad83438621fed3ed7ac893fe4971fd1af3
-
Filesize
206KB
MD5e92c953feb592ca494417cde1bcd7c96
SHA10b096e0544202b86febeaa2728a2f8629b6d81dc
SHA256a9de4215188f8068550f7b8dad2d8fa16b0b0955d8334484595a7c7380a5877f
SHA512ed642642e8e53efd01c3df4d0dd7a560c14bb2db60a24747d3f90ed91f58dc31216c2cbba56f63cceeb1f5bd83c37cad83438621fed3ed7ac893fe4971fd1af3
-
Filesize
13KB
MD58821bd681adff271e2fe02785473b27f
SHA1a657d6d4f82fdbf6b8898a62181fcd6f7c714835
SHA256cdf3eb8d7ee92a665753e1ce8f8080a60f4c4c3d53baf6e59ea6977333bf16e6
SHA512dd3e6157f8b368b798875254b2d218fbd3b7f810f7ff081a499f2ea5ccf21570a8b54dc4ffecb863c2cc930105c9cd065e5a032c236f402c9f9273174f90b011
-
Filesize
13KB
MD58821bd681adff271e2fe02785473b27f
SHA1a657d6d4f82fdbf6b8898a62181fcd6f7c714835
SHA256cdf3eb8d7ee92a665753e1ce8f8080a60f4c4c3d53baf6e59ea6977333bf16e6
SHA512dd3e6157f8b368b798875254b2d218fbd3b7f810f7ff081a499f2ea5ccf21570a8b54dc4ffecb863c2cc930105c9cd065e5a032c236f402c9f9273174f90b011
-
Filesize
174KB
MD5426e751b2f5357bc5286538b7cbad031
SHA16a6fb6f32b215ceec0bd84c9f5efa9c2a404efaf
SHA2567229f2d05ef3b6b70184b91f0e52d4ee0c77f99ba4fa058b9fd32abb19c75229
SHA51221d9903ae0b4fa7648e0e71b56610c08e5e39de95da986b5031bb4a198ea54375923c05b12f8b7da7dfc77f868c2b6969445b5999f92917c3972159a4b4517d0
-
Filesize
174KB
MD5426e751b2f5357bc5286538b7cbad031
SHA16a6fb6f32b215ceec0bd84c9f5efa9c2a404efaf
SHA2567229f2d05ef3b6b70184b91f0e52d4ee0c77f99ba4fa058b9fd32abb19c75229
SHA51221d9903ae0b4fa7648e0e71b56610c08e5e39de95da986b5031bb4a198ea54375923c05b12f8b7da7dfc77f868c2b6969445b5999f92917c3972159a4b4517d0