Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
a9a7ea8829bb602286fd74fa713e8631a592ace5257c53f4b2ca46af328d4929.exe
Resource
win10v2004-20230703-en
General
-
Target
a9a7ea8829bb602286fd74fa713e8631a592ace5257c53f4b2ca46af328d4929.exe
-
Size
389KB
-
MD5
1b5969476c005e742bc7e7221b056e4b
-
SHA1
6d5bd634489cf6b8d9f4bb1ab0dbfdd9b4c73876
-
SHA256
a9a7ea8829bb602286fd74fa713e8631a592ace5257c53f4b2ca46af328d4929
-
SHA512
fabfca67f2b3153aa6353f93d5c783ee5ecf84c12a8ede3340e01458e23a6fe4bc88c11600efec46c8cc720bf80e87948c5a5837c24f86d395d7a590969c7940
-
SSDEEP
12288:IMrxy90gRdPn9wrloru03BM/YqQUMvsF+mRGlHW:ZyTPvOZorhz0Mvdm4lHW
Malware Config
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023098-148.dat healer behavioral1/files/0x0007000000023098-149.dat healer behavioral1/memory/404-150-0x0000000000AD0000-0x0000000000ADA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p3214579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p3214579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p3214579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p3214579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p3214579.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p3214579.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4492 z5429913.exe 404 p3214579.exe 1964 r7115260.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p3214579.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a9a7ea8829bb602286fd74fa713e8631a592ace5257c53f4b2ca46af328d4929.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a9a7ea8829bb602286fd74fa713e8631a592ace5257c53f4b2ca46af328d4929.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5429913.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5429913.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 404 p3214579.exe 404 p3214579.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 404 p3214579.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4492 4588 a9a7ea8829bb602286fd74fa713e8631a592ace5257c53f4b2ca46af328d4929.exe 85 PID 4588 wrote to memory of 4492 4588 a9a7ea8829bb602286fd74fa713e8631a592ace5257c53f4b2ca46af328d4929.exe 85 PID 4588 wrote to memory of 4492 4588 a9a7ea8829bb602286fd74fa713e8631a592ace5257c53f4b2ca46af328d4929.exe 85 PID 4492 wrote to memory of 404 4492 z5429913.exe 86 PID 4492 wrote to memory of 404 4492 z5429913.exe 86 PID 4492 wrote to memory of 1964 4492 z5429913.exe 92 PID 4492 wrote to memory of 1964 4492 z5429913.exe 92 PID 4492 wrote to memory of 1964 4492 z5429913.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9a7ea8829bb602286fd74fa713e8631a592ace5257c53f4b2ca46af328d4929.exe"C:\Users\Admin\AppData\Local\Temp\a9a7ea8829bb602286fd74fa713e8631a592ace5257c53f4b2ca46af328d4929.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5429913.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5429913.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3214579.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3214579.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7115260.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7115260.exe3⤵
- Executes dropped EXE
PID:1964
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD55234abdefddf08b25ef95edc0c8ce3ca
SHA1bc513391f6762bfd88a4ffac58d6a41203681848
SHA256dbeb6c63f55f2f638c4db5e3e664b64470a15641f2c2e0fdbbff6807756af00d
SHA5123dd99d54231f47daa9229df973b40fe138a67c63c353af78b72117a8f4acbc0e044333a1d9b11d1ff2abf75eb907d084cf91fbd039918392ee11263e6a9ca1e2
-
Filesize
206KB
MD55234abdefddf08b25ef95edc0c8ce3ca
SHA1bc513391f6762bfd88a4ffac58d6a41203681848
SHA256dbeb6c63f55f2f638c4db5e3e664b64470a15641f2c2e0fdbbff6807756af00d
SHA5123dd99d54231f47daa9229df973b40fe138a67c63c353af78b72117a8f4acbc0e044333a1d9b11d1ff2abf75eb907d084cf91fbd039918392ee11263e6a9ca1e2
-
Filesize
13KB
MD5ca1b84b9fe8b235b28f44956f3ac93d1
SHA12bf4547b4997a1ba903102dd850fe958ff3ddf7b
SHA2569f924f6db9ce659ca230c4c60a2aabf448f13fa5de5284e6dadfafebcc5bd1d7
SHA512c93ff39b832294b8985756101e5aed1cb00be2c8af5538a7e486197f1d24bb378865673267eaeab000c8410daf379fd878c2749f57c3cab87521db619243118d
-
Filesize
13KB
MD5ca1b84b9fe8b235b28f44956f3ac93d1
SHA12bf4547b4997a1ba903102dd850fe958ff3ddf7b
SHA2569f924f6db9ce659ca230c4c60a2aabf448f13fa5de5284e6dadfafebcc5bd1d7
SHA512c93ff39b832294b8985756101e5aed1cb00be2c8af5538a7e486197f1d24bb378865673267eaeab000c8410daf379fd878c2749f57c3cab87521db619243118d
-
Filesize
174KB
MD5df1507186a9b2628c6906ba160418ccc
SHA16f6d9a50a7b952533c96be01e2d9e153a227c81c
SHA256c71dcb679d7b3b81ef51940842cb9de808860193e7e16ca0bfe65dd90ccfd3d3
SHA5126885f60e3358d8e62684e41e832c4e27f067a683ecbb2ddf200818e78e2726041eb6743c27925d525bed0c6dcfd849f35a53420b7105249b03db8cb4a8fe3e2a
-
Filesize
174KB
MD5df1507186a9b2628c6906ba160418ccc
SHA16f6d9a50a7b952533c96be01e2d9e153a227c81c
SHA256c71dcb679d7b3b81ef51940842cb9de808860193e7e16ca0bfe65dd90ccfd3d3
SHA5126885f60e3358d8e62684e41e832c4e27f067a683ecbb2ddf200818e78e2726041eb6743c27925d525bed0c6dcfd849f35a53420b7105249b03db8cb4a8fe3e2a