Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
fee1eb5968e3ced545781f6ad295bf012a14306e0ad1b5393f88146436ecf7c1.exe
Resource
win10v2004-20230703-en
General
-
Target
fee1eb5968e3ced545781f6ad295bf012a14306e0ad1b5393f88146436ecf7c1.exe
-
Size
389KB
-
MD5
aea66679bedcf753c13e13d8b210d83e
-
SHA1
8c565f552097ebf3589a0343cd2e1372492c7edd
-
SHA256
fee1eb5968e3ced545781f6ad295bf012a14306e0ad1b5393f88146436ecf7c1
-
SHA512
b9d0cf08768b626bd1879f78adc74228e3d4f6bbe870dc42d4a829decd77721af38c7d49bc2513a3fa7ec80e606d8550460a0120ee861d0d0767d7b0d903ad07
-
SSDEEP
6144:K/y+bnr+/p0yN90QEqxXVwV6Zz9Xr7vh259GZYX8cIa8otBj+cP7F7ak:BMr3y90YxlNzh5OF8wj9FN
Malware Config
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00090000000231eb-145.dat healer behavioral1/files/0x00090000000231eb-146.dat healer behavioral1/memory/4892-147-0x0000000000510000-0x000000000051A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p5308189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p5308189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p5308189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p5308189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p5308189.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p5308189.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 5032 z0239763.exe 4892 p5308189.exe 2604 r5966000.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p5308189.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fee1eb5968e3ced545781f6ad295bf012a14306e0ad1b5393f88146436ecf7c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fee1eb5968e3ced545781f6ad295bf012a14306e0ad1b5393f88146436ecf7c1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0239763.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0239763.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4892 p5308189.exe 4892 p5308189.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4892 p5308189.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1948 wrote to memory of 5032 1948 fee1eb5968e3ced545781f6ad295bf012a14306e0ad1b5393f88146436ecf7c1.exe 86 PID 1948 wrote to memory of 5032 1948 fee1eb5968e3ced545781f6ad295bf012a14306e0ad1b5393f88146436ecf7c1.exe 86 PID 1948 wrote to memory of 5032 1948 fee1eb5968e3ced545781f6ad295bf012a14306e0ad1b5393f88146436ecf7c1.exe 86 PID 5032 wrote to memory of 4892 5032 z0239763.exe 87 PID 5032 wrote to memory of 4892 5032 z0239763.exe 87 PID 5032 wrote to memory of 2604 5032 z0239763.exe 94 PID 5032 wrote to memory of 2604 5032 z0239763.exe 94 PID 5032 wrote to memory of 2604 5032 z0239763.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\fee1eb5968e3ced545781f6ad295bf012a14306e0ad1b5393f88146436ecf7c1.exe"C:\Users\Admin\AppData\Local\Temp\fee1eb5968e3ced545781f6ad295bf012a14306e0ad1b5393f88146436ecf7c1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0239763.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0239763.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5308189.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p5308189.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5966000.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5966000.exe3⤵
- Executes dropped EXE
PID:2604
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5d20a962deaffa35b184a0a2ff637320f
SHA113e59193c83c236c34464fcf86420bcfc1e67389
SHA256a6d10a0ab3351893463944e65f476128ea55bc2dde47b87b2159d34d8e51419d
SHA512c587a19b852e62afc2a1e94d35d0b4a5ef6ec56d27ae8c366f599bcbb640503fba937d3ec4c96f5eebc2c9c5f78854828ee70b22b5de5965e123e6155d5940c8
-
Filesize
206KB
MD5d20a962deaffa35b184a0a2ff637320f
SHA113e59193c83c236c34464fcf86420bcfc1e67389
SHA256a6d10a0ab3351893463944e65f476128ea55bc2dde47b87b2159d34d8e51419d
SHA512c587a19b852e62afc2a1e94d35d0b4a5ef6ec56d27ae8c366f599bcbb640503fba937d3ec4c96f5eebc2c9c5f78854828ee70b22b5de5965e123e6155d5940c8
-
Filesize
13KB
MD5c0ef296003c1a399aab119b5b787156d
SHA1ce451d5e60d649d8cf78ae15ba7035bb14316f26
SHA2565ad1e1e32f6142244ccac95e65976af46700f600678e13fd31eb6c2333deca78
SHA5127a2d89ca6dd36e09b820d8cb04e18742e76f405620821d8e670d56afeb9b3b6258025d8e384f650775feefe62e3239ee605d0851433674dd89edd2159f21e53a
-
Filesize
13KB
MD5c0ef296003c1a399aab119b5b787156d
SHA1ce451d5e60d649d8cf78ae15ba7035bb14316f26
SHA2565ad1e1e32f6142244ccac95e65976af46700f600678e13fd31eb6c2333deca78
SHA5127a2d89ca6dd36e09b820d8cb04e18742e76f405620821d8e670d56afeb9b3b6258025d8e384f650775feefe62e3239ee605d0851433674dd89edd2159f21e53a
-
Filesize
174KB
MD5c842d295a9da1ed85ea5b924c7709b2d
SHA179b640631d52cc4a8deda4cf7851188b52f5de85
SHA2563caf0eb3982e9cb4b01f6cb789fac56edd99572e49050f8a53361f670079872b
SHA5122594fba7798c1156bf6cdc70c5ecac63809519c435f27f99d1f67dbd2b85bcc7a71b01f0ae62b5ca2389141333349ff3c5e4f397467ebbb070dab517edf461ff
-
Filesize
174KB
MD5c842d295a9da1ed85ea5b924c7709b2d
SHA179b640631d52cc4a8deda4cf7851188b52f5de85
SHA2563caf0eb3982e9cb4b01f6cb789fac56edd99572e49050f8a53361f670079872b
SHA5122594fba7798c1156bf6cdc70c5ecac63809519c435f27f99d1f67dbd2b85bcc7a71b01f0ae62b5ca2389141333349ff3c5e4f397467ebbb070dab517edf461ff