Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
f7e2c45eb1b73a2805d5f7f87a6084e7870c2fc828000896467813103779f9cb.exe
Resource
win10v2004-20230703-en
General
-
Target
f7e2c45eb1b73a2805d5f7f87a6084e7870c2fc828000896467813103779f9cb.exe
-
Size
388KB
-
MD5
81acafe2d5baa9e8f69a52d7970dd740
-
SHA1
041f80993c89ae768cd772e96f4ac878f3fe5fe1
-
SHA256
f7e2c45eb1b73a2805d5f7f87a6084e7870c2fc828000896467813103779f9cb
-
SHA512
5dc9df4a2d924363ce63a5fca294cf07b7b030c6c7aa56850c1eb7d11f1e1151e6808bbfd071a1f07fa210255dddeda2441732a90767d8e133de1b5e9332b979
-
SSDEEP
6144:KPy+bnr+Zp0yN90QE4hTCNupNfJDKmvR8GkqjESBBMy9yYHslPvc:ZMrxy90HcJDKmmHRS0Qbuvc
Malware Config
Extracted
redline
roma
77.91.68.56:19071
-
auth_value
f099c2cf92834dbc554a94e1456cf576
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002321d-145.dat healer behavioral1/files/0x000700000002321d-146.dat healer behavioral1/memory/3280-147-0x0000000000D00000-0x0000000000D0A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p4729972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p4729972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p4729972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p4729972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p4729972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p4729972.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2912 z4289071.exe 3280 p4729972.exe 4944 r5206607.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p4729972.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f7e2c45eb1b73a2805d5f7f87a6084e7870c2fc828000896467813103779f9cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f7e2c45eb1b73a2805d5f7f87a6084e7870c2fc828000896467813103779f9cb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4289071.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4289071.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3280 p4729972.exe 3280 p4729972.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3280 p4729972.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 844 wrote to memory of 2912 844 f7e2c45eb1b73a2805d5f7f87a6084e7870c2fc828000896467813103779f9cb.exe 85 PID 844 wrote to memory of 2912 844 f7e2c45eb1b73a2805d5f7f87a6084e7870c2fc828000896467813103779f9cb.exe 85 PID 844 wrote to memory of 2912 844 f7e2c45eb1b73a2805d5f7f87a6084e7870c2fc828000896467813103779f9cb.exe 85 PID 2912 wrote to memory of 3280 2912 z4289071.exe 86 PID 2912 wrote to memory of 3280 2912 z4289071.exe 86 PID 2912 wrote to memory of 4944 2912 z4289071.exe 93 PID 2912 wrote to memory of 4944 2912 z4289071.exe 93 PID 2912 wrote to memory of 4944 2912 z4289071.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7e2c45eb1b73a2805d5f7f87a6084e7870c2fc828000896467813103779f9cb.exe"C:\Users\Admin\AppData\Local\Temp\f7e2c45eb1b73a2805d5f7f87a6084e7870c2fc828000896467813103779f9cb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4289071.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4289071.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p4729972.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p4729972.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5206607.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5206607.exe3⤵
- Executes dropped EXE
PID:4944
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5140c31656c945076d109d15e253c7e08
SHA1fa00cabf710a120e995c5557b9e184fd80232492
SHA256c50f1efb76bf61fba7d3b69996a4b6b7f0c3136074ad1ee38ea447542135997a
SHA512b6a2587c0f7f02ca6157809defb9fb5d939940001c1496a95fc63a058bb525c9139bbe675ee10a7a5ba006f609bc524dc8a4fac58f14451f2f8eba8f056c114e
-
Filesize
206KB
MD5140c31656c945076d109d15e253c7e08
SHA1fa00cabf710a120e995c5557b9e184fd80232492
SHA256c50f1efb76bf61fba7d3b69996a4b6b7f0c3136074ad1ee38ea447542135997a
SHA512b6a2587c0f7f02ca6157809defb9fb5d939940001c1496a95fc63a058bb525c9139bbe675ee10a7a5ba006f609bc524dc8a4fac58f14451f2f8eba8f056c114e
-
Filesize
13KB
MD507880433cf5ec67a682064b05f0617ef
SHA15763c2194843da8fee6c6fda9cb33176496cae75
SHA256fc044dec4a2a9277ff74f5c4b174956a0a31e571ea41d4d6c676802819387cfa
SHA512581c61173185ad8f9445a733ce68379841578040cc11406ea78e616804aebc406534fc0b5b5b3d1dd29029ef107ba7ac274ef4b77bcf366b40fa960856d18e9b
-
Filesize
13KB
MD507880433cf5ec67a682064b05f0617ef
SHA15763c2194843da8fee6c6fda9cb33176496cae75
SHA256fc044dec4a2a9277ff74f5c4b174956a0a31e571ea41d4d6c676802819387cfa
SHA512581c61173185ad8f9445a733ce68379841578040cc11406ea78e616804aebc406534fc0b5b5b3d1dd29029ef107ba7ac274ef4b77bcf366b40fa960856d18e9b
-
Filesize
175KB
MD5b32d79e4ff4118d3fe58b72cdaa96cce
SHA17f90a7a1e3149e0ce3aae91960d2569aef0b44dc
SHA256c04fa1f2923cfb1a8de4909af36c71a70e8e7fce1fb15f1b21da1833fe6f10a3
SHA512be42ec78f8aa246d73d731de54e26fb5e1b8d128ca7ca8c594bac198d615437f5e7fd236c89b8697d82840aaca58943408c4b1a792105362f0773ff80ac96fbe
-
Filesize
175KB
MD5b32d79e4ff4118d3fe58b72cdaa96cce
SHA17f90a7a1e3149e0ce3aae91960d2569aef0b44dc
SHA256c04fa1f2923cfb1a8de4909af36c71a70e8e7fce1fb15f1b21da1833fe6f10a3
SHA512be42ec78f8aa246d73d731de54e26fb5e1b8d128ca7ca8c594bac198d615437f5e7fd236c89b8697d82840aaca58943408c4b1a792105362f0773ff80ac96fbe