Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
19/07/2023, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
c17a7b0af9751e9ab09b9f310ced898ffaaabac1b27cba0eacf98ff1e9e8221f.exe
Resource
win10-20230703-en
General
-
Target
c17a7b0af9751e9ab09b9f310ced898ffaaabac1b27cba0eacf98ff1e9e8221f.exe
-
Size
389KB
-
MD5
01e3a8c5b6c3afac4de6f92c0d3a7c25
-
SHA1
18e4d2253bed0870dfe7a0748f870669da38d135
-
SHA256
c17a7b0af9751e9ab09b9f310ced898ffaaabac1b27cba0eacf98ff1e9e8221f
-
SHA512
8cc4b13224fc0e0d2b8ae51dd69bbcc5a81d587169c5d11c8aa85ffa1e81ed32ef0f1f8bf61699b9b9013f0c49afe19a11260cec20fdc2a7a4c80229fd8831ee
-
SSDEEP
6144:K4y+bnr+Lp0yN90QEeDXB3hT7oRYIjDn5n0xEvm6SsgUExhhxSQQJx6AF6r:cMrXy908Db7ShWEvm6SDfhxSQYF6r
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afe2-133.dat healer behavioral1/files/0x000700000001afe2-134.dat healer behavioral1/memory/4512-135-0x0000000000290000-0x000000000029A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p0524550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p0524550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p0524550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p0524550.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p0524550.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2100 z5303535.exe 4512 p0524550.exe 2452 r5694036.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p0524550.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c17a7b0af9751e9ab09b9f310ced898ffaaabac1b27cba0eacf98ff1e9e8221f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c17a7b0af9751e9ab09b9f310ced898ffaaabac1b27cba0eacf98ff1e9e8221f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5303535.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5303535.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4512 p0524550.exe 4512 p0524550.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4512 p0524550.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4324 wrote to memory of 2100 4324 c17a7b0af9751e9ab09b9f310ced898ffaaabac1b27cba0eacf98ff1e9e8221f.exe 69 PID 4324 wrote to memory of 2100 4324 c17a7b0af9751e9ab09b9f310ced898ffaaabac1b27cba0eacf98ff1e9e8221f.exe 69 PID 4324 wrote to memory of 2100 4324 c17a7b0af9751e9ab09b9f310ced898ffaaabac1b27cba0eacf98ff1e9e8221f.exe 69 PID 2100 wrote to memory of 4512 2100 z5303535.exe 70 PID 2100 wrote to memory of 4512 2100 z5303535.exe 70 PID 2100 wrote to memory of 2452 2100 z5303535.exe 71 PID 2100 wrote to memory of 2452 2100 z5303535.exe 71 PID 2100 wrote to memory of 2452 2100 z5303535.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\c17a7b0af9751e9ab09b9f310ced898ffaaabac1b27cba0eacf98ff1e9e8221f.exe"C:\Users\Admin\AppData\Local\Temp\c17a7b0af9751e9ab09b9f310ced898ffaaabac1b27cba0eacf98ff1e9e8221f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5303535.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5303535.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0524550.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0524550.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5694036.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5694036.exe3⤵
- Executes dropped EXE
PID:2452
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5ecc1a5905fd886150b04cd19d97b73e1
SHA1782bd0c0f916dcafb0647a522e3b6defcc30692b
SHA25698a8b3b9a7bc400da02c65699ea55b3ec5e29100ec5a8caef4e73255ce978790
SHA5122a18faf1c95a7c96e36f82da66d750b565a83b90201efe710f8005d7f1168ac5e8caec64afddd7335f2e2994eec361d8dd310a31fabfbe064f5ab278920f75b6
-
Filesize
206KB
MD5ecc1a5905fd886150b04cd19d97b73e1
SHA1782bd0c0f916dcafb0647a522e3b6defcc30692b
SHA25698a8b3b9a7bc400da02c65699ea55b3ec5e29100ec5a8caef4e73255ce978790
SHA5122a18faf1c95a7c96e36f82da66d750b565a83b90201efe710f8005d7f1168ac5e8caec64afddd7335f2e2994eec361d8dd310a31fabfbe064f5ab278920f75b6
-
Filesize
14KB
MD503e8422d98728d6d615ebf69effb2a99
SHA10a6b795fd1937d4822f88d9eb63ffd045832f857
SHA2567587c3810ddf28c777c44d57044ae877294f73e2c82dbf0cab1dbe2989b3439b
SHA5128fa5c3360d26705adb3264a20e88dfb1f8a9c32a5a1fd5366e084e2b375cce86ace59dd6d0396ceb85384b12b5833abcda9e4d353528e2eea2956c68ae3a1234
-
Filesize
14KB
MD503e8422d98728d6d615ebf69effb2a99
SHA10a6b795fd1937d4822f88d9eb63ffd045832f857
SHA2567587c3810ddf28c777c44d57044ae877294f73e2c82dbf0cab1dbe2989b3439b
SHA5128fa5c3360d26705adb3264a20e88dfb1f8a9c32a5a1fd5366e084e2b375cce86ace59dd6d0396ceb85384b12b5833abcda9e4d353528e2eea2956c68ae3a1234
-
Filesize
173KB
MD5c1fd520d62711a87d0ebf6dcce48a043
SHA1432951a1c16c53c138813135e6d7b9f232e692c6
SHA2564c804195d6452dd15acc577e7112584385abd152bad32d76c62d3e061cb10df4
SHA5122f6154baafa5d2b02cbacbd3392a11bb4d380154464cc2f133ce88df9244e9bdd1cc3de18731b79b8b23021cf7ebe21edba1062ea8b66a86526220e8776270d4
-
Filesize
173KB
MD5c1fd520d62711a87d0ebf6dcce48a043
SHA1432951a1c16c53c138813135e6d7b9f232e692c6
SHA2564c804195d6452dd15acc577e7112584385abd152bad32d76c62d3e061cb10df4
SHA5122f6154baafa5d2b02cbacbd3392a11bb4d380154464cc2f133ce88df9244e9bdd1cc3de18731b79b8b23021cf7ebe21edba1062ea8b66a86526220e8776270d4