Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
19/07/2023, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
4ba92c4c1427104fa0a351a9c495d3b489750af658ebaf00f2cb482d2945715c.exe
Resource
win10-20230703-en
General
-
Target
4ba92c4c1427104fa0a351a9c495d3b489750af658ebaf00f2cb482d2945715c.exe
-
Size
389KB
-
MD5
26a312d79214d0a1f7ae79436fc0d08c
-
SHA1
8b1e66d7fcde8f1bc3878ad8ef0485c84c33c462
-
SHA256
4ba92c4c1427104fa0a351a9c495d3b489750af658ebaf00f2cb482d2945715c
-
SHA512
583c51ff82d8d79d8a303d6b5a5b3719957723f50ce6714a177b476109ca3897ee02d41ee6ca1482af08feeaea2a6f5050bb6e963019013766926e0184ec6280
-
SSDEEP
12288:cMrby90e+K7Y/p/io1Y7FcHeeFb3T3VJN3:ny4ywx1RJFb3T3F3
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001af78-132.dat healer behavioral1/files/0x000700000001af78-133.dat healer behavioral1/memory/2932-134-0x00000000003B0000-0x00000000003BA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p6098295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p6098295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p6098295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p6098295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p6098295.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1044 z8546138.exe 2932 p6098295.exe 3208 r1858301.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p6098295.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4ba92c4c1427104fa0a351a9c495d3b489750af658ebaf00f2cb482d2945715c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4ba92c4c1427104fa0a351a9c495d3b489750af658ebaf00f2cb482d2945715c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8546138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8546138.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 p6098295.exe 2932 p6098295.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2932 p6098295.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4176 wrote to memory of 1044 4176 4ba92c4c1427104fa0a351a9c495d3b489750af658ebaf00f2cb482d2945715c.exe 69 PID 4176 wrote to memory of 1044 4176 4ba92c4c1427104fa0a351a9c495d3b489750af658ebaf00f2cb482d2945715c.exe 69 PID 4176 wrote to memory of 1044 4176 4ba92c4c1427104fa0a351a9c495d3b489750af658ebaf00f2cb482d2945715c.exe 69 PID 1044 wrote to memory of 2932 1044 z8546138.exe 70 PID 1044 wrote to memory of 2932 1044 z8546138.exe 70 PID 1044 wrote to memory of 3208 1044 z8546138.exe 71 PID 1044 wrote to memory of 3208 1044 z8546138.exe 71 PID 1044 wrote to memory of 3208 1044 z8546138.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ba92c4c1427104fa0a351a9c495d3b489750af658ebaf00f2cb482d2945715c.exe"C:\Users\Admin\AppData\Local\Temp\4ba92c4c1427104fa0a351a9c495d3b489750af658ebaf00f2cb482d2945715c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8546138.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8546138.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6098295.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6098295.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1858301.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1858301.exe3⤵
- Executes dropped EXE
PID:3208
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5ae8171d4ceeccb31cfc5a81f7f6b18cc
SHA1e3b12665b5c094d9064338813d76c1a3c914f50f
SHA25618f8de130880dd59e51b486a8ea2487b8a028aa60b7c41d3c0352d2427601929
SHA5122968e5e900994064358d6fe1617c522c95c1097f6fa0a635b76ea03dc50a44b8b330d4d17aff535085f11b4ba0b7bfc635fcbc89f1078631f925816547fa0244
-
Filesize
206KB
MD5ae8171d4ceeccb31cfc5a81f7f6b18cc
SHA1e3b12665b5c094d9064338813d76c1a3c914f50f
SHA25618f8de130880dd59e51b486a8ea2487b8a028aa60b7c41d3c0352d2427601929
SHA5122968e5e900994064358d6fe1617c522c95c1097f6fa0a635b76ea03dc50a44b8b330d4d17aff535085f11b4ba0b7bfc635fcbc89f1078631f925816547fa0244
-
Filesize
14KB
MD5aad32d51a7adb50e4cee54baf0a112df
SHA1fd52cb62827ee09db360875cbea94a20efa2a792
SHA2567292144f018561c2dfa55a58a349d82f84c3aa1c4018a15d8bd8d189d85909fe
SHA512e2611c53e36b7b94e3b703b584dfe657694e3ca50a1167056f39b5f71cf04e7fc4d09e60cf4489e55beb3bc857cf72125a2b01db8c5e7944a72afe964a8b095a
-
Filesize
14KB
MD5aad32d51a7adb50e4cee54baf0a112df
SHA1fd52cb62827ee09db360875cbea94a20efa2a792
SHA2567292144f018561c2dfa55a58a349d82f84c3aa1c4018a15d8bd8d189d85909fe
SHA512e2611c53e36b7b94e3b703b584dfe657694e3ca50a1167056f39b5f71cf04e7fc4d09e60cf4489e55beb3bc857cf72125a2b01db8c5e7944a72afe964a8b095a
-
Filesize
173KB
MD5b79bc9c40058c1b36908c70e95f1ae75
SHA18a9f315fb2b7360a5410bd2e38ef5a24fda9e99b
SHA256b26c26781f1afd3a6cbc41ff11875738acc31dc954447b92d6cf07514195cce7
SHA51257ad7c3a82ebd392090fb9c8086aadfc14890e977b6e0923a171e18f4cfcf92c78c682f4058ef267301fcbd62b566e02af5cfaa36bb2d49f0adbf1a6049310e3
-
Filesize
173KB
MD5b79bc9c40058c1b36908c70e95f1ae75
SHA18a9f315fb2b7360a5410bd2e38ef5a24fda9e99b
SHA256b26c26781f1afd3a6cbc41ff11875738acc31dc954447b92d6cf07514195cce7
SHA51257ad7c3a82ebd392090fb9c8086aadfc14890e977b6e0923a171e18f4cfcf92c78c682f4058ef267301fcbd62b566e02af5cfaa36bb2d49f0adbf1a6049310e3