Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
19/07/2023, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
95d9bb990bb85cdecdc76c11a1b0159b35e3958d6eb7f10d3c58c720da8b29b1.exe
Resource
win10-20230703-en
General
-
Target
95d9bb990bb85cdecdc76c11a1b0159b35e3958d6eb7f10d3c58c720da8b29b1.exe
-
Size
389KB
-
MD5
9be6610be653d29f1846dfabbb0b9796
-
SHA1
7f414ffb2c37b21d48d8d7954ae0645328c83d5d
-
SHA256
95d9bb990bb85cdecdc76c11a1b0159b35e3958d6eb7f10d3c58c720da8b29b1
-
SHA512
746380c6e289026aeca2ac03a683073ccfb05ae9ff45e0801295540c800d19ceae9363896f6dd0392be2408fbd9ecf71664a2a14c27ba55d3ab06e2b2276ac83
-
SSDEEP
6144:KIy+bnr+cp0yN90QE2C02lxr2XO93i0H2CtPaxGuWzIlQCYM:IMrUy90h02br2XcNwdAM
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afe0-129.dat healer behavioral1/files/0x000700000001afe0-130.dat healer behavioral1/memory/3964-131-0x0000000000BC0000-0x0000000000BCA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p7893649.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p7893649.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p7893649.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p7893649.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p7893649.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4500 z4178457.exe 3964 p7893649.exe 2220 r6603718.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p7893649.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 95d9bb990bb85cdecdc76c11a1b0159b35e3958d6eb7f10d3c58c720da8b29b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 95d9bb990bb85cdecdc76c11a1b0159b35e3958d6eb7f10d3c58c720da8b29b1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4178457.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4178457.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3964 p7893649.exe 3964 p7893649.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3964 p7893649.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4472 wrote to memory of 4500 4472 95d9bb990bb85cdecdc76c11a1b0159b35e3958d6eb7f10d3c58c720da8b29b1.exe 70 PID 4472 wrote to memory of 4500 4472 95d9bb990bb85cdecdc76c11a1b0159b35e3958d6eb7f10d3c58c720da8b29b1.exe 70 PID 4472 wrote to memory of 4500 4472 95d9bb990bb85cdecdc76c11a1b0159b35e3958d6eb7f10d3c58c720da8b29b1.exe 70 PID 4500 wrote to memory of 3964 4500 z4178457.exe 71 PID 4500 wrote to memory of 3964 4500 z4178457.exe 71 PID 4500 wrote to memory of 2220 4500 z4178457.exe 72 PID 4500 wrote to memory of 2220 4500 z4178457.exe 72 PID 4500 wrote to memory of 2220 4500 z4178457.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\95d9bb990bb85cdecdc76c11a1b0159b35e3958d6eb7f10d3c58c720da8b29b1.exe"C:\Users\Admin\AppData\Local\Temp\95d9bb990bb85cdecdc76c11a1b0159b35e3958d6eb7f10d3c58c720da8b29b1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4178457.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4178457.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7893649.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7893649.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6603718.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6603718.exe3⤵
- Executes dropped EXE
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5a1068801ebd5f63c43409882b4aa3791
SHA18f453d1e257375077fac1f5d5186af404ed0ea4e
SHA256351981d94a339206067d6d228f087863da73af88be381adb814791c153cf9c30
SHA51270f00d9c07aa5d29848163fba19bc3086bd1b53a5b34cb67d10efd4c5ef1632544b47754a7ea2f5b178481641efe4d91b90ee1281081de2c39ab84216290eafc
-
Filesize
206KB
MD5a1068801ebd5f63c43409882b4aa3791
SHA18f453d1e257375077fac1f5d5186af404ed0ea4e
SHA256351981d94a339206067d6d228f087863da73af88be381adb814791c153cf9c30
SHA51270f00d9c07aa5d29848163fba19bc3086bd1b53a5b34cb67d10efd4c5ef1632544b47754a7ea2f5b178481641efe4d91b90ee1281081de2c39ab84216290eafc
-
Filesize
14KB
MD5acde166044219d07750b97cbd3316c66
SHA1632d9878bb3f44c2cf07cde5098f007dbbfa4807
SHA256e08605ee7aeb7c5371d1fac385ecc595f8bcca263d43747a8c51555570e0945b
SHA51244c6d00f5f770ecd3501ad66ca800e12fe763c21144b4c4c266af5328a00192cc77db8e4ecbfb33f41005ae5b12e5329fb221346c91f81496d88bd440de54efc
-
Filesize
14KB
MD5acde166044219d07750b97cbd3316c66
SHA1632d9878bb3f44c2cf07cde5098f007dbbfa4807
SHA256e08605ee7aeb7c5371d1fac385ecc595f8bcca263d43747a8c51555570e0945b
SHA51244c6d00f5f770ecd3501ad66ca800e12fe763c21144b4c4c266af5328a00192cc77db8e4ecbfb33f41005ae5b12e5329fb221346c91f81496d88bd440de54efc
-
Filesize
172KB
MD5bde770ed1c0c17312c8ae46b31b42269
SHA1a746e1acf178780abaf664b2c76d5a0ec1bee304
SHA256063d3fd28c75eb719e3db09deab446cef4f56ff584667ac14a4a6be62a4a524c
SHA5124900000c09eaeabd183e3a5f02a667b58b7faad9ecf733e5d1639dae71735ea29662decfdfa3ec1fd2dd207787ea70579e6074ae7057f18bc43efb288ed7d6a3
-
Filesize
172KB
MD5bde770ed1c0c17312c8ae46b31b42269
SHA1a746e1acf178780abaf664b2c76d5a0ec1bee304
SHA256063d3fd28c75eb719e3db09deab446cef4f56ff584667ac14a4a6be62a4a524c
SHA5124900000c09eaeabd183e3a5f02a667b58b7faad9ecf733e5d1639dae71735ea29662decfdfa3ec1fd2dd207787ea70579e6074ae7057f18bc43efb288ed7d6a3