Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
19/07/2023, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
c4e498dee19d585afa45ef25cfa9911d4b278fe589e0bba2eda15af7376bc17b.exe
Resource
win10-20230703-en
General
-
Target
c4e498dee19d585afa45ef25cfa9911d4b278fe589e0bba2eda15af7376bc17b.exe
-
Size
389KB
-
MD5
177cc2b3781056cb89ff026657ed3de6
-
SHA1
8abe82aa72e9078bbe718a1b40ea0d1f03783f51
-
SHA256
c4e498dee19d585afa45ef25cfa9911d4b278fe589e0bba2eda15af7376bc17b
-
SHA512
bc171c6cf6c641e526e81196c7680ebbd60728678aa1bd6a9e9ceab9bd743e55ee0acf1098597715098072c39f79cf86198eeb2973f38e4428bfea2165f2c2e6
-
SSDEEP
12288:0Mrny90j4TvR6br5IAMdFTUjiBrGXtkoPS:LyKOJd+jiBrKrS
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001af92-129.dat healer behavioral1/files/0x000700000001af92-130.dat healer behavioral1/memory/4948-131-0x0000000000380000-0x000000000038A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p1974841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p1974841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p1974841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p1974841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p1974841.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 364 z8068302.exe 4948 p1974841.exe 1932 r2782175.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p1974841.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c4e498dee19d585afa45ef25cfa9911d4b278fe589e0bba2eda15af7376bc17b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c4e498dee19d585afa45ef25cfa9911d4b278fe589e0bba2eda15af7376bc17b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8068302.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8068302.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4948 p1974841.exe 4948 p1974841.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4948 p1974841.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3968 wrote to memory of 364 3968 c4e498dee19d585afa45ef25cfa9911d4b278fe589e0bba2eda15af7376bc17b.exe 69 PID 3968 wrote to memory of 364 3968 c4e498dee19d585afa45ef25cfa9911d4b278fe589e0bba2eda15af7376bc17b.exe 69 PID 3968 wrote to memory of 364 3968 c4e498dee19d585afa45ef25cfa9911d4b278fe589e0bba2eda15af7376bc17b.exe 69 PID 364 wrote to memory of 4948 364 z8068302.exe 70 PID 364 wrote to memory of 4948 364 z8068302.exe 70 PID 364 wrote to memory of 1932 364 z8068302.exe 71 PID 364 wrote to memory of 1932 364 z8068302.exe 71 PID 364 wrote to memory of 1932 364 z8068302.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4e498dee19d585afa45ef25cfa9911d4b278fe589e0bba2eda15af7376bc17b.exe"C:\Users\Admin\AppData\Local\Temp\c4e498dee19d585afa45ef25cfa9911d4b278fe589e0bba2eda15af7376bc17b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8068302.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8068302.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1974841.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p1974841.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2782175.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2782175.exe3⤵
- Executes dropped EXE
PID:1932
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5463244d34781a376f4c62de910e0099f
SHA195bea120676e9e7186416f7c20f20a0d6d1ceb0a
SHA2566a7a8456644fbefdde0343bd8b7f2e75fe99c40cbb7c5a5602f00e8cd39f2122
SHA51250f521f1f66f98903a940f7ae87f518eca970f752d839a073e33478c794212a3d79e844e37044c85783b2d4f0ecfa7e2ad53946d5424932e7047ecc9dafbdd60
-
Filesize
206KB
MD5463244d34781a376f4c62de910e0099f
SHA195bea120676e9e7186416f7c20f20a0d6d1ceb0a
SHA2566a7a8456644fbefdde0343bd8b7f2e75fe99c40cbb7c5a5602f00e8cd39f2122
SHA51250f521f1f66f98903a940f7ae87f518eca970f752d839a073e33478c794212a3d79e844e37044c85783b2d4f0ecfa7e2ad53946d5424932e7047ecc9dafbdd60
-
Filesize
14KB
MD5cb899191cc56c84c0f641c2ca8de89e3
SHA13bed6ad621ae5d854b5607e0dc6a1a6619e19938
SHA256e19e970557c5ae2a75ac6f2fd9feaeb17135a42bfbcbcc271a526139f122b59c
SHA5126537b208a2f29c8deaa2c1251501b4523dea2bd4f12f0a55a80120aac7bdb39a8adb08f98aba81fa77a4f370ec528840d454338d6412ce4c7d26e1138a73ae4c
-
Filesize
14KB
MD5cb899191cc56c84c0f641c2ca8de89e3
SHA13bed6ad621ae5d854b5607e0dc6a1a6619e19938
SHA256e19e970557c5ae2a75ac6f2fd9feaeb17135a42bfbcbcc271a526139f122b59c
SHA5126537b208a2f29c8deaa2c1251501b4523dea2bd4f12f0a55a80120aac7bdb39a8adb08f98aba81fa77a4f370ec528840d454338d6412ce4c7d26e1138a73ae4c
-
Filesize
172KB
MD5eab893932f0e2926d48f41c0f7e4f126
SHA1b9edc905d67f6400d2afae73a1e2cf3ce8c39535
SHA25633ac96f14a4d2b49944a172ac71a0561f765d0491429aec6a58ad8f8aec9c4ff
SHA5125f9e898dc638e7c37ec79602faa85caa599fa7bef61f1b0926982bfe746da115be9076874e128c17f747bdc7b3ba0ff8ab7b847db9e04d3c28f8fb99cb84c927
-
Filesize
172KB
MD5eab893932f0e2926d48f41c0f7e4f126
SHA1b9edc905d67f6400d2afae73a1e2cf3ce8c39535
SHA25633ac96f14a4d2b49944a172ac71a0561f765d0491429aec6a58ad8f8aec9c4ff
SHA5125f9e898dc638e7c37ec79602faa85caa599fa7bef61f1b0926982bfe746da115be9076874e128c17f747bdc7b3ba0ff8ab7b847db9e04d3c28f8fb99cb84c927