Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
19/07/2023, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe
Resource
win10-20230703-en
General
-
Target
76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe
-
Size
390KB
-
MD5
58d3d7b38cdf565f40600c4f84de48d7
-
SHA1
bfaf48e19cdc476f76cba56d8c3e656eece773cd
-
SHA256
76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e
-
SHA512
e32a08abd9abfbcc0180d2338d79d9b4f945658481475f600fd517b3626ac3e31eb3ebbc8f88e114ac41a09a3af5bbbd2a56ec77912a7ab73fda6da18eea141f
-
SSDEEP
6144:KLy+bnr+Wp0yN90QEX8JiDsTwevTqZSJ4cfq4++uf8KnnRUIBr:BMrKy90F4iDuTq0J4c4r8KZr
Malware Config
Extracted
amadey
3.85
77.91.68.3/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000600000001af99-139.dat healer behavioral1/files/0x000600000001af99-140.dat healer behavioral1/memory/3132-141-0x0000000000FD0000-0x0000000000FDA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1440711.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1440711.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1440711.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1440711.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1440711.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2348 x7242899.exe 3804 g3980206.exe 2648 danke.exe 3132 h1440711.exe 2520 j1158746.exe 3488 danke.exe 4516 danke.exe -
Loads dropped DLL 1 IoCs
pid Process 4008 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h1440711.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7242899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7242899.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3132 h1440711.exe 3132 h1440711.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3132 h1440711.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3804 g3980206.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4904 wrote to memory of 2348 4904 76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe 69 PID 4904 wrote to memory of 2348 4904 76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe 69 PID 4904 wrote to memory of 2348 4904 76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe 69 PID 2348 wrote to memory of 3804 2348 x7242899.exe 70 PID 2348 wrote to memory of 3804 2348 x7242899.exe 70 PID 2348 wrote to memory of 3804 2348 x7242899.exe 70 PID 3804 wrote to memory of 2648 3804 g3980206.exe 71 PID 3804 wrote to memory of 2648 3804 g3980206.exe 71 PID 3804 wrote to memory of 2648 3804 g3980206.exe 71 PID 2348 wrote to memory of 3132 2348 x7242899.exe 72 PID 2348 wrote to memory of 3132 2348 x7242899.exe 72 PID 2648 wrote to memory of 4660 2648 danke.exe 73 PID 2648 wrote to memory of 4660 2648 danke.exe 73 PID 2648 wrote to memory of 4660 2648 danke.exe 73 PID 2648 wrote to memory of 4640 2648 danke.exe 75 PID 2648 wrote to memory of 4640 2648 danke.exe 75 PID 2648 wrote to memory of 4640 2648 danke.exe 75 PID 4640 wrote to memory of 4624 4640 cmd.exe 77 PID 4640 wrote to memory of 4624 4640 cmd.exe 77 PID 4640 wrote to memory of 4624 4640 cmd.exe 77 PID 4640 wrote to memory of 4284 4640 cmd.exe 78 PID 4640 wrote to memory of 4284 4640 cmd.exe 78 PID 4640 wrote to memory of 4284 4640 cmd.exe 78 PID 4640 wrote to memory of 3316 4640 cmd.exe 79 PID 4640 wrote to memory of 3316 4640 cmd.exe 79 PID 4640 wrote to memory of 3316 4640 cmd.exe 79 PID 4640 wrote to memory of 3608 4640 cmd.exe 80 PID 4640 wrote to memory of 3608 4640 cmd.exe 80 PID 4640 wrote to memory of 3608 4640 cmd.exe 80 PID 4640 wrote to memory of 2764 4640 cmd.exe 81 PID 4640 wrote to memory of 2764 4640 cmd.exe 81 PID 4640 wrote to memory of 2764 4640 cmd.exe 81 PID 4640 wrote to memory of 2968 4640 cmd.exe 82 PID 4640 wrote to memory of 2968 4640 cmd.exe 82 PID 4640 wrote to memory of 2968 4640 cmd.exe 82 PID 4904 wrote to memory of 2520 4904 76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe 83 PID 4904 wrote to memory of 2520 4904 76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe 83 PID 4904 wrote to memory of 2520 4904 76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe 83 PID 2648 wrote to memory of 4008 2648 danke.exe 85 PID 2648 wrote to memory of 4008 2648 danke.exe 85 PID 2648 wrote to memory of 4008 2648 danke.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe"C:\Users\Admin\AppData\Local\Temp\76ce55b4d5a119f06c367a346ae1862c303beb76b2c774f07526af067c28579e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7242899.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7242899.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3980206.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3980206.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F5⤵
- Creates scheduled task(s)
PID:4660
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"6⤵PID:4284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E6⤵PID:3316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3608
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"6⤵PID:2764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E6⤵PID:2968
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1440711.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1440711.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j1158746.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j1158746.exe2⤵
- Executes dropped EXE
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:3488
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
172KB
MD52200f53bc5c29027f88949980eaf2e83
SHA1fc75e9bc89b921c82ba4775a25a7d0bb45871124
SHA256e26c65216c5c8d752832853856445df485775b273ae50fa0df0c40af911d11f1
SHA51223d3287f64e50facca5aaff8a44e8214a13f5e032759e99ea69c39f5b5023432a3d5b609b7075156f9a74381a6f28f423bf3b51807a2e85af82d50017f78cedb
-
Filesize
172KB
MD52200f53bc5c29027f88949980eaf2e83
SHA1fc75e9bc89b921c82ba4775a25a7d0bb45871124
SHA256e26c65216c5c8d752832853856445df485775b273ae50fa0df0c40af911d11f1
SHA51223d3287f64e50facca5aaff8a44e8214a13f5e032759e99ea69c39f5b5023432a3d5b609b7075156f9a74381a6f28f423bf3b51807a2e85af82d50017f78cedb
-
Filesize
234KB
MD54e258040303267adb6f891ef4c489d78
SHA1b8aea123ff240c7de3e55ac14022dcd4f0cc1821
SHA256f9490ff5055d2132512becbf5ebd59215b2dbb145a19521c03d40ab4b72ce0c9
SHA51248611ffae519c3d93fb882eaff321f49d67dfe242b2a20eba69b08c0fba6ae684f79c48f3e0ffc4c15253d1b78039b14f152df42e37a8a4cfeac93fc9fff9e83
-
Filesize
234KB
MD54e258040303267adb6f891ef4c489d78
SHA1b8aea123ff240c7de3e55ac14022dcd4f0cc1821
SHA256f9490ff5055d2132512becbf5ebd59215b2dbb145a19521c03d40ab4b72ce0c9
SHA51248611ffae519c3d93fb882eaff321f49d67dfe242b2a20eba69b08c0fba6ae684f79c48f3e0ffc4c15253d1b78039b14f152df42e37a8a4cfeac93fc9fff9e83
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
224KB
MD58c6b79ec436d7cf6950a804c1ec7d3e9
SHA14a589d5605d8ef785fdc78b0bf64e769e3a21ad6
SHA2564e1377f9874f333dcb0b1b758e3131949e667fc39aadf3091e4e3b7cdbaeef1d
SHA51206f2de433876963bb7bbddbe93cab0b7dd22164d1c10726294445944dcf5fa4a0fb450fc683c32565177a81a6103f6a5f11d291958bc7fcff7fdb9cf41a001ce
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9
-
Filesize
272B
MD5d867eabb1be5b45bc77bb06814e23640
SHA13139a51ce7e8462c31070363b9532c13cc52c82d
SHA25638c69e3f9f3927f8178d55cde9774a2b170c057b349b73932b87b76499d03349
SHA512afc40d5fa7bcd41b8445f597990d150d57e3621ddef9400af742471aa0d14c2e66cfecc34482dadbaeb6f20912fda8ab786e584bf7fd1ad5fa23d3b95425fd59
-
Filesize
89KB
MD5dc587d08b8ca3cd62e5dc057d41a966b
SHA10ba6a88377c74a0c53b956d405ad17dd5f8c4164
SHA2567d8f216ba04419aae32d5902449a0c5271ed577c722e582fb42e7d43b3b08426
SHA5127300ecc40bfa1129d907a9b074e8406fa01b5ff893c7c281e4441f8cc6a546bcb5e099d6635b2f9714ec1f0453dc41de19f2fca3475f36f62babc425892699a9