Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21/07/2023, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
5066fa88809775351ad7659df9361b186e76559f207314f8d5d64128aea78db4.exe
Resource
win10-20230703-en
General
-
Target
5066fa88809775351ad7659df9361b186e76559f207314f8d5d64128aea78db4.exe
-
Size
389KB
-
MD5
4c0ee4575495af04e7c58bab38be728f
-
SHA1
38ec99bddfc7371bff0271d5b06618c4b8edc28a
-
SHA256
5066fa88809775351ad7659df9361b186e76559f207314f8d5d64128aea78db4
-
SHA512
ab43f5567edc99ea8e02c50003fd6ab33d6fda09e7317ce0f4c45618626a2aa7bde9e631e34668eeaa81ad72c1e977c24cd0a49edebee62666b729a471447538
-
SSDEEP
12288:fMrby90gtNYRCQoiYZivJRwpuYisdDZpD:8yTEgZwAuYisdD7D
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001af86-129.dat healer behavioral1/files/0x000700000001af86-130.dat healer behavioral1/memory/920-131-0x0000000000830000-0x000000000083A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p7643138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p7643138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p7643138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p7643138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p7643138.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2852 z1186614.exe 920 p7643138.exe 1244 r6799250.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p7643138.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1186614.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5066fa88809775351ad7659df9361b186e76559f207314f8d5d64128aea78db4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5066fa88809775351ad7659df9361b186e76559f207314f8d5d64128aea78db4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1186614.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 920 p7643138.exe 920 p7643138.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 920 p7643138.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3116 wrote to memory of 2852 3116 5066fa88809775351ad7659df9361b186e76559f207314f8d5d64128aea78db4.exe 70 PID 3116 wrote to memory of 2852 3116 5066fa88809775351ad7659df9361b186e76559f207314f8d5d64128aea78db4.exe 70 PID 3116 wrote to memory of 2852 3116 5066fa88809775351ad7659df9361b186e76559f207314f8d5d64128aea78db4.exe 70 PID 2852 wrote to memory of 920 2852 z1186614.exe 71 PID 2852 wrote to memory of 920 2852 z1186614.exe 71 PID 2852 wrote to memory of 1244 2852 z1186614.exe 72 PID 2852 wrote to memory of 1244 2852 z1186614.exe 72 PID 2852 wrote to memory of 1244 2852 z1186614.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\5066fa88809775351ad7659df9361b186e76559f207314f8d5d64128aea78db4.exe"C:\Users\Admin\AppData\Local\Temp\5066fa88809775351ad7659df9361b186e76559f207314f8d5d64128aea78db4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1186614.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1186614.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7643138.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p7643138.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6799250.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6799250.exe3⤵
- Executes dropped EXE
PID:1244
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD57e63b6b595edc3bbdf51cd6d1d43db8c
SHA13526e65c8970b7f4e1264f3b797db0415b25d7af
SHA25625c2569b594d011b77479b8ce2ac398637ca41ee739edcf8e163987ef72903a9
SHA5122d940115fe821173bc30277b0f4450a0656fe9dd9d5f97ec1834bec865e51808aae4cfd16503fe76e367878865ae7e6ca47773d28bbddda31bb38f94e8f0a0e0
-
Filesize
206KB
MD57e63b6b595edc3bbdf51cd6d1d43db8c
SHA13526e65c8970b7f4e1264f3b797db0415b25d7af
SHA25625c2569b594d011b77479b8ce2ac398637ca41ee739edcf8e163987ef72903a9
SHA5122d940115fe821173bc30277b0f4450a0656fe9dd9d5f97ec1834bec865e51808aae4cfd16503fe76e367878865ae7e6ca47773d28bbddda31bb38f94e8f0a0e0
-
Filesize
15KB
MD57f9ba5f0a0165d70810fbee527b0ec21
SHA1e77cf10f7ff03bf130eca445b1c5987503776350
SHA2568828b5e32a6d2bb33dc4ffa91fe84f1b9664ae8da8567197480b7a9f41b49794
SHA51297f002106af2b4b73c5c8380e40097b3640c11d0928216e2b308398ce2c90d41fe689d88e57835a543b48affb5aa1434027974b437601c2cf9aa54ea5a1922f0
-
Filesize
15KB
MD57f9ba5f0a0165d70810fbee527b0ec21
SHA1e77cf10f7ff03bf130eca445b1c5987503776350
SHA2568828b5e32a6d2bb33dc4ffa91fe84f1b9664ae8da8567197480b7a9f41b49794
SHA51297f002106af2b4b73c5c8380e40097b3640c11d0928216e2b308398ce2c90d41fe689d88e57835a543b48affb5aa1434027974b437601c2cf9aa54ea5a1922f0
-
Filesize
175KB
MD564b4c13fbc7fbd5849c4abaa28fbf637
SHA1bd8eb63a81dd7d0eaec05afab1e7dc8f9bfcb126
SHA256e26700d0ac5bc64d43eaeed369a9598accf95c195011578455e630a35b8c115c
SHA5124ca081f77c91b74e58261778ec0688b6ebc93662958785f1141204c99b8b58048696c0dba319fe5f3b225dc86f48e18fd153714dbc3e5ceeb403bcaadc24c6f5
-
Filesize
175KB
MD564b4c13fbc7fbd5849c4abaa28fbf637
SHA1bd8eb63a81dd7d0eaec05afab1e7dc8f9bfcb126
SHA256e26700d0ac5bc64d43eaeed369a9598accf95c195011578455e630a35b8c115c
SHA5124ca081f77c91b74e58261778ec0688b6ebc93662958785f1141204c99b8b58048696c0dba319fe5f3b225dc86f48e18fd153714dbc3e5ceeb403bcaadc24c6f5