Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2023, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
f1d51190ca4031030654bb7c305ee00301c6292fd2ef85443cedee2b421433f1.exe
Resource
win10v2004-20230703-en
General
-
Target
f1d51190ca4031030654bb7c305ee00301c6292fd2ef85443cedee2b421433f1.exe
-
Size
389KB
-
MD5
8bacdcc4fa47e3f98d7b3f1a23fe5ff1
-
SHA1
d906fedc1181ad50c6406a1ab7fcdaa5e46d961d
-
SHA256
f1d51190ca4031030654bb7c305ee00301c6292fd2ef85443cedee2b421433f1
-
SHA512
eb22c15455c7621176107da12d04221cd2a3ce1fe51bacd25c7d8639b03ad623b9f5fda13db7dca68477feae0ee1b82db1a6f80fca06337d8f46e75cfb7fdac3
-
SSDEEP
6144:K5y+bnr+xp0yN90QE5+kr5SdvWbeyRQxXGrSCG5EwL/JfWsdW2WMfSBEzoSNFlfq:LMrBy90rrR8xxF5zLlWTkKEzkN7
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00080000000231ae-145.dat healer behavioral1/files/0x00080000000231ae-146.dat healer behavioral1/memory/1148-147-0x00000000001B0000-0x00000000001BA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p6421250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p6421250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p6421250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p6421250.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p6421250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p6421250.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 852 z9450628.exe 1148 p6421250.exe 5032 r1108892.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p6421250.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f1d51190ca4031030654bb7c305ee00301c6292fd2ef85443cedee2b421433f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1d51190ca4031030654bb7c305ee00301c6292fd2ef85443cedee2b421433f1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9450628.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9450628.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1148 p6421250.exe 1148 p6421250.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1148 p6421250.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 548 wrote to memory of 852 548 f1d51190ca4031030654bb7c305ee00301c6292fd2ef85443cedee2b421433f1.exe 85 PID 548 wrote to memory of 852 548 f1d51190ca4031030654bb7c305ee00301c6292fd2ef85443cedee2b421433f1.exe 85 PID 548 wrote to memory of 852 548 f1d51190ca4031030654bb7c305ee00301c6292fd2ef85443cedee2b421433f1.exe 85 PID 852 wrote to memory of 1148 852 z9450628.exe 86 PID 852 wrote to memory of 1148 852 z9450628.exe 86 PID 852 wrote to memory of 5032 852 z9450628.exe 98 PID 852 wrote to memory of 5032 852 z9450628.exe 98 PID 852 wrote to memory of 5032 852 z9450628.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1d51190ca4031030654bb7c305ee00301c6292fd2ef85443cedee2b421433f1.exe"C:\Users\Admin\AppData\Local\Temp\f1d51190ca4031030654bb7c305ee00301c6292fd2ef85443cedee2b421433f1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9450628.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9450628.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6421250.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p6421250.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1108892.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1108892.exe3⤵
- Executes dropped EXE
PID:5032
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD54e5c70d878a1aa5979185e3ecfba636c
SHA12cda41ce52c7e4d4e40694bd90dbfc1d03809dab
SHA2563ce21499b5ee589cd8aa67b2c13794f736d6e702ed5af9aa7827854df11dbf02
SHA512cdd1b4045abb3e14ad06f6fe20c698149017f360bd2915ba2112ed869145acb1a75f7a964ba40e3aeb1dbabb355964ae668f3bfe5f4d430f442de2ac0fc61f71
-
Filesize
206KB
MD54e5c70d878a1aa5979185e3ecfba636c
SHA12cda41ce52c7e4d4e40694bd90dbfc1d03809dab
SHA2563ce21499b5ee589cd8aa67b2c13794f736d6e702ed5af9aa7827854df11dbf02
SHA512cdd1b4045abb3e14ad06f6fe20c698149017f360bd2915ba2112ed869145acb1a75f7a964ba40e3aeb1dbabb355964ae668f3bfe5f4d430f442de2ac0fc61f71
-
Filesize
15KB
MD55d350daf879a6183266924ff5b22d1a7
SHA178614be3980eaff090bcd4d3dcc95b6a4d95eb2a
SHA256d185992f02f19bd0ce3f92560cccc0ab7bc36a8a34c420c8a4bcdbb20a66a8ad
SHA512e148b3006d42e3459c101db7d75e727d1bf9a785ac8511e5a63e6fe28ad0fe881c59cb74817503d2f6f604657a2271f3d784b406d84e3df46f75c65c7f501e6d
-
Filesize
15KB
MD55d350daf879a6183266924ff5b22d1a7
SHA178614be3980eaff090bcd4d3dcc95b6a4d95eb2a
SHA256d185992f02f19bd0ce3f92560cccc0ab7bc36a8a34c420c8a4bcdbb20a66a8ad
SHA512e148b3006d42e3459c101db7d75e727d1bf9a785ac8511e5a63e6fe28ad0fe881c59cb74817503d2f6f604657a2271f3d784b406d84e3df46f75c65c7f501e6d
-
Filesize
175KB
MD5fda64f04b6d6e78283c61488599eda4d
SHA17d16291991ab470c9b5d71de6a1716b23c00fb62
SHA2560f7ba7815c0e6bb1ebcf624ef8d737b1750043c619d03d74bdd4e8de2c70dcd3
SHA512b0a5cd6bfc138907d1e3b109d87bae93fd0aaad5925ff39dedc2544098d5813088f2cd7aa35ebe9bca755462ccd1e9708679761ce25cd397936e434aea47c019
-
Filesize
175KB
MD5fda64f04b6d6e78283c61488599eda4d
SHA17d16291991ab470c9b5d71de6a1716b23c00fb62
SHA2560f7ba7815c0e6bb1ebcf624ef8d737b1750043c619d03d74bdd4e8de2c70dcd3
SHA512b0a5cd6bfc138907d1e3b109d87bae93fd0aaad5925ff39dedc2544098d5813088f2cd7aa35ebe9bca755462ccd1e9708679761ce25cd397936e434aea47c019