Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21/07/2023, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
a83d2fd85a3a038933985bca867e614f193a103abdeeacdedb3c7d3880b07ca0.exe
Resource
win10-20230703-en
General
-
Target
a83d2fd85a3a038933985bca867e614f193a103abdeeacdedb3c7d3880b07ca0.exe
-
Size
389KB
-
MD5
18154c1a8ba152d639bc5ac7eec7bc87
-
SHA1
b318cd14d556a910d3888f79e8360db9af70a1c5
-
SHA256
a83d2fd85a3a038933985bca867e614f193a103abdeeacdedb3c7d3880b07ca0
-
SHA512
b93286fe0975c91d212774b2bac9b0766dfb9066ec6eb3dcec473b13e85de86ccbb55a780c978d0acf41fb043f8934a370f694af0c933419f6603169ca4bdb6b
-
SSDEEP
12288:KMrry90XZwOKNXb83dTrgD/ya8w4yR4WJXKi:RylRbQTrgDqa8wdam9
Malware Config
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afbd-134.dat healer behavioral1/files/0x000700000001afbd-133.dat healer behavioral1/memory/4624-135-0x00000000003A0000-0x00000000003AA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p0871760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p0871760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p0871760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p0871760.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p0871760.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4520 z0978593.exe 4624 p0871760.exe 4988 r9974647.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p0871760.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a83d2fd85a3a038933985bca867e614f193a103abdeeacdedb3c7d3880b07ca0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a83d2fd85a3a038933985bca867e614f193a103abdeeacdedb3c7d3880b07ca0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0978593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0978593.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4624 p0871760.exe 4624 p0871760.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4624 p0871760.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4524 wrote to memory of 4520 4524 a83d2fd85a3a038933985bca867e614f193a103abdeeacdedb3c7d3880b07ca0.exe 68 PID 4524 wrote to memory of 4520 4524 a83d2fd85a3a038933985bca867e614f193a103abdeeacdedb3c7d3880b07ca0.exe 68 PID 4524 wrote to memory of 4520 4524 a83d2fd85a3a038933985bca867e614f193a103abdeeacdedb3c7d3880b07ca0.exe 68 PID 4520 wrote to memory of 4624 4520 z0978593.exe 69 PID 4520 wrote to memory of 4624 4520 z0978593.exe 69 PID 4520 wrote to memory of 4988 4520 z0978593.exe 70 PID 4520 wrote to memory of 4988 4520 z0978593.exe 70 PID 4520 wrote to memory of 4988 4520 z0978593.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\a83d2fd85a3a038933985bca867e614f193a103abdeeacdedb3c7d3880b07ca0.exe"C:\Users\Admin\AppData\Local\Temp\a83d2fd85a3a038933985bca867e614f193a103abdeeacdedb3c7d3880b07ca0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0978593.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0978593.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0871760.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p0871760.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9974647.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9974647.exe3⤵
- Executes dropped EXE
PID:4988
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5e93ca0cd104702d5214025a623bfbcec
SHA196d838da359c124fe12fa692e1b86f8d6f1bcc01
SHA256f2eae0cce7bf91c9b2cf50b8daf50427a5f7ebdd4b3b20c36a8c9afdeb4d19c3
SHA512ded35b3d9cdecbe17d49fd4bf09328e10da9c617f1cec923e3a9b458d4eae0302b8822c5e4dffed688fc9b72e67b8ab31bc6294e2b52453faac91382ce32be00
-
Filesize
206KB
MD5e93ca0cd104702d5214025a623bfbcec
SHA196d838da359c124fe12fa692e1b86f8d6f1bcc01
SHA256f2eae0cce7bf91c9b2cf50b8daf50427a5f7ebdd4b3b20c36a8c9afdeb4d19c3
SHA512ded35b3d9cdecbe17d49fd4bf09328e10da9c617f1cec923e3a9b458d4eae0302b8822c5e4dffed688fc9b72e67b8ab31bc6294e2b52453faac91382ce32be00
-
Filesize
15KB
MD5e93cb32d9a4ae9a4e03d12256237ad39
SHA19f65546b5183cecf92b6786975cf92aff455facf
SHA256bd85b5c1b52d6162cf966391c899af643953e4d91a623bb4c97850e776e91724
SHA5125ae289e89d628135cd143e54995ebfa0a078966e007aca88ec4a76d17a5dfbbe04a79d72836f8bd2acadc7279cc71425c95ee8c59be2eadb912a51367eea9e9a
-
Filesize
15KB
MD5e93cb32d9a4ae9a4e03d12256237ad39
SHA19f65546b5183cecf92b6786975cf92aff455facf
SHA256bd85b5c1b52d6162cf966391c899af643953e4d91a623bb4c97850e776e91724
SHA5125ae289e89d628135cd143e54995ebfa0a078966e007aca88ec4a76d17a5dfbbe04a79d72836f8bd2acadc7279cc71425c95ee8c59be2eadb912a51367eea9e9a
-
Filesize
175KB
MD5d0b48b96d3c6fa69dd75757f282ab14b
SHA1a1e95fdc2bd24cdbd97e736835e853e3be8e81ff
SHA25690428647d1e18e24e5bdac2c6694c77b861725dd76a4c1945e948ba5e3d7f4b9
SHA51282d042d2f1722cc95a6d4e98e51814230ae9451e7180957443a3bb9ff5af356f4c061aade37b4afe4c423c15d0aa9ad88d15dd7ae7f314eaf68c4e558cb6c465
-
Filesize
175KB
MD5d0b48b96d3c6fa69dd75757f282ab14b
SHA1a1e95fdc2bd24cdbd97e736835e853e3be8e81ff
SHA25690428647d1e18e24e5bdac2c6694c77b861725dd76a4c1945e948ba5e3d7f4b9
SHA51282d042d2f1722cc95a6d4e98e51814230ae9451e7180957443a3bb9ff5af356f4c061aade37b4afe4c423c15d0aa9ad88d15dd7ae7f314eaf68c4e558cb6c465