Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2023, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
a6dfe59487fc254d427c4823222eed73da683b2e489bc75ed795a3261bfad59f.exe
Resource
win10v2004-20230703-en
General
-
Target
a6dfe59487fc254d427c4823222eed73da683b2e489bc75ed795a3261bfad59f.exe
-
Size
388KB
-
MD5
50112052b12c1ce1e60a2ad10dd4502d
-
SHA1
a9246fb56ad73a54a6d045c804bccf4f2771599d
-
SHA256
a6dfe59487fc254d427c4823222eed73da683b2e489bc75ed795a3261bfad59f
-
SHA512
8583488fc3ac9c17b93b9e966cc8c87615e5ffa1f79b503c8252f611ddf6780643540c1f55618f410a0589770bd2ae404b10b8e5c718df16dbe915e7c4be4d40
-
SSDEEP
6144:KFy+bnr+5p0yN90QE3lyTl+ADXP9AkJi/asxFYY0ZPCb:/Mrdy90lmLXP9AkJuaZYFb
Malware Config
Extracted
redline
grom
77.91.68.68:19071
-
auth_value
9ec3129bff410b89097d656d7abc33dc
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00080000000231f5-145.dat healer behavioral1/files/0x00080000000231f5-146.dat healer behavioral1/memory/2796-147-0x0000000000070000-0x000000000007A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p3544762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p3544762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p3544762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p3544762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p3544762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p3544762.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4480 z8578497.exe 2796 p3544762.exe 1840 r9345878.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p3544762.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8578497.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8578497.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a6dfe59487fc254d427c4823222eed73da683b2e489bc75ed795a3261bfad59f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a6dfe59487fc254d427c4823222eed73da683b2e489bc75ed795a3261bfad59f.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4264 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2796 p3544762.exe 2796 p3544762.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2796 p3544762.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2848 wrote to memory of 4480 2848 a6dfe59487fc254d427c4823222eed73da683b2e489bc75ed795a3261bfad59f.exe 86 PID 2848 wrote to memory of 4480 2848 a6dfe59487fc254d427c4823222eed73da683b2e489bc75ed795a3261bfad59f.exe 86 PID 2848 wrote to memory of 4480 2848 a6dfe59487fc254d427c4823222eed73da683b2e489bc75ed795a3261bfad59f.exe 86 PID 4480 wrote to memory of 2796 4480 z8578497.exe 87 PID 4480 wrote to memory of 2796 4480 z8578497.exe 87 PID 4480 wrote to memory of 1840 4480 z8578497.exe 95 PID 4480 wrote to memory of 1840 4480 z8578497.exe 95 PID 4480 wrote to memory of 1840 4480 z8578497.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6dfe59487fc254d427c4823222eed73da683b2e489bc75ed795a3261bfad59f.exe"C:\Users\Admin\AppData\Local\Temp\a6dfe59487fc254d427c4823222eed73da683b2e489bc75ed795a3261bfad59f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8578497.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8578497.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3544762.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3544762.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9345878.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9345878.exe3⤵
- Executes dropped EXE
PID:1840
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4264
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5ca02cbcc3e9cbe88c43ba3b59a26735f
SHA12aae5dfe1bc662021ede6065f4bd6d86ac3c023f
SHA256b7ed2418c959b7cc724dfec44ded9163d8fab66206eddf9695a280f6dd630190
SHA512620f8e17f66e2461f0b2669d4187fcb4cd47ce35bd3631b9e7054b00548c2cbbe6cc5e0544dc6e27a380d08d3cc34988aaac0222ee92ddd10d5e0b0319451dad
-
Filesize
206KB
MD5ca02cbcc3e9cbe88c43ba3b59a26735f
SHA12aae5dfe1bc662021ede6065f4bd6d86ac3c023f
SHA256b7ed2418c959b7cc724dfec44ded9163d8fab66206eddf9695a280f6dd630190
SHA512620f8e17f66e2461f0b2669d4187fcb4cd47ce35bd3631b9e7054b00548c2cbbe6cc5e0544dc6e27a380d08d3cc34988aaac0222ee92ddd10d5e0b0319451dad
-
Filesize
15KB
MD5a296a7498439253b21570e0153a5f7e3
SHA13acc15a0559a48e834801dd849f97839bd35b050
SHA256dd7644b76a429c345f32f750117c3d65153503b418d03fe781b622f7babcb6c4
SHA51206a25cd21edcac78a97cc4ee31da5f0abe98472489079136d74519bc7d1249d47033343f27b2bb9835cd837ad3d47fc266d88a8d62269f0dd47354502229404d
-
Filesize
15KB
MD5a296a7498439253b21570e0153a5f7e3
SHA13acc15a0559a48e834801dd849f97839bd35b050
SHA256dd7644b76a429c345f32f750117c3d65153503b418d03fe781b622f7babcb6c4
SHA51206a25cd21edcac78a97cc4ee31da5f0abe98472489079136d74519bc7d1249d47033343f27b2bb9835cd837ad3d47fc266d88a8d62269f0dd47354502229404d
-
Filesize
172KB
MD5bed043095af8a9d7ad5b985aa9c21ece
SHA1584c8081af0aa97888efba293cd62c4e7d402056
SHA256ea7c92fa26a3affe4152796a56a31a2991a3fee01b85ddf3c862682b590eaa47
SHA51223b7cee07518e7f362085ae0d0641a8e5fda8154fa217424419c078883fcf6bdb9206ede56b75ed8e29e691b870f4acbeb06c8e87a9c1fcd501c9cbfd548936c
-
Filesize
172KB
MD5bed043095af8a9d7ad5b985aa9c21ece
SHA1584c8081af0aa97888efba293cd62c4e7d402056
SHA256ea7c92fa26a3affe4152796a56a31a2991a3fee01b85ddf3c862682b590eaa47
SHA51223b7cee07518e7f362085ae0d0641a8e5fda8154fa217424419c078883fcf6bdb9206ede56b75ed8e29e691b870f4acbeb06c8e87a9c1fcd501c9cbfd548936c