Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21/07/2023, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675.exe
Resource
win10-20230703-en
General
-
Target
ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675.exe
-
Size
388KB
-
MD5
dc02f4846020e43ca21d8c5a48f43503
-
SHA1
387a16e086b8d3268af79d736360723dbe3ff8ee
-
SHA256
ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675
-
SHA512
d5deb7d4daf5f4fb2f7deae0705c380a54198f10e22590e772c3bfe98e27d9139a95e380c1e8fc0440df79414055546a1243b8ba757026377a661932d6948ca5
-
SSDEEP
6144:Kby+bnr+rp0yN90QEOnXIxi4+YQDAfpjahkQjHidvz2d9RctdQD7Xe:JMrHy90UXShzQD1kEH0vidfctdA7u
Malware Config
Extracted
redline
grom
77.91.68.68:19071
-
auth_value
9ec3129bff410b89097d656d7abc33dc
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001af65-129.dat healer behavioral1/files/0x000700000001af65-130.dat healer behavioral1/memory/2772-131-0x0000000000150000-0x000000000015A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p9219542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p9219542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p9219542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p9219542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p9219542.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2780 z5239745.exe 2772 p9219542.exe 1948 r9427201.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p9219542.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5239745.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5239745.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2772 p9219542.exe 2772 p9219542.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2772 p9219542.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3676 wrote to memory of 2780 3676 ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675.exe 69 PID 3676 wrote to memory of 2780 3676 ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675.exe 69 PID 3676 wrote to memory of 2780 3676 ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675.exe 69 PID 2780 wrote to memory of 2772 2780 z5239745.exe 70 PID 2780 wrote to memory of 2772 2780 z5239745.exe 70 PID 2780 wrote to memory of 1948 2780 z5239745.exe 71 PID 2780 wrote to memory of 1948 2780 z5239745.exe 71 PID 2780 wrote to memory of 1948 2780 z5239745.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675.exe"C:\Users\Admin\AppData\Local\Temp\ce0d8e42ed3929f16f4c9f9c4451ef452097a1afb75b79b95964d8ef0fcdb675.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5239745.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5239745.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p9219542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p9219542.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9427201.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9427201.exe3⤵
- Executes dropped EXE
PID:1948
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5fe2f1d6252a4749075b76948d5d2329c
SHA103cf9a3f5c98a3755f9679921c7b4ead2651bdf0
SHA256966a94d5935a9a9772c0c00b70c7bd04e941cfc534d7c98efc99b7474a72917e
SHA512079d8ebb0bb0badc319d110b7a1ea6ee252a2a102cff27ee1d9caa7a830c4312a7e2a5ed093ca157c2652e0c48198a1c7c21867fbba727edd1f1b36547bcae13
-
Filesize
206KB
MD5fe2f1d6252a4749075b76948d5d2329c
SHA103cf9a3f5c98a3755f9679921c7b4ead2651bdf0
SHA256966a94d5935a9a9772c0c00b70c7bd04e941cfc534d7c98efc99b7474a72917e
SHA512079d8ebb0bb0badc319d110b7a1ea6ee252a2a102cff27ee1d9caa7a830c4312a7e2a5ed093ca157c2652e0c48198a1c7c21867fbba727edd1f1b36547bcae13
-
Filesize
16KB
MD5596e04282e3a029549517d998b641bc9
SHA137695102540deddbc8f076ebf9e593cafad73ad3
SHA256c6d07a2afcc66999fbbac2811e4906479d1a335885a55ea1b875659d870bc064
SHA5120310991ddf36481d80a44c3d6ab2bcd984ba96e2ecc4c7fda34617866d759c348b2b533c065c15de2f482028a0d4bbcf731a4bc428fbbceeea95d11ec4f32c5a
-
Filesize
16KB
MD5596e04282e3a029549517d998b641bc9
SHA137695102540deddbc8f076ebf9e593cafad73ad3
SHA256c6d07a2afcc66999fbbac2811e4906479d1a335885a55ea1b875659d870bc064
SHA5120310991ddf36481d80a44c3d6ab2bcd984ba96e2ecc4c7fda34617866d759c348b2b533c065c15de2f482028a0d4bbcf731a4bc428fbbceeea95d11ec4f32c5a
-
Filesize
172KB
MD5280e3d90429c5c8d55a789259f8fa871
SHA12e9cfc0588c66d9cd26439a08220477a143c150e
SHA256b9cfa34b4f4b6a23100877dba2cf134a4bd996e0d758e91087fa6a108ad6ba74
SHA51285a4ab17c5a15d5ca72d3946f6a8d970636eeaa3633d3c23f53662dd42e38ac0dbf7d4d9579228810de63adfa7e0540ea9aeff0cdba7c7cf7567952e83dd5679
-
Filesize
172KB
MD5280e3d90429c5c8d55a789259f8fa871
SHA12e9cfc0588c66d9cd26439a08220477a143c150e
SHA256b9cfa34b4f4b6a23100877dba2cf134a4bd996e0d758e91087fa6a108ad6ba74
SHA51285a4ab17c5a15d5ca72d3946f6a8d970636eeaa3633d3c23f53662dd42e38ac0dbf7d4d9579228810de63adfa7e0540ea9aeff0cdba7c7cf7567952e83dd5679