Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2023, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
664c16bc42dde4a5662314b15bc05609.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
664c16bc42dde4a5662314b15bc05609.exe
Resource
win10v2004-20230703-en
General
-
Target
664c16bc42dde4a5662314b15bc05609.exe
-
Size
559KB
-
MD5
664c16bc42dde4a5662314b15bc05609
-
SHA1
ba5345e96de6afde838b500943998a8cc6fa1fec
-
SHA256
9e1a977f3db2ef35b86d3cdc89b7cc366ad93c6648db0ba80defaacb3aabe90f
-
SHA512
b07f28c17e1ed8aed1de54d8a6beebd0ce6d905e941c29e8b5b240f0acab7c307a148346dbed495e231e25ea235bd55efea5665c5e1a79646fd1e097e4a15cf4
-
SSDEEP
12288:UMrIy9010SQL/W4EFc0MlL7K2zyYlgi1jzH6uq/vR0UP:cyw01L/Etu/K2yggojzHyHR0UP
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000700000002320e-152.dat healer behavioral2/files/0x000700000002320e-153.dat healer behavioral2/memory/1780-154-0x0000000000550000-0x000000000055A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p3648728.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p3648728.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p3648728.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p3648728.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p3648728.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p3648728.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 412 z6224939.exe 552 z9827685.exe 1780 p3648728.exe 3632 r5651385.exe 2972 legosa.exe 1248 s6534222.exe 976 legosa.exe 3200 legosa.exe -
Loads dropped DLL 1 IoCs
pid Process 1436 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p3648728.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6224939.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9827685.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 664c16bc42dde4a5662314b15bc05609.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2172 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1780 p3648728.exe 1780 p3648728.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1780 p3648728.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4392 wrote to memory of 412 4392 664c16bc42dde4a5662314b15bc05609.exe 83 PID 4392 wrote to memory of 412 4392 664c16bc42dde4a5662314b15bc05609.exe 83 PID 4392 wrote to memory of 412 4392 664c16bc42dde4a5662314b15bc05609.exe 83 PID 412 wrote to memory of 552 412 z6224939.exe 84 PID 412 wrote to memory of 552 412 z6224939.exe 84 PID 412 wrote to memory of 552 412 z6224939.exe 84 PID 552 wrote to memory of 1780 552 z9827685.exe 85 PID 552 wrote to memory of 1780 552 z9827685.exe 85 PID 552 wrote to memory of 3632 552 z9827685.exe 97 PID 552 wrote to memory of 3632 552 z9827685.exe 97 PID 552 wrote to memory of 3632 552 z9827685.exe 97 PID 3632 wrote to memory of 2972 3632 r5651385.exe 100 PID 3632 wrote to memory of 2972 3632 r5651385.exe 100 PID 3632 wrote to memory of 2972 3632 r5651385.exe 100 PID 412 wrote to memory of 1248 412 z6224939.exe 101 PID 412 wrote to memory of 1248 412 z6224939.exe 101 PID 412 wrote to memory of 1248 412 z6224939.exe 101 PID 2972 wrote to memory of 2172 2972 legosa.exe 102 PID 2972 wrote to memory of 2172 2972 legosa.exe 102 PID 2972 wrote to memory of 2172 2972 legosa.exe 102 PID 2972 wrote to memory of 5052 2972 legosa.exe 104 PID 2972 wrote to memory of 5052 2972 legosa.exe 104 PID 2972 wrote to memory of 5052 2972 legosa.exe 104 PID 5052 wrote to memory of 452 5052 cmd.exe 107 PID 5052 wrote to memory of 452 5052 cmd.exe 107 PID 5052 wrote to memory of 452 5052 cmd.exe 107 PID 5052 wrote to memory of 1804 5052 cmd.exe 106 PID 5052 wrote to memory of 1804 5052 cmd.exe 106 PID 5052 wrote to memory of 1804 5052 cmd.exe 106 PID 5052 wrote to memory of 3844 5052 cmd.exe 108 PID 5052 wrote to memory of 3844 5052 cmd.exe 108 PID 5052 wrote to memory of 3844 5052 cmd.exe 108 PID 5052 wrote to memory of 656 5052 cmd.exe 109 PID 5052 wrote to memory of 656 5052 cmd.exe 109 PID 5052 wrote to memory of 656 5052 cmd.exe 109 PID 5052 wrote to memory of 8 5052 cmd.exe 110 PID 5052 wrote to memory of 8 5052 cmd.exe 110 PID 5052 wrote to memory of 8 5052 cmd.exe 110 PID 5052 wrote to memory of 4556 5052 cmd.exe 111 PID 5052 wrote to memory of 4556 5052 cmd.exe 111 PID 5052 wrote to memory of 4556 5052 cmd.exe 111 PID 2972 wrote to memory of 1436 2972 legosa.exe 122 PID 2972 wrote to memory of 1436 2972 legosa.exe 122 PID 2972 wrote to memory of 1436 2972 legosa.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\664c16bc42dde4a5662314b15bc05609.exe"C:\Users\Admin\AppData\Local\Temp\664c16bc42dde4a5662314b15bc05609.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6224939.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6224939.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9827685.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9827685.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3648728.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3648728.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r5651385.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r5651385.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legosa.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe" /F6⤵
- Creates scheduled task(s)
PID:2172
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legosa.exe" /P "Admin:N"&&CACLS "legosa.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:N"7⤵PID:1804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:R" /E7⤵PID:3844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:656
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"7⤵PID:8
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E7⤵PID:4556
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1436
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s6534222.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s6534222.exe3⤵
- Executes dropped EXE
PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe1⤵
- Executes dropped EXE
PID:976
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe1⤵
- Executes dropped EXE
PID:3200
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
432KB
MD53e2ecde4129b1fb031c0a715c86b940c
SHA1611cd90b9a67f41e94ab0571937a8f39511aa8f8
SHA256d1379477422bdb1d39bb5b1d18351996132826d9542636cc837e5d81d23a8542
SHA512715cedb37f9c94b5007bcda27fe4479fd54103e09bc54846e5a29ce705bfb841d34ffb63932b79a8ae12ff64c26d89d86c5a3e0a5dc5db9658f8aa48201fa481
-
Filesize
432KB
MD53e2ecde4129b1fb031c0a715c86b940c
SHA1611cd90b9a67f41e94ab0571937a8f39511aa8f8
SHA256d1379477422bdb1d39bb5b1d18351996132826d9542636cc837e5d81d23a8542
SHA512715cedb37f9c94b5007bcda27fe4479fd54103e09bc54846e5a29ce705bfb841d34ffb63932b79a8ae12ff64c26d89d86c5a3e0a5dc5db9658f8aa48201fa481
-
Filesize
176KB
MD5254eb0a88ce97ad932a83702c509b416
SHA15333749f449cade7a81bb44181cb76792f327061
SHA2563456dc63e20e6c7efbf5ef515db831d5b7a5456def00b607394f20aa90430f44
SHA512d58bf290bad2d5228631f50ec384c1c2eef02de30c0d82de482e24d9ccdcd38ded285d45fc9035e0776aa78a18b6cfa399d798500f4390a747421f4d7fcf2559
-
Filesize
176KB
MD5254eb0a88ce97ad932a83702c509b416
SHA15333749f449cade7a81bb44181cb76792f327061
SHA2563456dc63e20e6c7efbf5ef515db831d5b7a5456def00b607394f20aa90430f44
SHA512d58bf290bad2d5228631f50ec384c1c2eef02de30c0d82de482e24d9ccdcd38ded285d45fc9035e0776aa78a18b6cfa399d798500f4390a747421f4d7fcf2559
-
Filesize
277KB
MD5975178c247ca91ba94d4c60550a14108
SHA10d2f51294c07639e6d965c115391f736903496f2
SHA2565f050c9cf1b3b6943660638cc660fc0c84b1c380a8c5c0ad87820806b8165f86
SHA5128a30008ec02ac4c01cdd7c1fca909ff05320a126fbc5e2b3ae1569c3718b33c4974887b8bad52b227310abf5940b445f91bca322126ab205796c752f58b21cf4
-
Filesize
277KB
MD5975178c247ca91ba94d4c60550a14108
SHA10d2f51294c07639e6d965c115391f736903496f2
SHA2565f050c9cf1b3b6943660638cc660fc0c84b1c380a8c5c0ad87820806b8165f86
SHA5128a30008ec02ac4c01cdd7c1fca909ff05320a126fbc5e2b3ae1569c3718b33c4974887b8bad52b227310abf5940b445f91bca322126ab205796c752f58b21cf4
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5