Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2023, 12:05

General

  • Target

    b2d24b231d7f3eed7b517f38077ecb890957c334dda06da0a016caa5a15c6cc9.exe

  • Size

    839KB

  • MD5

    2f0f3501e75807204f2a215c99eff42b

  • SHA1

    d5b2da2d56009801643eace5069ff77b8419cee6

  • SHA256

    b2d24b231d7f3eed7b517f38077ecb890957c334dda06da0a016caa5a15c6cc9

  • SHA512

    01fc9ff907ece489d7f307197a2b2d1dd53ff15a3d6b33fbf8a349bea4ce88d4cce9fc582932eb5d1f45219d0011285a6c5bc72798f08e551a9c69a346901f9a

  • SSDEEP

    24576:1ymZ+HfQSeDGLM0r++UkHLgemkHlSN0AxxUd:QmZORJL3ZH8etlSN1xx

Malware Config

Extracted

Family

redline

Botnet

lang

C2

77.91.124.73:19071

Attributes
  • auth_value

    92c0fc2b7a8b3fc5a01baa1abf31c42a

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2d24b231d7f3eed7b517f38077ecb890957c334dda06da0a016caa5a15c6cc9.exe
    "C:\Users\Admin\AppData\Local\Temp\b2d24b231d7f3eed7b517f38077ecb890957c334dda06da0a016caa5a15c6cc9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5667548.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5667548.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3662853.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3662853.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4136
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9856061.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9856061.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3872
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6173771.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6173771.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:368
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6667273.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6667273.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2188
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3197717.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3197717.exe
              6⤵
              • Executes dropped EXE
              PID:3464
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2293038.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2293038.exe
            5⤵
            • Executes dropped EXE
            PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5667548.exe

    Filesize

    723KB

    MD5

    f8bc0162c0724e294a91642269655e01

    SHA1

    6a5df91b26daa87430edb4373ceb2829688254a9

    SHA256

    a59c8a8f35de21e25d6a6e0f84bb3ca43f5aba70aefe464212b3c18d3bd24b94

    SHA512

    c23833a41850c79af8f797d93578da6e62f9e1f428b601b051aa4558db7f81cc6acfed8103db66337a4832a47b5873f8ef90e2cb4a01c63c19e099a7532d2c1f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5667548.exe

    Filesize

    723KB

    MD5

    f8bc0162c0724e294a91642269655e01

    SHA1

    6a5df91b26daa87430edb4373ceb2829688254a9

    SHA256

    a59c8a8f35de21e25d6a6e0f84bb3ca43f5aba70aefe464212b3c18d3bd24b94

    SHA512

    c23833a41850c79af8f797d93578da6e62f9e1f428b601b051aa4558db7f81cc6acfed8103db66337a4832a47b5873f8ef90e2cb4a01c63c19e099a7532d2c1f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3662853.exe

    Filesize

    497KB

    MD5

    21ed9cbf0b0324514ecd89ae7c54b3ba

    SHA1

    8a78a165958951d56a7a0300f0ecc6d93e2813e9

    SHA256

    f962da10754ea48555cad98f74f771d3c68dae832fb2c5a8c3cce181b1dc0df3

    SHA512

    304683e59eec078bc490901e3db250243e24e8b2292f5ce1095241aae0e3760a26414ff582fad2b169d4e4522db25a846f0dd3db9bc0ca111d2236ad55d53563

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3662853.exe

    Filesize

    497KB

    MD5

    21ed9cbf0b0324514ecd89ae7c54b3ba

    SHA1

    8a78a165958951d56a7a0300f0ecc6d93e2813e9

    SHA256

    f962da10754ea48555cad98f74f771d3c68dae832fb2c5a8c3cce181b1dc0df3

    SHA512

    304683e59eec078bc490901e3db250243e24e8b2292f5ce1095241aae0e3760a26414ff582fad2b169d4e4522db25a846f0dd3db9bc0ca111d2236ad55d53563

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9856061.exe

    Filesize

    373KB

    MD5

    6a05ebbb35c3bb4da7b7eff9da307634

    SHA1

    9751302e3d4198f058ddbdd08d25bbec5cbeb5fe

    SHA256

    90031ba416e6e7b8e98193b280e57c0691ba32a7b92fb9bc18ce1fa98f7bed68

    SHA512

    8253beda674fcf4dcc8d1f818d4b0d15586fac3076e155e11a6e9656efcfeb298cb83ffdbaee031ec7f189f6499bc6571a684acde7ab1178590ce4a4dfceecf2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9856061.exe

    Filesize

    373KB

    MD5

    6a05ebbb35c3bb4da7b7eff9da307634

    SHA1

    9751302e3d4198f058ddbdd08d25bbec5cbeb5fe

    SHA256

    90031ba416e6e7b8e98193b280e57c0691ba32a7b92fb9bc18ce1fa98f7bed68

    SHA512

    8253beda674fcf4dcc8d1f818d4b0d15586fac3076e155e11a6e9656efcfeb298cb83ffdbaee031ec7f189f6499bc6571a684acde7ab1178590ce4a4dfceecf2

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2293038.exe

    Filesize

    174KB

    MD5

    e892a81068f3297be0614557df31f6f0

    SHA1

    b94d76ab1ed5428b6da4305d504b5090834d13c3

    SHA256

    2ea8e50c90aa064c9cccc5a501ebebb52d19c30404132a813a1d463815360153

    SHA512

    93e4d58a0219c8174a0abc94ec3b1370de1b6ed401cb3d044d11a29cce4743629cffb88407d62e99876255bc1dd6468d7d3c9970ca9e35692bdcb4e4448def6f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2293038.exe

    Filesize

    174KB

    MD5

    e892a81068f3297be0614557df31f6f0

    SHA1

    b94d76ab1ed5428b6da4305d504b5090834d13c3

    SHA256

    2ea8e50c90aa064c9cccc5a501ebebb52d19c30404132a813a1d463815360153

    SHA512

    93e4d58a0219c8174a0abc94ec3b1370de1b6ed401cb3d044d11a29cce4743629cffb88407d62e99876255bc1dd6468d7d3c9970ca9e35692bdcb4e4448def6f

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6173771.exe

    Filesize

    216KB

    MD5

    29c8f36969dd2abb81da78c20dbac0d4

    SHA1

    c6b1691b9b87e5b6cb15a04a6535698fa85ba373

    SHA256

    75aab9cf127ed4fbb7447a63cd519afd95aaf2b0019ef27c2ae6a200ea88de95

    SHA512

    e2c013464cd8742d033ffc0ef8d174bd99a51abb9b0b535f644882db1fd1fb05ff9af4ff5c7461c14d9b7f63e74638ffbdabdcbc4f0b8531480ea2728d0dfb40

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6173771.exe

    Filesize

    216KB

    MD5

    29c8f36969dd2abb81da78c20dbac0d4

    SHA1

    c6b1691b9b87e5b6cb15a04a6535698fa85ba373

    SHA256

    75aab9cf127ed4fbb7447a63cd519afd95aaf2b0019ef27c2ae6a200ea88de95

    SHA512

    e2c013464cd8742d033ffc0ef8d174bd99a51abb9b0b535f644882db1fd1fb05ff9af4ff5c7461c14d9b7f63e74638ffbdabdcbc4f0b8531480ea2728d0dfb40

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6667273.exe

    Filesize

    11KB

    MD5

    11a8335b9a735da66bfdc28e0b864cb3

    SHA1

    689d6617916bd4581abde04bc79932efa3613d86

    SHA256

    d7d8bddc6c6e500d5a6562d7ea5d79849939251bcb26f1adc47475c62dbbf86a

    SHA512

    7983a27d1204aebb8800a7002a42a4137d4944977b40608710a564889fb5fd6b0acffe91ac7096e5beb75dc910d129d6a5377e3ec52231980c2e55acbcaa4e15

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6667273.exe

    Filesize

    11KB

    MD5

    11a8335b9a735da66bfdc28e0b864cb3

    SHA1

    689d6617916bd4581abde04bc79932efa3613d86

    SHA256

    d7d8bddc6c6e500d5a6562d7ea5d79849939251bcb26f1adc47475c62dbbf86a

    SHA512

    7983a27d1204aebb8800a7002a42a4137d4944977b40608710a564889fb5fd6b0acffe91ac7096e5beb75dc910d129d6a5377e3ec52231980c2e55acbcaa4e15

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3197717.exe

    Filesize

    140KB

    MD5

    a4c518916bff0e4a5cb6bebd979767c8

    SHA1

    3fd6ff3b5a1a51f6e7729a318b01ef39cc333225

    SHA256

    fabd8473be8fda75544976d788d590747c924f97613c3140f0ff4480adedb8b6

    SHA512

    1065469cfb13cfbb1cb4a879bd6cfd0dc8b6eecd1847099e2ea02dd66619a5a3d2615e6543b0e079b9ed41d8a68f9e93a286252ca99217f56a2dc816dc2e6882

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3197717.exe

    Filesize

    140KB

    MD5

    a4c518916bff0e4a5cb6bebd979767c8

    SHA1

    3fd6ff3b5a1a51f6e7729a318b01ef39cc333225

    SHA256

    fabd8473be8fda75544976d788d590747c924f97613c3140f0ff4480adedb8b6

    SHA512

    1065469cfb13cfbb1cb4a879bd6cfd0dc8b6eecd1847099e2ea02dd66619a5a3d2615e6543b0e079b9ed41d8a68f9e93a286252ca99217f56a2dc816dc2e6882

  • memory/2096-178-0x0000000074160000-0x0000000074910000-memory.dmp

    Filesize

    7.7MB

  • memory/2096-179-0x00000000000E0000-0x0000000000110000-memory.dmp

    Filesize

    192KB

  • memory/2096-180-0x0000000005160000-0x0000000005778000-memory.dmp

    Filesize

    6.1MB

  • memory/2096-181-0x0000000004C70000-0x0000000004D7A000-memory.dmp

    Filesize

    1.0MB

  • memory/2096-182-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/2096-183-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

    Filesize

    72KB

  • memory/2096-184-0x0000000004C10000-0x0000000004C4C000-memory.dmp

    Filesize

    240KB

  • memory/2096-185-0x0000000074160000-0x0000000074910000-memory.dmp

    Filesize

    7.7MB

  • memory/2096-186-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/2188-171-0x00007FF901FB0000-0x00007FF902A71000-memory.dmp

    Filesize

    10.8MB

  • memory/2188-169-0x00007FF901FB0000-0x00007FF902A71000-memory.dmp

    Filesize

    10.8MB

  • memory/2188-168-0x0000000000FC0000-0x0000000000FCA000-memory.dmp

    Filesize

    40KB