Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
22/08/2023, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
0118cf76a452338737c7fc4c4d1e63a781671ad4084e4d64da1291763654b571.exe
Resource
win10-20230703-en
General
-
Target
0118cf76a452338737c7fc4c4d1e63a781671ad4084e4d64da1291763654b571.exe
-
Size
715KB
-
MD5
b2de32d9e9f2fa7cab361479c055cbd0
-
SHA1
d856c66d5ca730daa06d91bcd0153517864a1f76
-
SHA256
0118cf76a452338737c7fc4c4d1e63a781671ad4084e4d64da1291763654b571
-
SHA512
e55484008d986465819911889392cffdf446ffbcd60348ee4f0edfd797edf9788bc1334873a5db6feea1772d5e9ed859e6e7e65d272e3dc815c613565b038839
-
SSDEEP
12288:yMrny90cm8rA3xZZjOWYQ9ZbAWjDucfAC4f2ZHwpqxd7u/r2B3BG5c:NyVtAZKahAIAC4f2ZHQi7uz2hBmc
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
piter
77.91.124.73:19071
-
auth_value
7f92ff466423bb35edbfbc22f78b0bb9
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afed-146.dat healer behavioral1/files/0x000700000001afed-147.dat healer behavioral1/memory/4204-148-0x00000000006E0000-0x00000000006EA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g8245851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g8245851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g8245851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g8245851.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g8245851.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 216 x8259051.exe 1256 x1210085.exe 4960 x9249231.exe 4204 g8245851.exe 4788 h8321370.exe 3068 saves.exe 3196 i1534237.exe 3420 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1004 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g8245851.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0118cf76a452338737c7fc4c4d1e63a781671ad4084e4d64da1291763654b571.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8259051.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1210085.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9249231.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4432 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4204 g8245851.exe 4204 g8245851.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4204 g8245851.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4924 wrote to memory of 216 4924 0118cf76a452338737c7fc4c4d1e63a781671ad4084e4d64da1291763654b571.exe 70 PID 4924 wrote to memory of 216 4924 0118cf76a452338737c7fc4c4d1e63a781671ad4084e4d64da1291763654b571.exe 70 PID 4924 wrote to memory of 216 4924 0118cf76a452338737c7fc4c4d1e63a781671ad4084e4d64da1291763654b571.exe 70 PID 216 wrote to memory of 1256 216 x8259051.exe 71 PID 216 wrote to memory of 1256 216 x8259051.exe 71 PID 216 wrote to memory of 1256 216 x8259051.exe 71 PID 1256 wrote to memory of 4960 1256 x1210085.exe 72 PID 1256 wrote to memory of 4960 1256 x1210085.exe 72 PID 1256 wrote to memory of 4960 1256 x1210085.exe 72 PID 4960 wrote to memory of 4204 4960 x9249231.exe 73 PID 4960 wrote to memory of 4204 4960 x9249231.exe 73 PID 4960 wrote to memory of 4788 4960 x9249231.exe 74 PID 4960 wrote to memory of 4788 4960 x9249231.exe 74 PID 4960 wrote to memory of 4788 4960 x9249231.exe 74 PID 4788 wrote to memory of 3068 4788 h8321370.exe 75 PID 4788 wrote to memory of 3068 4788 h8321370.exe 75 PID 4788 wrote to memory of 3068 4788 h8321370.exe 75 PID 1256 wrote to memory of 3196 1256 x1210085.exe 76 PID 1256 wrote to memory of 3196 1256 x1210085.exe 76 PID 1256 wrote to memory of 3196 1256 x1210085.exe 76 PID 3068 wrote to memory of 4432 3068 saves.exe 77 PID 3068 wrote to memory of 4432 3068 saves.exe 77 PID 3068 wrote to memory of 4432 3068 saves.exe 77 PID 3068 wrote to memory of 4648 3068 saves.exe 78 PID 3068 wrote to memory of 4648 3068 saves.exe 78 PID 3068 wrote to memory of 4648 3068 saves.exe 78 PID 4648 wrote to memory of 2568 4648 cmd.exe 81 PID 4648 wrote to memory of 2568 4648 cmd.exe 81 PID 4648 wrote to memory of 2568 4648 cmd.exe 81 PID 4648 wrote to memory of 3332 4648 cmd.exe 82 PID 4648 wrote to memory of 3332 4648 cmd.exe 82 PID 4648 wrote to memory of 3332 4648 cmd.exe 82 PID 4648 wrote to memory of 4100 4648 cmd.exe 83 PID 4648 wrote to memory of 4100 4648 cmd.exe 83 PID 4648 wrote to memory of 4100 4648 cmd.exe 83 PID 4648 wrote to memory of 1540 4648 cmd.exe 84 PID 4648 wrote to memory of 1540 4648 cmd.exe 84 PID 4648 wrote to memory of 1540 4648 cmd.exe 84 PID 4648 wrote to memory of 5112 4648 cmd.exe 85 PID 4648 wrote to memory of 5112 4648 cmd.exe 85 PID 4648 wrote to memory of 5112 4648 cmd.exe 85 PID 4648 wrote to memory of 1184 4648 cmd.exe 86 PID 4648 wrote to memory of 1184 4648 cmd.exe 86 PID 4648 wrote to memory of 1184 4648 cmd.exe 86 PID 3068 wrote to memory of 1004 3068 saves.exe 88 PID 3068 wrote to memory of 1004 3068 saves.exe 88 PID 3068 wrote to memory of 1004 3068 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0118cf76a452338737c7fc4c4d1e63a781671ad4084e4d64da1291763654b571.exe"C:\Users\Admin\AppData\Local\Temp\0118cf76a452338737c7fc4c4d1e63a781671ad4084e4d64da1291763654b571.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8259051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8259051.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1210085.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1210085.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9249231.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9249231.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8245851.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8245851.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8321370.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8321370.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2568
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1540
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:5112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1184
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1004
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1534237.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1534237.exe4⤵
- Executes dropped EXE
PID:3196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3420
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5fb465562afb2a2cabddb8de9076c9409
SHA1b16dcedc3832b0e4d83be93dc47446d9ac942972
SHA256b81c1e3e4351287651bce14930efc62706a0df80d97795cfb530c7edf85085ae
SHA512436f11aa2ef7a2096746aa1061009ff7c796686d3979340013d4cac36b436f4817cf6ba73d2d4de69b48bb1e2bd51838c6e8abab261c244166882f9bc3229411
-
Filesize
599KB
MD5fb465562afb2a2cabddb8de9076c9409
SHA1b16dcedc3832b0e4d83be93dc47446d9ac942972
SHA256b81c1e3e4351287651bce14930efc62706a0df80d97795cfb530c7edf85085ae
SHA512436f11aa2ef7a2096746aa1061009ff7c796686d3979340013d4cac36b436f4817cf6ba73d2d4de69b48bb1e2bd51838c6e8abab261c244166882f9bc3229411
-
Filesize
433KB
MD5b15cbfcbe3a1891df773a180cc77a327
SHA182931b014b657f0918b80f793c6475d6401da561
SHA256ffd66c4e3ed0cce406dff745fbffcd0070df2063f399e65da883abaa3379563c
SHA5129ca34d60f109e823352fee54bf7eb4bd76fa806431850490cd85f94bc1c1984a932d27ed5181f0c421589d83ca36d099b592eb3c85c5b870a55ca334b40f4c0e
-
Filesize
433KB
MD5b15cbfcbe3a1891df773a180cc77a327
SHA182931b014b657f0918b80f793c6475d6401da561
SHA256ffd66c4e3ed0cce406dff745fbffcd0070df2063f399e65da883abaa3379563c
SHA5129ca34d60f109e823352fee54bf7eb4bd76fa806431850490cd85f94bc1c1984a932d27ed5181f0c421589d83ca36d099b592eb3c85c5b870a55ca334b40f4c0e
-
Filesize
174KB
MD5f673cd0cef28d0573dd055920c49186c
SHA1a19cb85ab6a061d9e6c6077d6f3fbb715afd029d
SHA256cbb623f0f283d2cc8efc039b73500df2c5ec1e654935fbb59d5b0c58701ef1ae
SHA512a19d5f7268ddd086124483d77f82a7f8cd215d5711e8b980ca12961553d50f3d535ab9ea5d6af39cd7b6e324747605b1336e745a4a95fd0c71cdab7096a58310
-
Filesize
174KB
MD5f673cd0cef28d0573dd055920c49186c
SHA1a19cb85ab6a061d9e6c6077d6f3fbb715afd029d
SHA256cbb623f0f283d2cc8efc039b73500df2c5ec1e654935fbb59d5b0c58701ef1ae
SHA512a19d5f7268ddd086124483d77f82a7f8cd215d5711e8b980ca12961553d50f3d535ab9ea5d6af39cd7b6e324747605b1336e745a4a95fd0c71cdab7096a58310
-
Filesize
277KB
MD5aa5f5471bdaf781a164e7ace368b9458
SHA18b1cfc89cf8c9e01ae3cb23216f4fb69f6876dc4
SHA25639aaaa589d3643d5f461a25ba62795650ada5290d7e48cfca09d2162878a022d
SHA51228b84fb0825f07d8a7f1df5854a39b5122bd9c3b12bfd523c27d8adaabf41d512690e0209b083798b08866dc00d9bd67ff44bcf9bab59bc769e2e84e835c8d57
-
Filesize
277KB
MD5aa5f5471bdaf781a164e7ace368b9458
SHA18b1cfc89cf8c9e01ae3cb23216f4fb69f6876dc4
SHA25639aaaa589d3643d5f461a25ba62795650ada5290d7e48cfca09d2162878a022d
SHA51228b84fb0825f07d8a7f1df5854a39b5122bd9c3b12bfd523c27d8adaabf41d512690e0209b083798b08866dc00d9bd67ff44bcf9bab59bc769e2e84e835c8d57
-
Filesize
11KB
MD5e247698ab45ca80c7301c0fef8603848
SHA1ad976e53474c2d228955bd0ac0933979c1f0989e
SHA256a675e5670c02d1a2e33d921720681943bbbe58deb477173160786d4a33b32ed5
SHA5122cdeb7d9a2dc29ae32fb6bea5f2d58d605033544fade30376c200251af225c03ffa2bdf078348e534dc36d2cad3ed6c7185cc9795167cf0c45a7298d213a975d
-
Filesize
11KB
MD5e247698ab45ca80c7301c0fef8603848
SHA1ad976e53474c2d228955bd0ac0933979c1f0989e
SHA256a675e5670c02d1a2e33d921720681943bbbe58deb477173160786d4a33b32ed5
SHA5122cdeb7d9a2dc29ae32fb6bea5f2d58d605033544fade30376c200251af225c03ffa2bdf078348e534dc36d2cad3ed6c7185cc9795167cf0c45a7298d213a975d
-
Filesize
315KB
MD5d379e35467907d132d30b92440b959ff
SHA1c87f29c9dadf53e2551ac811a0e9658b3e3c2e4c
SHA25683e50984285015665dcf66ec5c1f497c939a35edb624428899ee2bf4de70936a
SHA512ad5c2e54e64cb2dab7f760ff787eb95a6bc9e3a13c90274d2330b2ffe451d2a90c9895cbcee0d68784e75188d1f4dc97c0ad76ad238ca99290948448f586db96
-
Filesize
315KB
MD5d379e35467907d132d30b92440b959ff
SHA1c87f29c9dadf53e2551ac811a0e9658b3e3c2e4c
SHA25683e50984285015665dcf66ec5c1f497c939a35edb624428899ee2bf4de70936a
SHA512ad5c2e54e64cb2dab7f760ff787eb95a6bc9e3a13c90274d2330b2ffe451d2a90c9895cbcee0d68784e75188d1f4dc97c0ad76ad238ca99290948448f586db96
-
Filesize
315KB
MD5d379e35467907d132d30b92440b959ff
SHA1c87f29c9dadf53e2551ac811a0e9658b3e3c2e4c
SHA25683e50984285015665dcf66ec5c1f497c939a35edb624428899ee2bf4de70936a
SHA512ad5c2e54e64cb2dab7f760ff787eb95a6bc9e3a13c90274d2330b2ffe451d2a90c9895cbcee0d68784e75188d1f4dc97c0ad76ad238ca99290948448f586db96
-
Filesize
315KB
MD5d379e35467907d132d30b92440b959ff
SHA1c87f29c9dadf53e2551ac811a0e9658b3e3c2e4c
SHA25683e50984285015665dcf66ec5c1f497c939a35edb624428899ee2bf4de70936a
SHA512ad5c2e54e64cb2dab7f760ff787eb95a6bc9e3a13c90274d2330b2ffe451d2a90c9895cbcee0d68784e75188d1f4dc97c0ad76ad238ca99290948448f586db96
-
Filesize
315KB
MD5d379e35467907d132d30b92440b959ff
SHA1c87f29c9dadf53e2551ac811a0e9658b3e3c2e4c
SHA25683e50984285015665dcf66ec5c1f497c939a35edb624428899ee2bf4de70936a
SHA512ad5c2e54e64cb2dab7f760ff787eb95a6bc9e3a13c90274d2330b2ffe451d2a90c9895cbcee0d68784e75188d1f4dc97c0ad76ad238ca99290948448f586db96
-
Filesize
315KB
MD5d379e35467907d132d30b92440b959ff
SHA1c87f29c9dadf53e2551ac811a0e9658b3e3c2e4c
SHA25683e50984285015665dcf66ec5c1f497c939a35edb624428899ee2bf4de70936a
SHA512ad5c2e54e64cb2dab7f760ff787eb95a6bc9e3a13c90274d2330b2ffe451d2a90c9895cbcee0d68784e75188d1f4dc97c0ad76ad238ca99290948448f586db96
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b