Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
093a61458849781533493401f3ce15aaf4710b6a55f76ed8fedc9075ec58b700.exe
Resource
win10v2004-20230703-en
General
-
Target
093a61458849781533493401f3ce15aaf4710b6a55f76ed8fedc9075ec58b700.exe
-
Size
826KB
-
MD5
18405c37f6af9d0c4457645db5930eaf
-
SHA1
60cfd3530b05e8dec2227ef3e7ddb7749971f335
-
SHA256
093a61458849781533493401f3ce15aaf4710b6a55f76ed8fedc9075ec58b700
-
SHA512
7e2ca74cc496c473764cb3e413bf58d97166609f8cb70291885f3ef0509cd4dcc460e96086e9920adcc90454cd5b8b34bf2abed098c649586362720c49917082
-
SSDEEP
12288:HMr6y90ijUtjpRLIKXU1HHcDeNZSN6gotS0RkWqer12xrwa8gi4JSt4:JyojpBIKUHcDyAN6LBkR81awXK64
Malware Config
Extracted
redline
rwan
77.91.124.73:19071
-
auth_value
7c40eda5da4f888d6f61befbf947d9fe
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002323a-33.dat healer behavioral1/files/0x000700000002323a-34.dat healer behavioral1/memory/4800-35-0x0000000000300000-0x000000000030A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5478702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5478702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5478702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5478702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5478702.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5478702.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2804 v8635287.exe 4828 v8392205.exe 2212 v1047836.exe 4612 v3219871.exe 4800 a5478702.exe 4664 b5004766.exe 464 c3802492.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5478702.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 093a61458849781533493401f3ce15aaf4710b6a55f76ed8fedc9075ec58b700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8635287.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8392205.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1047836.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v3219871.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4800 a5478702.exe 4800 a5478702.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4800 a5478702.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2804 2236 093a61458849781533493401f3ce15aaf4710b6a55f76ed8fedc9075ec58b700.exe 81 PID 2236 wrote to memory of 2804 2236 093a61458849781533493401f3ce15aaf4710b6a55f76ed8fedc9075ec58b700.exe 81 PID 2236 wrote to memory of 2804 2236 093a61458849781533493401f3ce15aaf4710b6a55f76ed8fedc9075ec58b700.exe 81 PID 2804 wrote to memory of 4828 2804 v8635287.exe 82 PID 2804 wrote to memory of 4828 2804 v8635287.exe 82 PID 2804 wrote to memory of 4828 2804 v8635287.exe 82 PID 4828 wrote to memory of 2212 4828 v8392205.exe 83 PID 4828 wrote to memory of 2212 4828 v8392205.exe 83 PID 4828 wrote to memory of 2212 4828 v8392205.exe 83 PID 2212 wrote to memory of 4612 2212 v1047836.exe 84 PID 2212 wrote to memory of 4612 2212 v1047836.exe 84 PID 2212 wrote to memory of 4612 2212 v1047836.exe 84 PID 4612 wrote to memory of 4800 4612 v3219871.exe 85 PID 4612 wrote to memory of 4800 4612 v3219871.exe 85 PID 4612 wrote to memory of 4664 4612 v3219871.exe 87 PID 4612 wrote to memory of 4664 4612 v3219871.exe 87 PID 4612 wrote to memory of 4664 4612 v3219871.exe 87 PID 2212 wrote to memory of 464 2212 v1047836.exe 89 PID 2212 wrote to memory of 464 2212 v1047836.exe 89 PID 2212 wrote to memory of 464 2212 v1047836.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\093a61458849781533493401f3ce15aaf4710b6a55f76ed8fedc9075ec58b700.exe"C:\Users\Admin\AppData\Local\Temp\093a61458849781533493401f3ce15aaf4710b6a55f76ed8fedc9075ec58b700.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8635287.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8635287.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8392205.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8392205.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1047836.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1047836.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3219871.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3219871.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5478702.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5478702.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5004766.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5004766.exe6⤵
- Executes dropped EXE
PID:4664
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3802492.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c3802492.exe5⤵
- Executes dropped EXE
PID:464
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720KB
MD5d4157fb4d7931190fd6c039be2e65099
SHA18a7faaa7c18ee03557cabe356b2bc8ecdaaa0aa6
SHA2560179afd1e2a4e3be0524dcfbcd5979760f59f6ebdb4d9391bba8728d9b6c3443
SHA51260e0549a32a62b02f3c6f8a089b0f4aa7069eb62cc419c5036dcaa93eeae07abdc7414ce562cac8e83c551dd403eb6617916a75446658a1b26768aac1bfeebb1
-
Filesize
720KB
MD5d4157fb4d7931190fd6c039be2e65099
SHA18a7faaa7c18ee03557cabe356b2bc8ecdaaa0aa6
SHA2560179afd1e2a4e3be0524dcfbcd5979760f59f6ebdb4d9391bba8728d9b6c3443
SHA51260e0549a32a62b02f3c6f8a089b0f4aa7069eb62cc419c5036dcaa93eeae07abdc7414ce562cac8e83c551dd403eb6617916a75446658a1b26768aac1bfeebb1
-
Filesize
497KB
MD50aa745cd02790673e5e1596ac2dedeaa
SHA15db7c20327e32002255a4c35e5b9d451456c61f0
SHA2565eb3e3f5bb6596962888cb547255df0f344971d0aef45dd059c62e4ad0641909
SHA512a89299afe80e976312875175849a90cd4b9f62a14e13cbb3337763883df12b01e31b77dd945c7a258b1dc9def08bf3d4d12febed0f0f2c3404e5fbe1686487ce
-
Filesize
497KB
MD50aa745cd02790673e5e1596ac2dedeaa
SHA15db7c20327e32002255a4c35e5b9d451456c61f0
SHA2565eb3e3f5bb6596962888cb547255df0f344971d0aef45dd059c62e4ad0641909
SHA512a89299afe80e976312875175849a90cd4b9f62a14e13cbb3337763883df12b01e31b77dd945c7a258b1dc9def08bf3d4d12febed0f0f2c3404e5fbe1686487ce
-
Filesize
373KB
MD51674cc4890c31a4c4cead62e01b40436
SHA15af8cbd460d08fd5d6212ed3d694f50de9008681
SHA25604228324fbe8c9c96ba46dd6d16fdc3f81ff56fab6734ae4f5b9ab4ebcec0ae4
SHA51232d567af6a2d08f339ae7e760e3c691612c26e0532e915e3fe5a167758606d9397f42fa9717d226f65ddab8bfb4c12864abbe7fad7bae34a09e4e637106da0ef
-
Filesize
373KB
MD51674cc4890c31a4c4cead62e01b40436
SHA15af8cbd460d08fd5d6212ed3d694f50de9008681
SHA25604228324fbe8c9c96ba46dd6d16fdc3f81ff56fab6734ae4f5b9ab4ebcec0ae4
SHA51232d567af6a2d08f339ae7e760e3c691612c26e0532e915e3fe5a167758606d9397f42fa9717d226f65ddab8bfb4c12864abbe7fad7bae34a09e4e637106da0ef
-
Filesize
174KB
MD51c9e224f3a921352efa8d4dfdbdead7a
SHA1e10f8d2d43fcd8aed723c7afe75bc8bdb82c6909
SHA256b6b9d5a1e08a3336bafffae344eb7ce0cb64340977083fd95305bb98816e4f19
SHA5125523de8af3673d3f7fb343f51cd84729878e15ce28784f4773df6c5a65030241cabce7b42920bd169397e5581f9e66b5fb6d71d82524300da9454afa95c8f89e
-
Filesize
174KB
MD51c9e224f3a921352efa8d4dfdbdead7a
SHA1e10f8d2d43fcd8aed723c7afe75bc8bdb82c6909
SHA256b6b9d5a1e08a3336bafffae344eb7ce0cb64340977083fd95305bb98816e4f19
SHA5125523de8af3673d3f7fb343f51cd84729878e15ce28784f4773df6c5a65030241cabce7b42920bd169397e5581f9e66b5fb6d71d82524300da9454afa95c8f89e
-
Filesize
217KB
MD58cd4f99076f1c9ab4a69d53dae634e52
SHA185ab21ba971a60b70fa172e42294f30f322062c9
SHA25687fe8bd64b45033f75517a88c7902b3fcea4365cc9ccd26fda09652d202de9d1
SHA512ab6ad186957180a6678a8fdf821e24ffd1d2425a9493e15c59580e822f9bb43ec75c5341891aab1ee77635a39dcb0e4b6b8fb68638c19d962339acfdec0796dc
-
Filesize
217KB
MD58cd4f99076f1c9ab4a69d53dae634e52
SHA185ab21ba971a60b70fa172e42294f30f322062c9
SHA25687fe8bd64b45033f75517a88c7902b3fcea4365cc9ccd26fda09652d202de9d1
SHA512ab6ad186957180a6678a8fdf821e24ffd1d2425a9493e15c59580e822f9bb43ec75c5341891aab1ee77635a39dcb0e4b6b8fb68638c19d962339acfdec0796dc
-
Filesize
13KB
MD5d7a739effe6f2d78c910302700c5e1d4
SHA15812c5c752638b6f52072d50358100995b84d8f6
SHA25641f26592914b9ef6fd89e307ef1ead21bcee92bd9f8c8f729eb76ca7b808e3b9
SHA5129a03b220410a233087595cdb70bb3548022c3d736dcff4beed5c93961105e713984b02a59cebb35c9815217c2659afddfb40f7a249b566fd18380ccd113dc897
-
Filesize
13KB
MD5d7a739effe6f2d78c910302700c5e1d4
SHA15812c5c752638b6f52072d50358100995b84d8f6
SHA25641f26592914b9ef6fd89e307ef1ead21bcee92bd9f8c8f729eb76ca7b808e3b9
SHA5129a03b220410a233087595cdb70bb3548022c3d736dcff4beed5c93961105e713984b02a59cebb35c9815217c2659afddfb40f7a249b566fd18380ccd113dc897
-
Filesize
140KB
MD5bc75d6dbe640a84901eecdb6555e566b
SHA13aed1df9476d78facbbcdaf2f4949406e7591c5a
SHA256070c65006945d73db616b4ccdc34716f44bf669d4a0218daf08ca3015efd27a0
SHA512a65ffc863ab57fcfeaa78c5bde8a98a248115ae7329b37e792c8008474e98fcb3696d8683b4dfaac19503f16f2e959a07d0a3e6ef58811eaf9345a38c97a0882
-
Filesize
140KB
MD5bc75d6dbe640a84901eecdb6555e566b
SHA13aed1df9476d78facbbcdaf2f4949406e7591c5a
SHA256070c65006945d73db616b4ccdc34716f44bf669d4a0218daf08ca3015efd27a0
SHA512a65ffc863ab57fcfeaa78c5bde8a98a248115ae7329b37e792c8008474e98fcb3696d8683b4dfaac19503f16f2e959a07d0a3e6ef58811eaf9345a38c97a0882