Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
277s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
25/08/2023, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
z4921733.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
z4921733.exe
Resource
win10-20230703-en
General
-
Target
z4921733.exe
-
Size
372KB
-
MD5
3356f0a504f98ebe19bb177856184fbd
-
SHA1
be551871751081f37f458b7bf62656f3dc6ed89d
-
SHA256
04564577997141d823ae97f19f8febb05160bde567c2c1439c74e4d24255ecdd
-
SHA512
5cf27fcf13ed56ad49dff48ea7c8359d81c5ebe641aba8e4a31b4de783a8734770bfd3ca7e3188e3518b39be890bbe74baa90ffbda980c20e833d22428a1f6c6
-
SSDEEP
6144:K3y+bnr+Tp0yN90QESpbj/Pj4BgD2zUcPD+lSLwwvohu5/p8qWlt6lHC4+k0e:ZMr/y90Ij/Pj4aqb9wY8qWl8xCy
Malware Config
Extracted
redline
vaga
77.91.124.73:19071
-
auth_value
393905212ded984248e8e000e612d4fe
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000700000001afe7-12.dat healer behavioral2/files/0x000700000001afe7-13.dat healer behavioral2/memory/4828-14-0x0000000000D20000-0x0000000000D2A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q0556973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q0556973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q0556973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q0556973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q0556973.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4952 z6122764.exe 4828 q0556973.exe 3300 r3006724.exe 4876 s1389380.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q0556973.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" z4921733.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6122764.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4828 q0556973.exe 4828 q0556973.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4828 q0556973.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2956 wrote to memory of 4952 2956 z4921733.exe 70 PID 2956 wrote to memory of 4952 2956 z4921733.exe 70 PID 2956 wrote to memory of 4952 2956 z4921733.exe 70 PID 4952 wrote to memory of 4828 4952 z6122764.exe 71 PID 4952 wrote to memory of 4828 4952 z6122764.exe 71 PID 4952 wrote to memory of 3300 4952 z6122764.exe 72 PID 4952 wrote to memory of 3300 4952 z6122764.exe 72 PID 4952 wrote to memory of 3300 4952 z6122764.exe 72 PID 2956 wrote to memory of 4876 2956 z4921733.exe 73 PID 2956 wrote to memory of 4876 2956 z4921733.exe 73 PID 2956 wrote to memory of 4876 2956 z4921733.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\z4921733.exe"C:\Users\Admin\AppData\Local\Temp\z4921733.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6122764.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6122764.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\q0556973.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\q0556973.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3006724.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3006724.exe3⤵
- Executes dropped EXE
PID:3300
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1389380.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1389380.exe2⤵
- Executes dropped EXE
PID:4876
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD506f2a58cc262f752e8c67b4345c16b6c
SHA1737541609d2bbefd038e0c848a0ff5da2c2e768a
SHA256e100b806bc9587accd03ab26aae2f37b4136b0bb6aa0415bdc49815bd83196b1
SHA512cc73836af52d14150122604f6c5fc4d7195943a2be106fb44fcddc8002c2aa0ee73840c7f5d65c9c7bfcf44460587df9959788f3e53ab121db48f7538854aa65
-
Filesize
174KB
MD506f2a58cc262f752e8c67b4345c16b6c
SHA1737541609d2bbefd038e0c848a0ff5da2c2e768a
SHA256e100b806bc9587accd03ab26aae2f37b4136b0bb6aa0415bdc49815bd83196b1
SHA512cc73836af52d14150122604f6c5fc4d7195943a2be106fb44fcddc8002c2aa0ee73840c7f5d65c9c7bfcf44460587df9959788f3e53ab121db48f7538854aa65
-
Filesize
217KB
MD53339c50a2fddaeb1d68cc1ebae24c240
SHA1a225a8359680f957be893f237894b050d0a6b720
SHA256af36c2a3af9e6714c8280892d49405fd76f3fd8d50c44121969018759f7e6264
SHA5126af46d550829615d498b32f34724f34aac960853e0a19b0d522904d81cde6df188895df0bde4583ea90af506dec7d045dbd0b9675430b4aa07a4a3b3b2e20119
-
Filesize
217KB
MD53339c50a2fddaeb1d68cc1ebae24c240
SHA1a225a8359680f957be893f237894b050d0a6b720
SHA256af36c2a3af9e6714c8280892d49405fd76f3fd8d50c44121969018759f7e6264
SHA5126af46d550829615d498b32f34724f34aac960853e0a19b0d522904d81cde6df188895df0bde4583ea90af506dec7d045dbd0b9675430b4aa07a4a3b3b2e20119
-
Filesize
13KB
MD518e4e8a529a08a0d453d509cc4a44665
SHA10dfc8ce833e94545ba31a5b41c722664021aac44
SHA256349ca83cbed28a8a42764969725bb9b049565b613842a3954a041d474fb0e62d
SHA5128b81a06ff7c021fd3299b2140641e2f18a6ccabde04c79c962bfbca410addf5938795cc2de84e0778a15f5ada6b394ee6e56d2787430be801d6fc572c0accd19
-
Filesize
13KB
MD518e4e8a529a08a0d453d509cc4a44665
SHA10dfc8ce833e94545ba31a5b41c722664021aac44
SHA256349ca83cbed28a8a42764969725bb9b049565b613842a3954a041d474fb0e62d
SHA5128b81a06ff7c021fd3299b2140641e2f18a6ccabde04c79c962bfbca410addf5938795cc2de84e0778a15f5ada6b394ee6e56d2787430be801d6fc572c0accd19
-
Filesize
140KB
MD5577820ffc3f05e7ba539b190c28ef6a0
SHA1b88220edcf973f1a010e6c2323c1715f63d2780b
SHA2568b262c918bcada4f425885d75c18731164e5f6996fd56f03ab1c30ff70f618e7
SHA5127b8c089211a5510f85fce759700fa16112beb4435bc37e4c894c7cccf439599b08c9a3b33ee9a9c438ac65c9f38faa4a17e89a37fee519b434ef3cbf9c92ede8
-
Filesize
140KB
MD5577820ffc3f05e7ba539b190c28ef6a0
SHA1b88220edcf973f1a010e6c2323c1715f63d2780b
SHA2568b262c918bcada4f425885d75c18731164e5f6996fd56f03ab1c30ff70f618e7
SHA5127b8c089211a5510f85fce759700fa16112beb4435bc37e4c894c7cccf439599b08c9a3b33ee9a9c438ac65c9f38faa4a17e89a37fee519b434ef3cbf9c92ede8