Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
ecf6336a1803eed2fb4644a389cba341b2e1084badfd080ee2e417ff3a5edd32.exe
Resource
win10v2004-20230703-en
General
-
Target
ecf6336a1803eed2fb4644a389cba341b2e1084badfd080ee2e417ff3a5edd32.exe
-
Size
930KB
-
MD5
24346da7ae9c5b1ff35fc2ab06b9038b
-
SHA1
ba9401432b4bb41f55c7a9b4b6857ef5b3e069fe
-
SHA256
ecf6336a1803eed2fb4644a389cba341b2e1084badfd080ee2e417ff3a5edd32
-
SHA512
8dd00842537643e9fb3fc089bdd6d7601d996e11b5b59efc217eebbd9dafb2044d74d250ee99ec87b2d7b21a5f4f7219b1ff697b7dcec4cd633e70e6ae685d37
-
SSDEEP
24576:HyZCS98aGeomWjunsijLy0ju69lrx3AvCwtERIoFwoCf+:Sog8NnSLK67l3ICvuG
Malware Config
Extracted
redline
vaga
77.91.124.73:19071
-
auth_value
393905212ded984248e8e000e612d4fe
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023212-33.dat healer behavioral1/files/0x0007000000023212-34.dat healer behavioral1/memory/4728-35-0x0000000000B00000-0x0000000000B0A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q2724148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q2724148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q2724148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q2724148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q2724148.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q2724148.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 324 z9597807.exe 4840 z9542412.exe 4952 z8366943.exe 2956 z2598250.exe 4728 q2724148.exe 4428 r1081982.exe 5108 s5057474.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q2724148.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ecf6336a1803eed2fb4644a389cba341b2e1084badfd080ee2e417ff3a5edd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9597807.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9542412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8366943.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z2598250.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4588 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4728 q2724148.exe 4728 q2724148.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4728 q2724148.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2160 wrote to memory of 324 2160 ecf6336a1803eed2fb4644a389cba341b2e1084badfd080ee2e417ff3a5edd32.exe 81 PID 2160 wrote to memory of 324 2160 ecf6336a1803eed2fb4644a389cba341b2e1084badfd080ee2e417ff3a5edd32.exe 81 PID 2160 wrote to memory of 324 2160 ecf6336a1803eed2fb4644a389cba341b2e1084badfd080ee2e417ff3a5edd32.exe 81 PID 324 wrote to memory of 4840 324 z9597807.exe 82 PID 324 wrote to memory of 4840 324 z9597807.exe 82 PID 324 wrote to memory of 4840 324 z9597807.exe 82 PID 4840 wrote to memory of 4952 4840 z9542412.exe 83 PID 4840 wrote to memory of 4952 4840 z9542412.exe 83 PID 4840 wrote to memory of 4952 4840 z9542412.exe 83 PID 4952 wrote to memory of 2956 4952 z8366943.exe 84 PID 4952 wrote to memory of 2956 4952 z8366943.exe 84 PID 4952 wrote to memory of 2956 4952 z8366943.exe 84 PID 2956 wrote to memory of 4728 2956 z2598250.exe 85 PID 2956 wrote to memory of 4728 2956 z2598250.exe 85 PID 2956 wrote to memory of 4428 2956 z2598250.exe 90 PID 2956 wrote to memory of 4428 2956 z2598250.exe 90 PID 2956 wrote to memory of 4428 2956 z2598250.exe 90 PID 4952 wrote to memory of 5108 4952 z8366943.exe 91 PID 4952 wrote to memory of 5108 4952 z8366943.exe 91 PID 4952 wrote to memory of 5108 4952 z8366943.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecf6336a1803eed2fb4644a389cba341b2e1084badfd080ee2e417ff3a5edd32.exe"C:\Users\Admin\AppData\Local\Temp\ecf6336a1803eed2fb4644a389cba341b2e1084badfd080ee2e417ff3a5edd32.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9597807.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9597807.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9542412.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9542412.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8366943.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8366943.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2598250.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2598250.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2724148.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2724148.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1081982.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1081982.exe6⤵
- Executes dropped EXE
PID:4428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5057474.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5057474.exe5⤵
- Executes dropped EXE
PID:5108
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4588
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
824KB
MD56fa1a4c1895c70ba15a6550b60e70433
SHA111b2142ba1553c81b340f8e2a249c21bf15ca362
SHA25600bd3d778ed1b504eeaf6558ba83a1aa965bc9653c843751222ad8bd54845c2d
SHA512f26f5826fdaa9faf62ea41e1e76b1eb6e038aa3469a84dc7f7b034c2d660efd08eef3180b7c2d74b160fa4b9642895bbb381d3676c3e1f653e49eacaf5fc09cb
-
Filesize
824KB
MD56fa1a4c1895c70ba15a6550b60e70433
SHA111b2142ba1553c81b340f8e2a249c21bf15ca362
SHA25600bd3d778ed1b504eeaf6558ba83a1aa965bc9653c843751222ad8bd54845c2d
SHA512f26f5826fdaa9faf62ea41e1e76b1eb6e038aa3469a84dc7f7b034c2d660efd08eef3180b7c2d74b160fa4b9642895bbb381d3676c3e1f653e49eacaf5fc09cb
-
Filesize
597KB
MD589f24c60c3809c8eb872771a4e77afff
SHA16d6df18f0e5a0ade23869ec80c752d440c1e2674
SHA256c9b0b180ab36ea90afff3ed9c5adf8665e909d9f9b1ad1831131e879b07756c2
SHA51259ddf0bf2e4a9d28207a1b82765d5b65628674e94e4df89572a00d3592e5018dbc712dc3cfc7167ce90ce8478526356d24fa7ef7fec705f5c1d9a58f650609eb
-
Filesize
597KB
MD589f24c60c3809c8eb872771a4e77afff
SHA16d6df18f0e5a0ade23869ec80c752d440c1e2674
SHA256c9b0b180ab36ea90afff3ed9c5adf8665e909d9f9b1ad1831131e879b07756c2
SHA51259ddf0bf2e4a9d28207a1b82765d5b65628674e94e4df89572a00d3592e5018dbc712dc3cfc7167ce90ce8478526356d24fa7ef7fec705f5c1d9a58f650609eb
-
Filesize
372KB
MD558a07d337bc83cac6245a0640f3f208e
SHA1e95160598e3b72c1b5210c7314bf33706a8d3e70
SHA256a0e86548951bafcaa009381b726228fd1d5438dde5f2f3305e21a3cff3b89822
SHA512d799beae9ff8d7dba8b72a6d14040c28bb85d3e8a7c94381f2809fea57f17b388da6a2806756849089c9f5f7aad8ce330d0c9cc3c7152e307e1a301548a64326
-
Filesize
372KB
MD558a07d337bc83cac6245a0640f3f208e
SHA1e95160598e3b72c1b5210c7314bf33706a8d3e70
SHA256a0e86548951bafcaa009381b726228fd1d5438dde5f2f3305e21a3cff3b89822
SHA512d799beae9ff8d7dba8b72a6d14040c28bb85d3e8a7c94381f2809fea57f17b388da6a2806756849089c9f5f7aad8ce330d0c9cc3c7152e307e1a301548a64326
-
Filesize
174KB
MD5f7c5d3a9306ad81fbbb7c4d53873e14b
SHA1f62e03f82df4650d946a58c9f4c213da2b9250c1
SHA25633546bd8fa7e6322045e986399aabec12752377db86352d9c570c0691bb8a30d
SHA512fb4dfe8839825179eddbaa20ae667204f9815a5bbdef169686e817ff1eef4da245b56fe64fec647033fee6c0d454a602e1a0bcdced214a93043400e0956e53b8
-
Filesize
174KB
MD5f7c5d3a9306ad81fbbb7c4d53873e14b
SHA1f62e03f82df4650d946a58c9f4c213da2b9250c1
SHA25633546bd8fa7e6322045e986399aabec12752377db86352d9c570c0691bb8a30d
SHA512fb4dfe8839825179eddbaa20ae667204f9815a5bbdef169686e817ff1eef4da245b56fe64fec647033fee6c0d454a602e1a0bcdced214a93043400e0956e53b8
-
Filesize
217KB
MD5734e6e1f2996c99a58b7fda663c07bc8
SHA189c0618101cee004a83c1f32f75b4530c3229309
SHA2566db2923fb1e771dec22455f17f2552227d822f7d4c956813008bcddc602113e2
SHA51224c3275301a662084de4f25ac76b038c01e54c144b21f54cdbb052fc2a8bcd594460a5b6ce27b4c43349fcb3fdee11f0681bbd1cf3a68af49a5b37707bc75c21
-
Filesize
217KB
MD5734e6e1f2996c99a58b7fda663c07bc8
SHA189c0618101cee004a83c1f32f75b4530c3229309
SHA2566db2923fb1e771dec22455f17f2552227d822f7d4c956813008bcddc602113e2
SHA51224c3275301a662084de4f25ac76b038c01e54c144b21f54cdbb052fc2a8bcd594460a5b6ce27b4c43349fcb3fdee11f0681bbd1cf3a68af49a5b37707bc75c21
-
Filesize
13KB
MD5416b4a1b44da54639c18c25ed4e9a535
SHA1141f122498ef69139c691de61f0017411db18ad8
SHA256d51ad9b2f40ef90b0db7a60955c583d82ed32530ce7a9c6394930fbf604724c7
SHA512eff9beef7ddc4040d9a955e3f3e7daf0b44c5b9faec1145a96266234226564331aad2375af1817dc419338027f4236d49daae2ba49f7560a9f95f99aba3490fa
-
Filesize
13KB
MD5416b4a1b44da54639c18c25ed4e9a535
SHA1141f122498ef69139c691de61f0017411db18ad8
SHA256d51ad9b2f40ef90b0db7a60955c583d82ed32530ce7a9c6394930fbf604724c7
SHA512eff9beef7ddc4040d9a955e3f3e7daf0b44c5b9faec1145a96266234226564331aad2375af1817dc419338027f4236d49daae2ba49f7560a9f95f99aba3490fa
-
Filesize
140KB
MD54ec4faca4459659c6aa31c50136ec7a6
SHA1f1dac6cc2affb012ad9f88e427deea979085b053
SHA25642ec66f35f0d382a027870d0737e94543b3db39627f39885039aa0e530dbdcab
SHA5128a00b318b4b7ed0128951153ed2bfb9077b8bdcf3f68ad2fb1715779e5fd211180272829095542e5e1dc09180d6893320acd702ff56e5db9d70f87bf845e860e
-
Filesize
140KB
MD54ec4faca4459659c6aa31c50136ec7a6
SHA1f1dac6cc2affb012ad9f88e427deea979085b053
SHA25642ec66f35f0d382a027870d0737e94543b3db39627f39885039aa0e530dbdcab
SHA5128a00b318b4b7ed0128951153ed2bfb9077b8bdcf3f68ad2fb1715779e5fd211180272829095542e5e1dc09180d6893320acd702ff56e5db9d70f87bf845e860e