Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2023, 14:49

General

  • Target

    1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad.exe

  • Size

    829KB

  • MD5

    bb9234448fb4aca97cccc60f4b76f05a

  • SHA1

    d0fe913c34d6f652cd039f94873284077979fcdd

  • SHA256

    1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad

  • SHA512

    c3661d6efb5600ebf5a37440217693e29b9152e7e505fe60b482933f8384e5d1fb25f924e82c8ef910ba942dba14cf393f38a222367c125a08a8fce8663cadc8

  • SSDEEP

    12288:JMroy90BhiLeggDOSUj4ZgUwd2kukXLIu16ct5CsRly+i4mgal2Xc38c4:xy6iL3vqwd2kukXUu16cesROE08c4

Malware Config

Extracted

Family

redline

Botnet

jaja

C2

77.91.124.73:19071

Attributes
  • auth_value

    3670179d176ca399ed08e7914610b43c

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad.exe
    "C:\Users\Admin\AppData\Local\Temp\1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9573437.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9573437.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1281207.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1281207.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4644
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8107851.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8107851.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0302186.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0302186.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1348
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6285971.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6285971.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4812
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4085149.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4085149.exe
              6⤵
              • Executes dropped EXE
              PID:4668
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8476073.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8476073.exe
            5⤵
            • Executes dropped EXE
            PID:2060
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:4104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9573437.exe

    Filesize

    723KB

    MD5

    f77faa1296e1f26de86c7a0ea8538ae2

    SHA1

    aed330682220efc4f90d83ccb846c1a64fc98d78

    SHA256

    8a4a14b279d2c3f9f1d771c0a5538551e1d4dedff6d18518569ed2ec9261b2f5

    SHA512

    306810aad58054e8c0e2f7fefdab9a5d6f7e98353bbf3bfed15f46e042f6083a2f49a6710d801ef57aac552c61903acb9d0c79054cb9c53d707fb296207cb3ae

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9573437.exe

    Filesize

    723KB

    MD5

    f77faa1296e1f26de86c7a0ea8538ae2

    SHA1

    aed330682220efc4f90d83ccb846c1a64fc98d78

    SHA256

    8a4a14b279d2c3f9f1d771c0a5538551e1d4dedff6d18518569ed2ec9261b2f5

    SHA512

    306810aad58054e8c0e2f7fefdab9a5d6f7e98353bbf3bfed15f46e042f6083a2f49a6710d801ef57aac552c61903acb9d0c79054cb9c53d707fb296207cb3ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1281207.exe

    Filesize

    497KB

    MD5

    cb12e3357a80e6e2c3bbbbaf82202471

    SHA1

    f25f99913297a60f6f822a6c020b69fd01ed1568

    SHA256

    45723a4d9aec616cf8d6c5c1b1a77549e069d024ffdcb36d9fad688fbc512d12

    SHA512

    f745fb547edd0b808ff9f4b378efd98f7f974e5d81cd09023919a3b72c60f19da8bc4f75c721cba7067821263922f8cb70f52699a5c533c1a49d1f57cd2b849c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1281207.exe

    Filesize

    497KB

    MD5

    cb12e3357a80e6e2c3bbbbaf82202471

    SHA1

    f25f99913297a60f6f822a6c020b69fd01ed1568

    SHA256

    45723a4d9aec616cf8d6c5c1b1a77549e069d024ffdcb36d9fad688fbc512d12

    SHA512

    f745fb547edd0b808ff9f4b378efd98f7f974e5d81cd09023919a3b72c60f19da8bc4f75c721cba7067821263922f8cb70f52699a5c533c1a49d1f57cd2b849c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8107851.exe

    Filesize

    372KB

    MD5

    a45b4c0b58ed967d2079c53d0e05cecd

    SHA1

    78237a077dd5b0f89167cdaf1e8956ca562d585f

    SHA256

    bcb30fafd80f011906e9f246df5b86296fbe36de2c00bd2462ddbaecfee5f589

    SHA512

    d8b3e47bd2c56ab0e2408345c597a7538b77230e24086d48f7a15c70d02add449a7e8fd730e4a30d82e9385e605bbf8cc8076dec00906c00b19e1e9c88de11a3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8107851.exe

    Filesize

    372KB

    MD5

    a45b4c0b58ed967d2079c53d0e05cecd

    SHA1

    78237a077dd5b0f89167cdaf1e8956ca562d585f

    SHA256

    bcb30fafd80f011906e9f246df5b86296fbe36de2c00bd2462ddbaecfee5f589

    SHA512

    d8b3e47bd2c56ab0e2408345c597a7538b77230e24086d48f7a15c70d02add449a7e8fd730e4a30d82e9385e605bbf8cc8076dec00906c00b19e1e9c88de11a3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8476073.exe

    Filesize

    174KB

    MD5

    001859027adf50f578d73a9c14d96d73

    SHA1

    8d33e6c4ef103f9cb8cf880326f7735bf7e7160d

    SHA256

    e5e2819a30a58412967b41db050be29dfc341b0bff49601e4da94b717e74f624

    SHA512

    4be178174fd7b3d9b3cf8ffcfa9f74419a9955bab6b6279b2567c3450502ae2238e8870993cae5e90139a408b4f5802a432d1464fa4f8b5528b5c9ec052436ce

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8476073.exe

    Filesize

    174KB

    MD5

    001859027adf50f578d73a9c14d96d73

    SHA1

    8d33e6c4ef103f9cb8cf880326f7735bf7e7160d

    SHA256

    e5e2819a30a58412967b41db050be29dfc341b0bff49601e4da94b717e74f624

    SHA512

    4be178174fd7b3d9b3cf8ffcfa9f74419a9955bab6b6279b2567c3450502ae2238e8870993cae5e90139a408b4f5802a432d1464fa4f8b5528b5c9ec052436ce

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0302186.exe

    Filesize

    217KB

    MD5

    f8159aa74a0331bc034f51d01348b462

    SHA1

    9ac5816f2387e95db52af14ab068ad7250021bb6

    SHA256

    ed8a85af4a7455fe47b1c0ee4d6e29578750a205d63f5aba176e0f26e1226b0a

    SHA512

    3cca0e694023e230ff7fdf860a95ab80ebecc0fb0a1088a30f579096b51cc98ed81f589a8c1c5cf0e402582dfce9ee2aa5112665310f06fe3fae37a27a0c8a0e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0302186.exe

    Filesize

    217KB

    MD5

    f8159aa74a0331bc034f51d01348b462

    SHA1

    9ac5816f2387e95db52af14ab068ad7250021bb6

    SHA256

    ed8a85af4a7455fe47b1c0ee4d6e29578750a205d63f5aba176e0f26e1226b0a

    SHA512

    3cca0e694023e230ff7fdf860a95ab80ebecc0fb0a1088a30f579096b51cc98ed81f589a8c1c5cf0e402582dfce9ee2aa5112665310f06fe3fae37a27a0c8a0e

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6285971.exe

    Filesize

    14KB

    MD5

    af08084174b5f137d826da8a4ee1b46d

    SHA1

    bbaf98b00709a9ecaa56c552c9e7e010454726a1

    SHA256

    10619414640ba9827ddb922f2a4d300b3ada019106396b8dcd364505ff099df0

    SHA512

    b2d072398f50ea8aa65b8f261352f31a150b55df0a0d1333a7538440d88627f805711440509193a4b7a45af8dbdccbc2dc6f4fcf21473143287a1ebaa2264e40

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6285971.exe

    Filesize

    14KB

    MD5

    af08084174b5f137d826da8a4ee1b46d

    SHA1

    bbaf98b00709a9ecaa56c552c9e7e010454726a1

    SHA256

    10619414640ba9827ddb922f2a4d300b3ada019106396b8dcd364505ff099df0

    SHA512

    b2d072398f50ea8aa65b8f261352f31a150b55df0a0d1333a7538440d88627f805711440509193a4b7a45af8dbdccbc2dc6f4fcf21473143287a1ebaa2264e40

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4085149.exe

    Filesize

    141KB

    MD5

    551bb6ce2095bcee49dba00103355803

    SHA1

    2fa0d2f281223931ed7e1b6704e37d683174bea2

    SHA256

    b23990107aa2dde0d3e89720aeb86807e5db5a0f43af30be264e8f7c1bc3d449

    SHA512

    0099691349999ba6acad5bc291fd958603c3fdeb2d28253a3290fdaaebce11f53046c109f5eacb33f69d3bcf1d3660022a86b3fe0e6c312dda5d09558c36ebb6

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4085149.exe

    Filesize

    141KB

    MD5

    551bb6ce2095bcee49dba00103355803

    SHA1

    2fa0d2f281223931ed7e1b6704e37d683174bea2

    SHA256

    b23990107aa2dde0d3e89720aeb86807e5db5a0f43af30be264e8f7c1bc3d449

    SHA512

    0099691349999ba6acad5bc291fd958603c3fdeb2d28253a3290fdaaebce11f53046c109f5eacb33f69d3bcf1d3660022a86b3fe0e6c312dda5d09558c36ebb6

  • memory/2060-45-0x0000000000250000-0x0000000000280000-memory.dmp

    Filesize

    192KB

  • memory/2060-46-0x0000000074B20000-0x00000000752D0000-memory.dmp

    Filesize

    7.7MB

  • memory/2060-47-0x0000000005200000-0x0000000005818000-memory.dmp

    Filesize

    6.1MB

  • memory/2060-48-0x0000000004CF0000-0x0000000004DFA000-memory.dmp

    Filesize

    1.0MB

  • memory/2060-49-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/2060-50-0x0000000004C00000-0x0000000004C12000-memory.dmp

    Filesize

    72KB

  • memory/2060-51-0x0000000004C60000-0x0000000004C9C000-memory.dmp

    Filesize

    240KB

  • memory/2060-52-0x0000000074B20000-0x00000000752D0000-memory.dmp

    Filesize

    7.7MB

  • memory/2060-53-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/4812-38-0x00007FFA16740000-0x00007FFA17201000-memory.dmp

    Filesize

    10.8MB

  • memory/4812-36-0x00007FFA16740000-0x00007FFA17201000-memory.dmp

    Filesize

    10.8MB

  • memory/4812-35-0x00000000009C0000-0x00000000009CA000-memory.dmp

    Filesize

    40KB