Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad.exe
Resource
win10v2004-20230703-en
General
-
Target
1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad.exe
-
Size
829KB
-
MD5
bb9234448fb4aca97cccc60f4b76f05a
-
SHA1
d0fe913c34d6f652cd039f94873284077979fcdd
-
SHA256
1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad
-
SHA512
c3661d6efb5600ebf5a37440217693e29b9152e7e505fe60b482933f8384e5d1fb25f924e82c8ef910ba942dba14cf393f38a222367c125a08a8fce8663cadc8
-
SSDEEP
12288:JMroy90BhiLeggDOSUj4ZgUwd2kukXLIu16ct5CsRly+i4mgal2Xc38c4:xy6iL3vqwd2kukXUu16cesROE08c4
Malware Config
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000231f8-34.dat healer behavioral1/files/0x00070000000231f8-33.dat healer behavioral1/memory/4812-35-0x00000000009C0000-0x00000000009CA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6285971.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6285971.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6285971.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6285971.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6285971.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6285971.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2516 v9573437.exe 4644 v1281207.exe 1760 v8107851.exe 1348 v0302186.exe 4812 a6285971.exe 4668 b4085149.exe 2060 c8476073.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6285971.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9573437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1281207.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8107851.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0302186.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4104 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4812 a6285971.exe 4812 a6285971.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4812 a6285971.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3476 wrote to memory of 2516 3476 1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad.exe 83 PID 3476 wrote to memory of 2516 3476 1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad.exe 83 PID 3476 wrote to memory of 2516 3476 1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad.exe 83 PID 2516 wrote to memory of 4644 2516 v9573437.exe 84 PID 2516 wrote to memory of 4644 2516 v9573437.exe 84 PID 2516 wrote to memory of 4644 2516 v9573437.exe 84 PID 4644 wrote to memory of 1760 4644 v1281207.exe 85 PID 4644 wrote to memory of 1760 4644 v1281207.exe 85 PID 4644 wrote to memory of 1760 4644 v1281207.exe 85 PID 1760 wrote to memory of 1348 1760 v8107851.exe 86 PID 1760 wrote to memory of 1348 1760 v8107851.exe 86 PID 1760 wrote to memory of 1348 1760 v8107851.exe 86 PID 1348 wrote to memory of 4812 1348 v0302186.exe 87 PID 1348 wrote to memory of 4812 1348 v0302186.exe 87 PID 1348 wrote to memory of 4668 1348 v0302186.exe 92 PID 1348 wrote to memory of 4668 1348 v0302186.exe 92 PID 1348 wrote to memory of 4668 1348 v0302186.exe 92 PID 1760 wrote to memory of 2060 1760 v8107851.exe 93 PID 1760 wrote to memory of 2060 1760 v8107851.exe 93 PID 1760 wrote to memory of 2060 1760 v8107851.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad.exe"C:\Users\Admin\AppData\Local\Temp\1bafd3bbed1fc7ef44afd16f553e73564b95c86ae3193d869cee13cf36c5a5ad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9573437.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9573437.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1281207.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1281207.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8107851.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8107851.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0302186.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0302186.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6285971.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6285971.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4085149.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b4085149.exe6⤵
- Executes dropped EXE
PID:4668
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8476073.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8476073.exe5⤵
- Executes dropped EXE
PID:2060
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4104
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD5f77faa1296e1f26de86c7a0ea8538ae2
SHA1aed330682220efc4f90d83ccb846c1a64fc98d78
SHA2568a4a14b279d2c3f9f1d771c0a5538551e1d4dedff6d18518569ed2ec9261b2f5
SHA512306810aad58054e8c0e2f7fefdab9a5d6f7e98353bbf3bfed15f46e042f6083a2f49a6710d801ef57aac552c61903acb9d0c79054cb9c53d707fb296207cb3ae
-
Filesize
723KB
MD5f77faa1296e1f26de86c7a0ea8538ae2
SHA1aed330682220efc4f90d83ccb846c1a64fc98d78
SHA2568a4a14b279d2c3f9f1d771c0a5538551e1d4dedff6d18518569ed2ec9261b2f5
SHA512306810aad58054e8c0e2f7fefdab9a5d6f7e98353bbf3bfed15f46e042f6083a2f49a6710d801ef57aac552c61903acb9d0c79054cb9c53d707fb296207cb3ae
-
Filesize
497KB
MD5cb12e3357a80e6e2c3bbbbaf82202471
SHA1f25f99913297a60f6f822a6c020b69fd01ed1568
SHA25645723a4d9aec616cf8d6c5c1b1a77549e069d024ffdcb36d9fad688fbc512d12
SHA512f745fb547edd0b808ff9f4b378efd98f7f974e5d81cd09023919a3b72c60f19da8bc4f75c721cba7067821263922f8cb70f52699a5c533c1a49d1f57cd2b849c
-
Filesize
497KB
MD5cb12e3357a80e6e2c3bbbbaf82202471
SHA1f25f99913297a60f6f822a6c020b69fd01ed1568
SHA25645723a4d9aec616cf8d6c5c1b1a77549e069d024ffdcb36d9fad688fbc512d12
SHA512f745fb547edd0b808ff9f4b378efd98f7f974e5d81cd09023919a3b72c60f19da8bc4f75c721cba7067821263922f8cb70f52699a5c533c1a49d1f57cd2b849c
-
Filesize
372KB
MD5a45b4c0b58ed967d2079c53d0e05cecd
SHA178237a077dd5b0f89167cdaf1e8956ca562d585f
SHA256bcb30fafd80f011906e9f246df5b86296fbe36de2c00bd2462ddbaecfee5f589
SHA512d8b3e47bd2c56ab0e2408345c597a7538b77230e24086d48f7a15c70d02add449a7e8fd730e4a30d82e9385e605bbf8cc8076dec00906c00b19e1e9c88de11a3
-
Filesize
372KB
MD5a45b4c0b58ed967d2079c53d0e05cecd
SHA178237a077dd5b0f89167cdaf1e8956ca562d585f
SHA256bcb30fafd80f011906e9f246df5b86296fbe36de2c00bd2462ddbaecfee5f589
SHA512d8b3e47bd2c56ab0e2408345c597a7538b77230e24086d48f7a15c70d02add449a7e8fd730e4a30d82e9385e605bbf8cc8076dec00906c00b19e1e9c88de11a3
-
Filesize
174KB
MD5001859027adf50f578d73a9c14d96d73
SHA18d33e6c4ef103f9cb8cf880326f7735bf7e7160d
SHA256e5e2819a30a58412967b41db050be29dfc341b0bff49601e4da94b717e74f624
SHA5124be178174fd7b3d9b3cf8ffcfa9f74419a9955bab6b6279b2567c3450502ae2238e8870993cae5e90139a408b4f5802a432d1464fa4f8b5528b5c9ec052436ce
-
Filesize
174KB
MD5001859027adf50f578d73a9c14d96d73
SHA18d33e6c4ef103f9cb8cf880326f7735bf7e7160d
SHA256e5e2819a30a58412967b41db050be29dfc341b0bff49601e4da94b717e74f624
SHA5124be178174fd7b3d9b3cf8ffcfa9f74419a9955bab6b6279b2567c3450502ae2238e8870993cae5e90139a408b4f5802a432d1464fa4f8b5528b5c9ec052436ce
-
Filesize
217KB
MD5f8159aa74a0331bc034f51d01348b462
SHA19ac5816f2387e95db52af14ab068ad7250021bb6
SHA256ed8a85af4a7455fe47b1c0ee4d6e29578750a205d63f5aba176e0f26e1226b0a
SHA5123cca0e694023e230ff7fdf860a95ab80ebecc0fb0a1088a30f579096b51cc98ed81f589a8c1c5cf0e402582dfce9ee2aa5112665310f06fe3fae37a27a0c8a0e
-
Filesize
217KB
MD5f8159aa74a0331bc034f51d01348b462
SHA19ac5816f2387e95db52af14ab068ad7250021bb6
SHA256ed8a85af4a7455fe47b1c0ee4d6e29578750a205d63f5aba176e0f26e1226b0a
SHA5123cca0e694023e230ff7fdf860a95ab80ebecc0fb0a1088a30f579096b51cc98ed81f589a8c1c5cf0e402582dfce9ee2aa5112665310f06fe3fae37a27a0c8a0e
-
Filesize
14KB
MD5af08084174b5f137d826da8a4ee1b46d
SHA1bbaf98b00709a9ecaa56c552c9e7e010454726a1
SHA25610619414640ba9827ddb922f2a4d300b3ada019106396b8dcd364505ff099df0
SHA512b2d072398f50ea8aa65b8f261352f31a150b55df0a0d1333a7538440d88627f805711440509193a4b7a45af8dbdccbc2dc6f4fcf21473143287a1ebaa2264e40
-
Filesize
14KB
MD5af08084174b5f137d826da8a4ee1b46d
SHA1bbaf98b00709a9ecaa56c552c9e7e010454726a1
SHA25610619414640ba9827ddb922f2a4d300b3ada019106396b8dcd364505ff099df0
SHA512b2d072398f50ea8aa65b8f261352f31a150b55df0a0d1333a7538440d88627f805711440509193a4b7a45af8dbdccbc2dc6f4fcf21473143287a1ebaa2264e40
-
Filesize
141KB
MD5551bb6ce2095bcee49dba00103355803
SHA12fa0d2f281223931ed7e1b6704e37d683174bea2
SHA256b23990107aa2dde0d3e89720aeb86807e5db5a0f43af30be264e8f7c1bc3d449
SHA5120099691349999ba6acad5bc291fd958603c3fdeb2d28253a3290fdaaebce11f53046c109f5eacb33f69d3bcf1d3660022a86b3fe0e6c312dda5d09558c36ebb6
-
Filesize
141KB
MD5551bb6ce2095bcee49dba00103355803
SHA12fa0d2f281223931ed7e1b6704e37d683174bea2
SHA256b23990107aa2dde0d3e89720aeb86807e5db5a0f43af30be264e8f7c1bc3d449
SHA5120099691349999ba6acad5bc291fd958603c3fdeb2d28253a3290fdaaebce11f53046c109f5eacb33f69d3bcf1d3660022a86b3fe0e6c312dda5d09558c36ebb6