Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
26/08/2023, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d.exe
Resource
win10-20230703-en
General
-
Target
fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d.exe
-
Size
704KB
-
MD5
3d568361be6369007491c815e3a9302d
-
SHA1
8a5508335f9e6076711ef642863148c9b5effa83
-
SHA256
fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d
-
SHA512
a23f60ddf8abc5a0f3b01edfa6840f929d6900044a68bc90d131a777eda4f2984db5c7eee5bd730fcf65a00c4b44731ec7dd6409de76f7d4d84184a7a766e4e6
-
SSDEEP
12288:nMrny90JFiUlHWrgLL6HxZHdxQqQ7J6ynloOgFyj0XCjcppwhMb:syG4gLLUavJ6YoOMNfwhk
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001b01a-26.dat healer behavioral1/files/0x000700000001b01a-27.dat healer behavioral1/memory/2092-28-0x0000000000B40000-0x0000000000B4A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g7906377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g7906377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g7906377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g7906377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g7906377.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 2968 x9672019.exe 608 x8176660.exe 4436 x7453437.exe 2092 g7906377.exe 2704 h9574819.exe 5112 saves.exe 3040 i2585162.exe 604 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4924 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g7906377.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9672019.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8176660.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7453437.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3440 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2092 g7906377.exe 2092 g7906377.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2092 g7906377.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4908 wrote to memory of 2968 4908 fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d.exe 70 PID 4908 wrote to memory of 2968 4908 fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d.exe 70 PID 4908 wrote to memory of 2968 4908 fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d.exe 70 PID 2968 wrote to memory of 608 2968 x9672019.exe 71 PID 2968 wrote to memory of 608 2968 x9672019.exe 71 PID 2968 wrote to memory of 608 2968 x9672019.exe 71 PID 608 wrote to memory of 4436 608 x8176660.exe 72 PID 608 wrote to memory of 4436 608 x8176660.exe 72 PID 608 wrote to memory of 4436 608 x8176660.exe 72 PID 4436 wrote to memory of 2092 4436 x7453437.exe 73 PID 4436 wrote to memory of 2092 4436 x7453437.exe 73 PID 4436 wrote to memory of 2704 4436 x7453437.exe 74 PID 4436 wrote to memory of 2704 4436 x7453437.exe 74 PID 4436 wrote to memory of 2704 4436 x7453437.exe 74 PID 2704 wrote to memory of 5112 2704 h9574819.exe 75 PID 2704 wrote to memory of 5112 2704 h9574819.exe 75 PID 2704 wrote to memory of 5112 2704 h9574819.exe 75 PID 608 wrote to memory of 3040 608 x8176660.exe 76 PID 608 wrote to memory of 3040 608 x8176660.exe 76 PID 608 wrote to memory of 3040 608 x8176660.exe 76 PID 5112 wrote to memory of 3440 5112 saves.exe 77 PID 5112 wrote to memory of 3440 5112 saves.exe 77 PID 5112 wrote to memory of 3440 5112 saves.exe 77 PID 5112 wrote to memory of 1472 5112 saves.exe 79 PID 5112 wrote to memory of 1472 5112 saves.exe 79 PID 5112 wrote to memory of 1472 5112 saves.exe 79 PID 1472 wrote to memory of 2120 1472 cmd.exe 81 PID 1472 wrote to memory of 2120 1472 cmd.exe 81 PID 1472 wrote to memory of 2120 1472 cmd.exe 81 PID 1472 wrote to memory of 2688 1472 cmd.exe 82 PID 1472 wrote to memory of 2688 1472 cmd.exe 82 PID 1472 wrote to memory of 2688 1472 cmd.exe 82 PID 1472 wrote to memory of 4836 1472 cmd.exe 83 PID 1472 wrote to memory of 4836 1472 cmd.exe 83 PID 1472 wrote to memory of 4836 1472 cmd.exe 83 PID 1472 wrote to memory of 4832 1472 cmd.exe 84 PID 1472 wrote to memory of 4832 1472 cmd.exe 84 PID 1472 wrote to memory of 4832 1472 cmd.exe 84 PID 1472 wrote to memory of 3424 1472 cmd.exe 85 PID 1472 wrote to memory of 3424 1472 cmd.exe 85 PID 1472 wrote to memory of 3424 1472 cmd.exe 85 PID 1472 wrote to memory of 1384 1472 cmd.exe 86 PID 1472 wrote to memory of 1384 1472 cmd.exe 86 PID 1472 wrote to memory of 1384 1472 cmd.exe 86 PID 5112 wrote to memory of 4924 5112 saves.exe 88 PID 5112 wrote to memory of 4924 5112 saves.exe 88 PID 5112 wrote to memory of 4924 5112 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d.exe"C:\Users\Admin\AppData\Local\Temp\fb8d3fe3c381361225229c6e99999ff71adcc3212d7890e2b606678cde1eda7d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9672019.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9672019.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8176660.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8176660.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7453437.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7453437.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7906377.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7906377.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9574819.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9574819.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:3440
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2120
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1384
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4924
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2585162.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2585162.exe4⤵
- Executes dropped EXE
PID:3040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:604
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5056b26d757b0754d0f8be10cf59a1335
SHA11cd2e4f55ad44b9503b9f116a219e430fb44c390
SHA256c4d935415fa7c3342fa8e729ac5ff12137df8bb7b0f61a3a55a3719f32bdb293
SHA5126b66d4c49ddc0237d258afd1dd75914534c381f1f567466c69be5494975620cd88bab43c1cee1e2cd6e1a8c90839e3129b3d0ac5f9e38c8a442f38ba437d5279
-
Filesize
599KB
MD5056b26d757b0754d0f8be10cf59a1335
SHA11cd2e4f55ad44b9503b9f116a219e430fb44c390
SHA256c4d935415fa7c3342fa8e729ac5ff12137df8bb7b0f61a3a55a3719f32bdb293
SHA5126b66d4c49ddc0237d258afd1dd75914534c381f1f567466c69be5494975620cd88bab43c1cee1e2cd6e1a8c90839e3129b3d0ac5f9e38c8a442f38ba437d5279
-
Filesize
433KB
MD54318c0ea835f1c6313d866cca8ef44f5
SHA11b4dcc6652eb70d3fc42675f912644888d5f1549
SHA25648217d812db3500a623607dcdcf76dbfed19442b8670923702ea7a5d6523605d
SHA512a437ce5d3d77479f6155e6cff6dfb59bd4611419018ad1d8d36edce6a4e38810e9cf521845d64bcf4c10d9862aabd4aa74abb84848938a087bd4c30a6bd7f3bf
-
Filesize
433KB
MD54318c0ea835f1c6313d866cca8ef44f5
SHA11b4dcc6652eb70d3fc42675f912644888d5f1549
SHA25648217d812db3500a623607dcdcf76dbfed19442b8670923702ea7a5d6523605d
SHA512a437ce5d3d77479f6155e6cff6dfb59bd4611419018ad1d8d36edce6a4e38810e9cf521845d64bcf4c10d9862aabd4aa74abb84848938a087bd4c30a6bd7f3bf
-
Filesize
174KB
MD5f589cda96cc5a9fac3ee7ca304bb1f6a
SHA14c6b988ea412a1b44a3a533cfe1457925bfde2c3
SHA256d119bc6388efc24e694704bbeb071ffd8092d3a24319b82e1e811216e65fc17c
SHA512794bbe957688f09e909363f4cd1a7168c285fd3c1291567be0e28f617ab0ca207ef980e10582a4baffe6217d31ad5da052e98c822d3f0882e59884e84f9ee019
-
Filesize
174KB
MD5f589cda96cc5a9fac3ee7ca304bb1f6a
SHA14c6b988ea412a1b44a3a533cfe1457925bfde2c3
SHA256d119bc6388efc24e694704bbeb071ffd8092d3a24319b82e1e811216e65fc17c
SHA512794bbe957688f09e909363f4cd1a7168c285fd3c1291567be0e28f617ab0ca207ef980e10582a4baffe6217d31ad5da052e98c822d3f0882e59884e84f9ee019
-
Filesize
277KB
MD5020734694009d274ac7b6fba97482150
SHA1149e2a7d914f1b6bab8d70146c4ff9c9c897d476
SHA2569cf5afa661c30435d27a48fc2a008f358334662da70e68aa01140016f01481f7
SHA512c3ddf454c716a2c258c8e41f4f83cc28bb6fdad11295d8c031bd93b7fe2425f1be313de49a07521840af6d6875c1b44bc505da6536c9221ca8addcd70e9a2d98
-
Filesize
277KB
MD5020734694009d274ac7b6fba97482150
SHA1149e2a7d914f1b6bab8d70146c4ff9c9c897d476
SHA2569cf5afa661c30435d27a48fc2a008f358334662da70e68aa01140016f01481f7
SHA512c3ddf454c716a2c258c8e41f4f83cc28bb6fdad11295d8c031bd93b7fe2425f1be313de49a07521840af6d6875c1b44bc505da6536c9221ca8addcd70e9a2d98
-
Filesize
14KB
MD5ce6ee279385d3d44e9ab058972a924f9
SHA12eaa2e5f24016ddc08e82eb159dbdf07adac0f2b
SHA2569662b61c6fb50263ad238c4383e1900eb2df3e2fd3b8fc6fb46acbeada1cfb37
SHA512bd86ddd2228d0f6b0348c9713ddd8bf2be6069ca406edbe1e488116513bb9f66a7d37c0b034c12803efce39a390ec4f429acdfa99bcefd736853d5d04baa9ba6
-
Filesize
14KB
MD5ce6ee279385d3d44e9ab058972a924f9
SHA12eaa2e5f24016ddc08e82eb159dbdf07adac0f2b
SHA2569662b61c6fb50263ad238c4383e1900eb2df3e2fd3b8fc6fb46acbeada1cfb37
SHA512bd86ddd2228d0f6b0348c9713ddd8bf2be6069ca406edbe1e488116513bb9f66a7d37c0b034c12803efce39a390ec4f429acdfa99bcefd736853d5d04baa9ba6
-
Filesize
320KB
MD5b7f68bfcd272c2b786898da78d96db4a
SHA1f3c6beb345688be66469e4f7a4bca6960091a77e
SHA2565b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b
SHA512a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92
-
Filesize
320KB
MD5b7f68bfcd272c2b786898da78d96db4a
SHA1f3c6beb345688be66469e4f7a4bca6960091a77e
SHA2565b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b
SHA512a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92
-
Filesize
320KB
MD5b7f68bfcd272c2b786898da78d96db4a
SHA1f3c6beb345688be66469e4f7a4bca6960091a77e
SHA2565b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b
SHA512a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92
-
Filesize
320KB
MD5b7f68bfcd272c2b786898da78d96db4a
SHA1f3c6beb345688be66469e4f7a4bca6960091a77e
SHA2565b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b
SHA512a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92
-
Filesize
320KB
MD5b7f68bfcd272c2b786898da78d96db4a
SHA1f3c6beb345688be66469e4f7a4bca6960091a77e
SHA2565b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b
SHA512a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92
-
Filesize
320KB
MD5b7f68bfcd272c2b786898da78d96db4a
SHA1f3c6beb345688be66469e4f7a4bca6960091a77e
SHA2565b627ca1785d19ee457b67fe7d12ac58613be6b774f750009a7f60465d11980b
SHA512a2e205583840b7f2c0a45cfd4334226cd0f9a0a4964b4ac98afe3dfbe6e83ab656bd7e75985976a8cd329567becd05db217622cffccbdbb19e5d01108c833d92
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b