Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
28/08/2023, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc.exe
Resource
win10-20230703-en
General
-
Target
c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc.exe
-
Size
704KB
-
MD5
12cb4ec05f84ee0332c215d165447862
-
SHA1
c8384294bf7ab24e3cf6ba3a0d811e7a6b18935e
-
SHA256
c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc
-
SHA512
d91f2aaa4c16e1920f8de6c6fada5befc236d21ee611b62edff760724b2a06b6c1327264ddc451b27951b18044f377423b41fb733770564ecb257aabba6b50b9
-
SSDEEP
12288:AMrxy90DoUuHWgvKPwSLvjyC0XM1j3+ErxT64C7mly:hyZYPwsuO13+ErxT6b7ay
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afab-26.dat healer behavioral1/files/0x000700000001afab-27.dat healer behavioral1/memory/3812-28-0x0000000000140000-0x000000000014A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g1547829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g1547829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g1547829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g1547829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g1547829.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 5088 x2784966.exe 4484 x8104894.exe 2080 x8153109.exe 3812 g1547829.exe 2164 h1970890.exe 1472 saves.exe 2940 i2262146.exe 2376 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3292 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g1547829.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2784966.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8104894.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8153109.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3812 g1547829.exe 3812 g1547829.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3812 g1547829.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4652 wrote to memory of 5088 4652 c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc.exe 69 PID 4652 wrote to memory of 5088 4652 c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc.exe 69 PID 4652 wrote to memory of 5088 4652 c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc.exe 69 PID 5088 wrote to memory of 4484 5088 x2784966.exe 70 PID 5088 wrote to memory of 4484 5088 x2784966.exe 70 PID 5088 wrote to memory of 4484 5088 x2784966.exe 70 PID 4484 wrote to memory of 2080 4484 x8104894.exe 71 PID 4484 wrote to memory of 2080 4484 x8104894.exe 71 PID 4484 wrote to memory of 2080 4484 x8104894.exe 71 PID 2080 wrote to memory of 3812 2080 x8153109.exe 72 PID 2080 wrote to memory of 3812 2080 x8153109.exe 72 PID 2080 wrote to memory of 2164 2080 x8153109.exe 73 PID 2080 wrote to memory of 2164 2080 x8153109.exe 73 PID 2080 wrote to memory of 2164 2080 x8153109.exe 73 PID 2164 wrote to memory of 1472 2164 h1970890.exe 74 PID 2164 wrote to memory of 1472 2164 h1970890.exe 74 PID 2164 wrote to memory of 1472 2164 h1970890.exe 74 PID 4484 wrote to memory of 2940 4484 x8104894.exe 75 PID 4484 wrote to memory of 2940 4484 x8104894.exe 75 PID 4484 wrote to memory of 2940 4484 x8104894.exe 75 PID 1472 wrote to memory of 2576 1472 saves.exe 76 PID 1472 wrote to memory of 2576 1472 saves.exe 76 PID 1472 wrote to memory of 2576 1472 saves.exe 76 PID 1472 wrote to memory of 5112 1472 saves.exe 77 PID 1472 wrote to memory of 5112 1472 saves.exe 77 PID 1472 wrote to memory of 5112 1472 saves.exe 77 PID 5112 wrote to memory of 4720 5112 cmd.exe 80 PID 5112 wrote to memory of 4720 5112 cmd.exe 80 PID 5112 wrote to memory of 4720 5112 cmd.exe 80 PID 5112 wrote to memory of 4432 5112 cmd.exe 81 PID 5112 wrote to memory of 4432 5112 cmd.exe 81 PID 5112 wrote to memory of 4432 5112 cmd.exe 81 PID 5112 wrote to memory of 3300 5112 cmd.exe 82 PID 5112 wrote to memory of 3300 5112 cmd.exe 82 PID 5112 wrote to memory of 3300 5112 cmd.exe 82 PID 5112 wrote to memory of 832 5112 cmd.exe 83 PID 5112 wrote to memory of 832 5112 cmd.exe 83 PID 5112 wrote to memory of 832 5112 cmd.exe 83 PID 5112 wrote to memory of 4880 5112 cmd.exe 84 PID 5112 wrote to memory of 4880 5112 cmd.exe 84 PID 5112 wrote to memory of 4880 5112 cmd.exe 84 PID 5112 wrote to memory of 2328 5112 cmd.exe 85 PID 5112 wrote to memory of 2328 5112 cmd.exe 85 PID 5112 wrote to memory of 2328 5112 cmd.exe 85 PID 1472 wrote to memory of 3292 1472 saves.exe 87 PID 1472 wrote to memory of 3292 1472 saves.exe 87 PID 1472 wrote to memory of 3292 1472 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc.exe"C:\Users\Admin\AppData\Local\Temp\c571b0f8604c380169cf074ab439f43736a873318c46300f61ac203ca49998cc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2784966.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2784966.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8104894.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8104894.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8153109.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8153109.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1547829.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1547829.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1970890.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1970890.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2576
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:3300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4880
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2328
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3292
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2262146.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2262146.exe4⤵
- Executes dropped EXE
PID:2940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2376
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5ba105993b3b156e7a39c4c281fd58c3e
SHA1dcb27b0676956b5b265e05f3a3f4bc4048db292e
SHA256e95c98c90939cd42c4e4cb710feeb5eead50130edbe5282d9467c44fd130864f
SHA5127ec7aeb84be2158e0aa7283d00b08b1645bb7f4df041e5b7e725ebaff171f3adc6ba38476794b3b78460dbdeb8c7839cef7cc35c869a4896ad1518dc532bf2c7
-
Filesize
599KB
MD5ba105993b3b156e7a39c4c281fd58c3e
SHA1dcb27b0676956b5b265e05f3a3f4bc4048db292e
SHA256e95c98c90939cd42c4e4cb710feeb5eead50130edbe5282d9467c44fd130864f
SHA5127ec7aeb84be2158e0aa7283d00b08b1645bb7f4df041e5b7e725ebaff171f3adc6ba38476794b3b78460dbdeb8c7839cef7cc35c869a4896ad1518dc532bf2c7
-
Filesize
433KB
MD594626c8cc48de98187074e1584936cdb
SHA16bbfa7c9e4c39ba5db9591ef2ea05ebbb8aac0f7
SHA256d2fa4cb5e2a8bc3fe14e456e7fd8b8d2f3b2e19732fe57bea93d160bbe2e2675
SHA512cde05264239091d21a1bee352946ab27c4ac270332624c0b6f5f0b86310933e99be99c18e63d4b5cebae9df8e0706b7ff07c94b863f6a2dbe12c35e8e321fc98
-
Filesize
433KB
MD594626c8cc48de98187074e1584936cdb
SHA16bbfa7c9e4c39ba5db9591ef2ea05ebbb8aac0f7
SHA256d2fa4cb5e2a8bc3fe14e456e7fd8b8d2f3b2e19732fe57bea93d160bbe2e2675
SHA512cde05264239091d21a1bee352946ab27c4ac270332624c0b6f5f0b86310933e99be99c18e63d4b5cebae9df8e0706b7ff07c94b863f6a2dbe12c35e8e321fc98
-
Filesize
174KB
MD56852d9e3ef01a22804d519806b12610a
SHA11c1c75ae2aa076e3c24cbd00b2d3725f0b060d5e
SHA2569ae84df4e6987f10bd57a7fcd1f14e8bc12e961f97e402fca3d862d6d5c021bb
SHA512232923f42ffe6fe3c1a8b94b72eba72fdd1ef11bd3a232f74449cd71def2a53ae863255b9786be70ee8df0c1d728735c28efd3b666ecbff98cf7dd53eccc3c30
-
Filesize
174KB
MD56852d9e3ef01a22804d519806b12610a
SHA11c1c75ae2aa076e3c24cbd00b2d3725f0b060d5e
SHA2569ae84df4e6987f10bd57a7fcd1f14e8bc12e961f97e402fca3d862d6d5c021bb
SHA512232923f42ffe6fe3c1a8b94b72eba72fdd1ef11bd3a232f74449cd71def2a53ae863255b9786be70ee8df0c1d728735c28efd3b666ecbff98cf7dd53eccc3c30
-
Filesize
277KB
MD5ae70f2b6a0f0e68224b4e1fb3564b1f9
SHA1aa1f687fd12c5e399af1ab84be1b3a16c3fb424f
SHA256ff3b51baf07138195074fcabac8ae2a32ce58d3892097ea2e870cfb00a5e3171
SHA5129d9456ef0d95d06182202935f2c06067a779e6605340b714ee625ffa410b2f697b1f14257932a7791e1dfba7c93e9c05b6a6351430cb4f890d5c467f8abd5ac1
-
Filesize
277KB
MD5ae70f2b6a0f0e68224b4e1fb3564b1f9
SHA1aa1f687fd12c5e399af1ab84be1b3a16c3fb424f
SHA256ff3b51baf07138195074fcabac8ae2a32ce58d3892097ea2e870cfb00a5e3171
SHA5129d9456ef0d95d06182202935f2c06067a779e6605340b714ee625ffa410b2f697b1f14257932a7791e1dfba7c93e9c05b6a6351430cb4f890d5c467f8abd5ac1
-
Filesize
16KB
MD5e86f09be9fe6f4feb478e2626880cb9b
SHA1b7475390b51fbf7ec8b0f4d757613afdad6a86fa
SHA2568436c59cbbbb7376971612e19b382395838df31bde9e4780eab015ca952cb022
SHA512dd90a7a85407d9769ee723be269689d081c660d316bb878f10f79aaf98334bfdeca1aafa850bc41398a415168f4d5d2243f0efea82865b1f87552dc01f2bf9d4
-
Filesize
16KB
MD5e86f09be9fe6f4feb478e2626880cb9b
SHA1b7475390b51fbf7ec8b0f4d757613afdad6a86fa
SHA2568436c59cbbbb7376971612e19b382395838df31bde9e4780eab015ca952cb022
SHA512dd90a7a85407d9769ee723be269689d081c660d316bb878f10f79aaf98334bfdeca1aafa850bc41398a415168f4d5d2243f0efea82865b1f87552dc01f2bf9d4
-
Filesize
323KB
MD59c781fa3868fae0527650ea690e09af4
SHA1e6d76d64f8972da65dfd312a96c13f76a4ccc8be
SHA256144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36
SHA512f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21
-
Filesize
323KB
MD59c781fa3868fae0527650ea690e09af4
SHA1e6d76d64f8972da65dfd312a96c13f76a4ccc8be
SHA256144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36
SHA512f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21
-
Filesize
323KB
MD59c781fa3868fae0527650ea690e09af4
SHA1e6d76d64f8972da65dfd312a96c13f76a4ccc8be
SHA256144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36
SHA512f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21
-
Filesize
323KB
MD59c781fa3868fae0527650ea690e09af4
SHA1e6d76d64f8972da65dfd312a96c13f76a4ccc8be
SHA256144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36
SHA512f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21
-
Filesize
323KB
MD59c781fa3868fae0527650ea690e09af4
SHA1e6d76d64f8972da65dfd312a96c13f76a4ccc8be
SHA256144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36
SHA512f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21
-
Filesize
323KB
MD59c781fa3868fae0527650ea690e09af4
SHA1e6d76d64f8972da65dfd312a96c13f76a4ccc8be
SHA256144887a3aaf534519b5c20415ce2115985b752ff63e4da6e406f3f1b3edb0b36
SHA512f5961d7aa8a2ffa20e165dfb88d562ea7f652d9188bcde708f90d934b5f92e12da33108a467134df6b8f80e561b7d0546a37f633ed5a48b181a4d1f9ea5b4c21
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b