Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
29/08/2023, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
697d6039337903bd110fac305e9cdb5c0a26e5d4896fbf74e9e57a9e91ed80ba.exe
Resource
win10-20230703-en
General
-
Target
697d6039337903bd110fac305e9cdb5c0a26e5d4896fbf74e9e57a9e91ed80ba.exe
-
Size
704KB
-
MD5
5703dc48335a283e25898a5a6d3fbda1
-
SHA1
8281d1ec36cb6fb43e0b877ec341de4712762841
-
SHA256
697d6039337903bd110fac305e9cdb5c0a26e5d4896fbf74e9e57a9e91ed80ba
-
SHA512
52bc80bf6823943f607ab48fd4c775c68c527f19ab8ae031de1245bdd0498b4aca329e799e270e9aea527c82cc45d46adc1155cb3c74536b8aa5fbd82067aa6a
-
SSDEEP
12288:DMrZy905vxTqUsk8ByFXxa1JH5ds+dHLHME70Pl+zh3h6cBAoK8CBCDG:SyIvxNssxa1JH5d4E70tEh19CBMG
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afd3-27.dat healer behavioral1/files/0x000700000001afd3-26.dat healer behavioral1/memory/3096-28-0x00000000000A0000-0x00000000000AA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g8818242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g8818242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g8818242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g8818242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g8818242.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 1928 x7549236.exe 1348 x1574889.exe 4152 x8353967.exe 3096 g8818242.exe 608 h8136303.exe 2244 saves.exe 840 i8177474.exe 60 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3460 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g8818242.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1574889.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8353967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 697d6039337903bd110fac305e9cdb5c0a26e5d4896fbf74e9e57a9e91ed80ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7549236.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3096 g8818242.exe 3096 g8818242.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3096 g8818242.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4936 wrote to memory of 1928 4936 697d6039337903bd110fac305e9cdb5c0a26e5d4896fbf74e9e57a9e91ed80ba.exe 70 PID 4936 wrote to memory of 1928 4936 697d6039337903bd110fac305e9cdb5c0a26e5d4896fbf74e9e57a9e91ed80ba.exe 70 PID 4936 wrote to memory of 1928 4936 697d6039337903bd110fac305e9cdb5c0a26e5d4896fbf74e9e57a9e91ed80ba.exe 70 PID 1928 wrote to memory of 1348 1928 x7549236.exe 71 PID 1928 wrote to memory of 1348 1928 x7549236.exe 71 PID 1928 wrote to memory of 1348 1928 x7549236.exe 71 PID 1348 wrote to memory of 4152 1348 x1574889.exe 72 PID 1348 wrote to memory of 4152 1348 x1574889.exe 72 PID 1348 wrote to memory of 4152 1348 x1574889.exe 72 PID 4152 wrote to memory of 3096 4152 x8353967.exe 73 PID 4152 wrote to memory of 3096 4152 x8353967.exe 73 PID 4152 wrote to memory of 608 4152 x8353967.exe 74 PID 4152 wrote to memory of 608 4152 x8353967.exe 74 PID 4152 wrote to memory of 608 4152 x8353967.exe 74 PID 608 wrote to memory of 2244 608 h8136303.exe 75 PID 608 wrote to memory of 2244 608 h8136303.exe 75 PID 608 wrote to memory of 2244 608 h8136303.exe 75 PID 1348 wrote to memory of 840 1348 x1574889.exe 76 PID 1348 wrote to memory of 840 1348 x1574889.exe 76 PID 1348 wrote to memory of 840 1348 x1574889.exe 76 PID 2244 wrote to memory of 2228 2244 saves.exe 77 PID 2244 wrote to memory of 2228 2244 saves.exe 77 PID 2244 wrote to memory of 2228 2244 saves.exe 77 PID 2244 wrote to memory of 2308 2244 saves.exe 79 PID 2244 wrote to memory of 2308 2244 saves.exe 79 PID 2244 wrote to memory of 2308 2244 saves.exe 79 PID 2308 wrote to memory of 4244 2308 cmd.exe 81 PID 2308 wrote to memory of 4244 2308 cmd.exe 81 PID 2308 wrote to memory of 4244 2308 cmd.exe 81 PID 2308 wrote to memory of 2188 2308 cmd.exe 82 PID 2308 wrote to memory of 2188 2308 cmd.exe 82 PID 2308 wrote to memory of 2188 2308 cmd.exe 82 PID 2308 wrote to memory of 4112 2308 cmd.exe 83 PID 2308 wrote to memory of 4112 2308 cmd.exe 83 PID 2308 wrote to memory of 4112 2308 cmd.exe 83 PID 2308 wrote to memory of 4848 2308 cmd.exe 84 PID 2308 wrote to memory of 4848 2308 cmd.exe 84 PID 2308 wrote to memory of 4848 2308 cmd.exe 84 PID 2308 wrote to memory of 4464 2308 cmd.exe 85 PID 2308 wrote to memory of 4464 2308 cmd.exe 85 PID 2308 wrote to memory of 4464 2308 cmd.exe 85 PID 2308 wrote to memory of 4508 2308 cmd.exe 86 PID 2308 wrote to memory of 4508 2308 cmd.exe 86 PID 2308 wrote to memory of 4508 2308 cmd.exe 86 PID 2244 wrote to memory of 3460 2244 saves.exe 88 PID 2244 wrote to memory of 3460 2244 saves.exe 88 PID 2244 wrote to memory of 3460 2244 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\697d6039337903bd110fac305e9cdb5c0a26e5d4896fbf74e9e57a9e91ed80ba.exe"C:\Users\Admin\AppData\Local\Temp\697d6039337903bd110fac305e9cdb5c0a26e5d4896fbf74e9e57a9e91ed80ba.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7549236.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7549236.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1574889.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1574889.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8353967.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8353967.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8818242.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8818242.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8136303.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8136303.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2228
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4508
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8177474.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8177474.exe4⤵
- Executes dropped EXE
PID:840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:60
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5d13f3d6902b8bd2eb9fbad7bf47615b6
SHA198a925f1b6e0af1b05130906e8a83a7177b1a000
SHA25600cbb801ba3ce01176d1ea280193195a4fd64b70e9053bf53253383ee4bad6fd
SHA5126431eeb0eb8ab65944d4c2497ba98b9fb7f36920a01001e1d7dfdab12d860700a0944aec07e5ba63b4e9839b4c35379dd67dbb36926c98e35061e2602b367704
-
Filesize
599KB
MD5d13f3d6902b8bd2eb9fbad7bf47615b6
SHA198a925f1b6e0af1b05130906e8a83a7177b1a000
SHA25600cbb801ba3ce01176d1ea280193195a4fd64b70e9053bf53253383ee4bad6fd
SHA5126431eeb0eb8ab65944d4c2497ba98b9fb7f36920a01001e1d7dfdab12d860700a0944aec07e5ba63b4e9839b4c35379dd67dbb36926c98e35061e2602b367704
-
Filesize
433KB
MD5da5560977d117d0599736e18dd15c38e
SHA1af0c9cfc814c17ab97b56d69bd225fb89be26873
SHA256c67ea229d1060a9e302854fb853b81ab1bc474c3995cc9ad798ac88346aeff33
SHA512e15bbbd8546d37d92e60332df80f6ae0c34b9098d11399534126be75aedd94cc68cfaebe35caf44fb55671658accf8aa268f886b2b43c4a1b53286337fb6a153
-
Filesize
433KB
MD5da5560977d117d0599736e18dd15c38e
SHA1af0c9cfc814c17ab97b56d69bd225fb89be26873
SHA256c67ea229d1060a9e302854fb853b81ab1bc474c3995cc9ad798ac88346aeff33
SHA512e15bbbd8546d37d92e60332df80f6ae0c34b9098d11399534126be75aedd94cc68cfaebe35caf44fb55671658accf8aa268f886b2b43c4a1b53286337fb6a153
-
Filesize
175KB
MD55f1478fce8759047873d45df93e4ea03
SHA164c1a7207d1f3a559d229f521d06707379ba1a18
SHA256a8d50a5d7a6a1ce5c3444c671c2f68ae5645724f6ea95b64eeef7dd11b80e7c2
SHA512104d0cd97b63fc8957056878ed6f6186a331fccf877ee354879e23e22cb306702ed611f1dae0a435b89e87f3a7fbd0015c95b17b12e2b3224faaefd1a5abdf84
-
Filesize
175KB
MD55f1478fce8759047873d45df93e4ea03
SHA164c1a7207d1f3a559d229f521d06707379ba1a18
SHA256a8d50a5d7a6a1ce5c3444c671c2f68ae5645724f6ea95b64eeef7dd11b80e7c2
SHA512104d0cd97b63fc8957056878ed6f6186a331fccf877ee354879e23e22cb306702ed611f1dae0a435b89e87f3a7fbd0015c95b17b12e2b3224faaefd1a5abdf84
-
Filesize
277KB
MD55e2bb32ca35ba1b8db09f5a4606ed84b
SHA111d4e1e13109fad25365e80ecd14e3bcfcd67122
SHA256910e387b84469580a3fc28d361bc9793c330dbf584ce671e976aacf541d72e08
SHA5125037fdbe56796395f8c922aa2d667c209a238f92a5376ebfc7a6dbdcbf613f7d9f0943146cde9f9a8a1c56b4dd25b6c3dca727ce23ad45174a05662b22482765
-
Filesize
277KB
MD55e2bb32ca35ba1b8db09f5a4606ed84b
SHA111d4e1e13109fad25365e80ecd14e3bcfcd67122
SHA256910e387b84469580a3fc28d361bc9793c330dbf584ce671e976aacf541d72e08
SHA5125037fdbe56796395f8c922aa2d667c209a238f92a5376ebfc7a6dbdcbf613f7d9f0943146cde9f9a8a1c56b4dd25b6c3dca727ce23ad45174a05662b22482765
-
Filesize
16KB
MD5cc7fc0e893ebe04b73138e8b8b4622fb
SHA100e52867f1d8886700cd36fb44090e0fa3a3fe1d
SHA256b4400922702ebbea55494c91ea6d025c2ac531740360518c49dfe15cfe9d4785
SHA512d9b6adc134ccdf4a7c4279b98d9686c5fb69671f2a291dcb6885ddd1a67746be3270781e743233a6276e6fbe2253c5dbcb9e279395aff6e08c45b8ff3bb182e5
-
Filesize
16KB
MD5cc7fc0e893ebe04b73138e8b8b4622fb
SHA100e52867f1d8886700cd36fb44090e0fa3a3fe1d
SHA256b4400922702ebbea55494c91ea6d025c2ac531740360518c49dfe15cfe9d4785
SHA512d9b6adc134ccdf4a7c4279b98d9686c5fb69671f2a291dcb6885ddd1a67746be3270781e743233a6276e6fbe2253c5dbcb9e279395aff6e08c45b8ff3bb182e5
-
Filesize
325KB
MD584e464a452030f792fa67de9d7f5dafa
SHA101fd852c41271ae61c1b187c8e22a818e9420e2b
SHA2562b5011b395ce5a25135251fcdbc07c350077e9f040dde83f8787140ad1979fb3
SHA51249760339b9d9279e150da54e4eb5d9b5d057285c442fd237165d0c062ecbbe74d31a924adae771d4ad503d67c913224930fb6c53ff53407e95b43a02d074e1d8
-
Filesize
325KB
MD584e464a452030f792fa67de9d7f5dafa
SHA101fd852c41271ae61c1b187c8e22a818e9420e2b
SHA2562b5011b395ce5a25135251fcdbc07c350077e9f040dde83f8787140ad1979fb3
SHA51249760339b9d9279e150da54e4eb5d9b5d057285c442fd237165d0c062ecbbe74d31a924adae771d4ad503d67c913224930fb6c53ff53407e95b43a02d074e1d8
-
Filesize
325KB
MD584e464a452030f792fa67de9d7f5dafa
SHA101fd852c41271ae61c1b187c8e22a818e9420e2b
SHA2562b5011b395ce5a25135251fcdbc07c350077e9f040dde83f8787140ad1979fb3
SHA51249760339b9d9279e150da54e4eb5d9b5d057285c442fd237165d0c062ecbbe74d31a924adae771d4ad503d67c913224930fb6c53ff53407e95b43a02d074e1d8
-
Filesize
325KB
MD584e464a452030f792fa67de9d7f5dafa
SHA101fd852c41271ae61c1b187c8e22a818e9420e2b
SHA2562b5011b395ce5a25135251fcdbc07c350077e9f040dde83f8787140ad1979fb3
SHA51249760339b9d9279e150da54e4eb5d9b5d057285c442fd237165d0c062ecbbe74d31a924adae771d4ad503d67c913224930fb6c53ff53407e95b43a02d074e1d8
-
Filesize
325KB
MD584e464a452030f792fa67de9d7f5dafa
SHA101fd852c41271ae61c1b187c8e22a818e9420e2b
SHA2562b5011b395ce5a25135251fcdbc07c350077e9f040dde83f8787140ad1979fb3
SHA51249760339b9d9279e150da54e4eb5d9b5d057285c442fd237165d0c062ecbbe74d31a924adae771d4ad503d67c913224930fb6c53ff53407e95b43a02d074e1d8
-
Filesize
325KB
MD584e464a452030f792fa67de9d7f5dafa
SHA101fd852c41271ae61c1b187c8e22a818e9420e2b
SHA2562b5011b395ce5a25135251fcdbc07c350077e9f040dde83f8787140ad1979fb3
SHA51249760339b9d9279e150da54e4eb5d9b5d057285c442fd237165d0c062ecbbe74d31a924adae771d4ad503d67c913224930fb6c53ff53407e95b43a02d074e1d8
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b