Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2023, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
edf02850ec85408c916b54f9598444504ae97ed1790dd2629b5a258d57552690.exe
Resource
win10v2004-20230703-en
General
-
Target
edf02850ec85408c916b54f9598444504ae97ed1790dd2629b5a258d57552690.exe
-
Size
825KB
-
MD5
78c7c1b9bf75ecf365ef00f7438671bb
-
SHA1
c6da61f55d033ac2deb3a89f54b4ec9b7e36d94d
-
SHA256
edf02850ec85408c916b54f9598444504ae97ed1790dd2629b5a258d57552690
-
SHA512
75bb016db995383c8d11e6715beca615f55575dfb9729bd975a0807c1347b013c68034eedfd6287e2d4d24d0bc9ccdcb71fd3ef95800f31d99d41533a14ac883
-
SSDEEP
12288:PMroy907xHt0DSDiZHZwwCtXnN/+N5uK220Z0jt3kImcmBK3QQfEMU0ZmpX9OJF9:/y68BHZwVr1viR7tmIQQfEkONUF9
Malware Config
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000002320e-34.dat healer behavioral1/files/0x000700000002320e-33.dat healer behavioral1/memory/4732-35-0x00000000003D0000-0x00000000003DA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7621900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7621900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7621900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7621900.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7621900.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7621900.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4708 v9037539.exe 3628 v1971596.exe 3220 v4559448.exe 4328 v6887790.exe 4732 a7621900.exe 3480 b0668543.exe 3008 c9673953.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7621900.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1971596.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4559448.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v6887790.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" edf02850ec85408c916b54f9598444504ae97ed1790dd2629b5a258d57552690.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9037539.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4732 a7621900.exe 4732 a7621900.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4732 a7621900.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4708 4824 edf02850ec85408c916b54f9598444504ae97ed1790dd2629b5a258d57552690.exe 82 PID 4824 wrote to memory of 4708 4824 edf02850ec85408c916b54f9598444504ae97ed1790dd2629b5a258d57552690.exe 82 PID 4824 wrote to memory of 4708 4824 edf02850ec85408c916b54f9598444504ae97ed1790dd2629b5a258d57552690.exe 82 PID 4708 wrote to memory of 3628 4708 v9037539.exe 83 PID 4708 wrote to memory of 3628 4708 v9037539.exe 83 PID 4708 wrote to memory of 3628 4708 v9037539.exe 83 PID 3628 wrote to memory of 3220 3628 v1971596.exe 84 PID 3628 wrote to memory of 3220 3628 v1971596.exe 84 PID 3628 wrote to memory of 3220 3628 v1971596.exe 84 PID 3220 wrote to memory of 4328 3220 v4559448.exe 85 PID 3220 wrote to memory of 4328 3220 v4559448.exe 85 PID 3220 wrote to memory of 4328 3220 v4559448.exe 85 PID 4328 wrote to memory of 4732 4328 v6887790.exe 86 PID 4328 wrote to memory of 4732 4328 v6887790.exe 86 PID 4328 wrote to memory of 3480 4328 v6887790.exe 94 PID 4328 wrote to memory of 3480 4328 v6887790.exe 94 PID 4328 wrote to memory of 3480 4328 v6887790.exe 94 PID 3220 wrote to memory of 3008 3220 v4559448.exe 95 PID 3220 wrote to memory of 3008 3220 v4559448.exe 95 PID 3220 wrote to memory of 3008 3220 v4559448.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\edf02850ec85408c916b54f9598444504ae97ed1790dd2629b5a258d57552690.exe"C:\Users\Admin\AppData\Local\Temp\edf02850ec85408c916b54f9598444504ae97ed1790dd2629b5a258d57552690.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9037539.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9037539.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1971596.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1971596.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4559448.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4559448.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6887790.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6887790.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7621900.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a7621900.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0668543.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0668543.exe6⤵
- Executes dropped EXE
PID:3480
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9673953.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9673953.exe5⤵
- Executes dropped EXE
PID:3008
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722KB
MD5286d95705938152f9c5560acba5dd041
SHA1ba684c62b426c61c001446040148aaa359829182
SHA2563a8aef9d921cae941026d92e79da55e3a6291c9203f1b7c70e7076c4ef390914
SHA51247a24a7e5123e55c7156f5676f9fc2c91d6476510ec3220669c14fdc80b9df68ee0388a3e1d1768b29ccf8069ce358ad08cd2b1fea74efacce1b538a67ac9d62
-
Filesize
722KB
MD5286d95705938152f9c5560acba5dd041
SHA1ba684c62b426c61c001446040148aaa359829182
SHA2563a8aef9d921cae941026d92e79da55e3a6291c9203f1b7c70e7076c4ef390914
SHA51247a24a7e5123e55c7156f5676f9fc2c91d6476510ec3220669c14fdc80b9df68ee0388a3e1d1768b29ccf8069ce358ad08cd2b1fea74efacce1b538a67ac9d62
-
Filesize
497KB
MD59fe5593878fcaaaf156dde73de9c96bb
SHA102d60386c5b0a419f50e37c5fe788134553054c0
SHA2563c18a6c3656dbd800699c7cc111519b6b50a528070465f0a6a0b6432ff2381b3
SHA51264851f6008a1bb13a3acc7d91533f06a0929bdb19616e39e8012b3344de2753c1808c954532a275bf068b85a795d2d5599113038bf01e11e7f687fcbcbdba7a9
-
Filesize
497KB
MD59fe5593878fcaaaf156dde73de9c96bb
SHA102d60386c5b0a419f50e37c5fe788134553054c0
SHA2563c18a6c3656dbd800699c7cc111519b6b50a528070465f0a6a0b6432ff2381b3
SHA51264851f6008a1bb13a3acc7d91533f06a0929bdb19616e39e8012b3344de2753c1808c954532a275bf068b85a795d2d5599113038bf01e11e7f687fcbcbdba7a9
-
Filesize
372KB
MD52f3737916d727e03ceff5efa81e159a1
SHA18d69e870e00b0c6282c2d5a283645663cb22932b
SHA256593f44df33abb8e8d58ae39874dfcedbfd9cc5f70a791d14d498ab9ed2056cf1
SHA5120e6d70d4afe0fb0a68ad2678ef00a027b4036d766bb533840363574b556ab56adf4aa97d50ea5fb99f0b73c2f0d4029e4f6b2af3fe573933f82bf3687880d2ba
-
Filesize
372KB
MD52f3737916d727e03ceff5efa81e159a1
SHA18d69e870e00b0c6282c2d5a283645663cb22932b
SHA256593f44df33abb8e8d58ae39874dfcedbfd9cc5f70a791d14d498ab9ed2056cf1
SHA5120e6d70d4afe0fb0a68ad2678ef00a027b4036d766bb533840363574b556ab56adf4aa97d50ea5fb99f0b73c2f0d4029e4f6b2af3fe573933f82bf3687880d2ba
-
Filesize
175KB
MD50ab2f943e76ca010774ee2ad167640fa
SHA1fd0f081fc32a43daaa116c525e25ff910a387441
SHA2566019fe201faea4eae8622a7a943debe0d67e049e0a683ed2d70fc09ac88e2e63
SHA512811bc15d4296e51273ed1afbd7d4f82c7b201a9a072289d3fcd2aa73be7e7b1370aee71d1fef67770098bb2a3adf0f5883786c8c17da8935025f233e7c7bbdf5
-
Filesize
175KB
MD50ab2f943e76ca010774ee2ad167640fa
SHA1fd0f081fc32a43daaa116c525e25ff910a387441
SHA2566019fe201faea4eae8622a7a943debe0d67e049e0a683ed2d70fc09ac88e2e63
SHA512811bc15d4296e51273ed1afbd7d4f82c7b201a9a072289d3fcd2aa73be7e7b1370aee71d1fef67770098bb2a3adf0f5883786c8c17da8935025f233e7c7bbdf5
-
Filesize
217KB
MD5f54ba0023500a5aa471ef44793949019
SHA10ccc876bac8bc8f4752f2bd7c2d7d5be65e8eaa1
SHA2562594b7651f0473e9acc849750a0c81951a22559527b5520ab35cbd83824d8db1
SHA512dc445fa1f1a0b4efca0c2e847207ecfb7cca7c30e5661b3c879f3e2974737837a927a1d68c9ac97b3c1a5a8f200cd17a04f590f278d1ef7e97b9792a0131ae6c
-
Filesize
217KB
MD5f54ba0023500a5aa471ef44793949019
SHA10ccc876bac8bc8f4752f2bd7c2d7d5be65e8eaa1
SHA2562594b7651f0473e9acc849750a0c81951a22559527b5520ab35cbd83824d8db1
SHA512dc445fa1f1a0b4efca0c2e847207ecfb7cca7c30e5661b3c879f3e2974737837a927a1d68c9ac97b3c1a5a8f200cd17a04f590f278d1ef7e97b9792a0131ae6c
-
Filesize
16KB
MD518201f5d251f6a76e816dff0d5efa881
SHA1d5ed2375f673b8d635461ad0d86919024c712721
SHA256cc08424d24308e2e3e5fe821d41939ac8fd632349f11fe77b6b9dd6050e04bb3
SHA51295d139605364747a30e82b6bc9a0ab2260fb9b0c95f834d611ee9db89899a415ab67fdc00418cff6fe926c47d3aeb8e54a5789081ad3b541dd8f59e1863c6e8a
-
Filesize
16KB
MD518201f5d251f6a76e816dff0d5efa881
SHA1d5ed2375f673b8d635461ad0d86919024c712721
SHA256cc08424d24308e2e3e5fe821d41939ac8fd632349f11fe77b6b9dd6050e04bb3
SHA51295d139605364747a30e82b6bc9a0ab2260fb9b0c95f834d611ee9db89899a415ab67fdc00418cff6fe926c47d3aeb8e54a5789081ad3b541dd8f59e1863c6e8a
-
Filesize
140KB
MD50eb48cb3b1b0a0daeefc976a339165f1
SHA105dedf48d4d09993a13151beca6c01f9548f8dc2
SHA256580e9443f47c7b3eb81823dec4861ca9ea116b946cfdff62c44a27c919cbd2f3
SHA51261c313a7b335e6d28d2902ff6a138a7b4b4c16e9b9db464e8c653b913fe016d2663ba4e970f2b2167f7fb598db038bf8857bbc7d9d762b2f6bbab5584ef01e1f
-
Filesize
140KB
MD50eb48cb3b1b0a0daeefc976a339165f1
SHA105dedf48d4d09993a13151beca6c01f9548f8dc2
SHA256580e9443f47c7b3eb81823dec4861ca9ea116b946cfdff62c44a27c919cbd2f3
SHA51261c313a7b335e6d28d2902ff6a138a7b4b4c16e9b9db464e8c653b913fe016d2663ba4e970f2b2167f7fb598db038bf8857bbc7d9d762b2f6bbab5584ef01e1f