Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30/08/2023, 23:39

General

  • Target

    078b32e74b59d25e2c1029465c443e348f5ccce96ad38aefe084602e159bb269.exe

  • Size

    829KB

  • MD5

    9b4276a21214fc7cc06d4898e3fdd294

  • SHA1

    ae56bb1e8b80061cece9435f9cd7fc192b1d7a2a

  • SHA256

    078b32e74b59d25e2c1029465c443e348f5ccce96ad38aefe084602e159bb269

  • SHA512

    7fac4108c61da9a59a2dfa615ddb4c35e41861e006b7a880801ea5ba310863dd163a25a087851dfe86d4e8203879dbcaabdcaf93220fe5cab788ddcb60c18d08

  • SSDEEP

    12288:rMr/y90DxI7d8cA+viwMtP2GmEegMte+aGxAUxJtX49ggptIwBs8/JzTev5Bp27S:QyrRAdIGmZgMte+aGxAUu9gwKWz8Wfa

Malware Config

Extracted

Family

redline

Botnet

sruta

C2

77.91.124.82:19071

Attributes
  • auth_value

    c556edcd49703319eca74247de20c236

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\078b32e74b59d25e2c1029465c443e348f5ccce96ad38aefe084602e159bb269.exe
    "C:\Users\Admin\AppData\Local\Temp\078b32e74b59d25e2c1029465c443e348f5ccce96ad38aefe084602e159bb269.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7674824.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7674824.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1995668.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1995668.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4460
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0000798.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0000798.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3924
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9910508.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9910508.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2252
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0305907.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0305907.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3268
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3279509.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3279509.exe
              6⤵
              • Executes dropped EXE
              PID:1968
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4624685.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4624685.exe
            5⤵
            • Executes dropped EXE
            PID:1748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7674824.exe

    Filesize

    723KB

    MD5

    a7a6b51b2ea0e08d5906112d41c0a37e

    SHA1

    c51a7ee814d6a6df9503b71b05689b2395c99100

    SHA256

    2f0a13a09677b565567043f223bbad0e791c9f3d9b594a5755efc6ddf9404ff9

    SHA512

    aa6379b28dd6c7a1546be72c3fa0b0534c797ad0e0a5d942d63797d73347895b4b293ef750ee79122e03ff957a868951393c8d3cdf340af94b9654a7e1ab7d27

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7674824.exe

    Filesize

    723KB

    MD5

    a7a6b51b2ea0e08d5906112d41c0a37e

    SHA1

    c51a7ee814d6a6df9503b71b05689b2395c99100

    SHA256

    2f0a13a09677b565567043f223bbad0e791c9f3d9b594a5755efc6ddf9404ff9

    SHA512

    aa6379b28dd6c7a1546be72c3fa0b0534c797ad0e0a5d942d63797d73347895b4b293ef750ee79122e03ff957a868951393c8d3cdf340af94b9654a7e1ab7d27

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1995668.exe

    Filesize

    497KB

    MD5

    64211de802ea3164ebbd54d77c2fc750

    SHA1

    6a7fbb36e224a102f39f59117ca21856f0c403ae

    SHA256

    c7e6cc48075846d92bfea5fead31de8dfa3d7953f61401ba947853055dd6499b

    SHA512

    146f634d011f8e3fdde99925d5dee1f3dba73a617e5671b2cece15d4257ce3583c3888aa4464ee8e97315653b7f586e31c47713e86805bb5d6bab65b12de5e2d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1995668.exe

    Filesize

    497KB

    MD5

    64211de802ea3164ebbd54d77c2fc750

    SHA1

    6a7fbb36e224a102f39f59117ca21856f0c403ae

    SHA256

    c7e6cc48075846d92bfea5fead31de8dfa3d7953f61401ba947853055dd6499b

    SHA512

    146f634d011f8e3fdde99925d5dee1f3dba73a617e5671b2cece15d4257ce3583c3888aa4464ee8e97315653b7f586e31c47713e86805bb5d6bab65b12de5e2d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0000798.exe

    Filesize

    373KB

    MD5

    f0e54b07635e8a8257a60469018aac5c

    SHA1

    849b609f4bf6990aedcb42fae40b7a0354476038

    SHA256

    9c38369019ac6d01f4c9f29370d36eb15a2a513085393f7e8d39622bc25e6a44

    SHA512

    6e802da08af501a68141abd17eb81a470b00930744bf217ecc0e60338235cbb96c2dd063d6da80a4d4d16e68294223d78fe46acdeb19d64155cf0c796680c5f9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0000798.exe

    Filesize

    373KB

    MD5

    f0e54b07635e8a8257a60469018aac5c

    SHA1

    849b609f4bf6990aedcb42fae40b7a0354476038

    SHA256

    9c38369019ac6d01f4c9f29370d36eb15a2a513085393f7e8d39622bc25e6a44

    SHA512

    6e802da08af501a68141abd17eb81a470b00930744bf217ecc0e60338235cbb96c2dd063d6da80a4d4d16e68294223d78fe46acdeb19d64155cf0c796680c5f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4624685.exe

    Filesize

    175KB

    MD5

    9cf18f630bc013ea2c288b9fb4fcd6a4

    SHA1

    24078eedb9d1774218ee64ebdec9796880ac0125

    SHA256

    fffc9e75011272cea72619427a1ed111a08b7ce2d3c9c406fd55861dcd4559c9

    SHA512

    330bd6d654c6abcfc13f9b6b257a8aa70249ca8e68d088c63cf924fc0972091bc5fcce84310a3b9184f219d007995e4cbd417eed4785e3e355802b2083825231

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c4624685.exe

    Filesize

    175KB

    MD5

    9cf18f630bc013ea2c288b9fb4fcd6a4

    SHA1

    24078eedb9d1774218ee64ebdec9796880ac0125

    SHA256

    fffc9e75011272cea72619427a1ed111a08b7ce2d3c9c406fd55861dcd4559c9

    SHA512

    330bd6d654c6abcfc13f9b6b257a8aa70249ca8e68d088c63cf924fc0972091bc5fcce84310a3b9184f219d007995e4cbd417eed4785e3e355802b2083825231

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9910508.exe

    Filesize

    217KB

    MD5

    c7ff77aa749b384b89fbeb264398c75e

    SHA1

    8ebcd3d022cabd1d8bc65b4a45e35f0fd8a12a17

    SHA256

    4a88083625c48230b6ffab2ef5c8aba36c3d20b8993a62459d4b68fd08565b5f

    SHA512

    5481f1cc2acff51e033020537878b440f40c03db2c9730a058928b4159a4af86967c2a72eaa8dadaa127c087ae9d8cbd0c35130e118d660bd1623665f1007bf4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9910508.exe

    Filesize

    217KB

    MD5

    c7ff77aa749b384b89fbeb264398c75e

    SHA1

    8ebcd3d022cabd1d8bc65b4a45e35f0fd8a12a17

    SHA256

    4a88083625c48230b6ffab2ef5c8aba36c3d20b8993a62459d4b68fd08565b5f

    SHA512

    5481f1cc2acff51e033020537878b440f40c03db2c9730a058928b4159a4af86967c2a72eaa8dadaa127c087ae9d8cbd0c35130e118d660bd1623665f1007bf4

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0305907.exe

    Filesize

    18KB

    MD5

    f7612e9010fbb8f1b03d019a2db75a6b

    SHA1

    a9492b563fda17fb6d83347b169a83f47a3f6395

    SHA256

    720f54c95d95e491ba2a9cdbe637419870cb955856ec3db555423f6d22dd2380

    SHA512

    67bf2d7485c0404ef865e14b57bcc3a403192cfb7d2bbdae5f91d83667d9227e037136a8cc1e4a2c59b9933c278196a98bd9f00d3efcbea76c9694afbc35d73f

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a0305907.exe

    Filesize

    18KB

    MD5

    f7612e9010fbb8f1b03d019a2db75a6b

    SHA1

    a9492b563fda17fb6d83347b169a83f47a3f6395

    SHA256

    720f54c95d95e491ba2a9cdbe637419870cb955856ec3db555423f6d22dd2380

    SHA512

    67bf2d7485c0404ef865e14b57bcc3a403192cfb7d2bbdae5f91d83667d9227e037136a8cc1e4a2c59b9933c278196a98bd9f00d3efcbea76c9694afbc35d73f

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3279509.exe

    Filesize

    140KB

    MD5

    e2e61b8d433ad4a9f4f0bac71dfed955

    SHA1

    9a9d699e395f39bc3dab218535ed09ea2fdf76d1

    SHA256

    eaad94231b080c32817040ddda5d02a71d6edf7143a224a2e7b8fec21ec19bbc

    SHA512

    46fd2dad5c4b7f134094892f2616cfa9e4ee5ad44f56780c9f008a91a88f57f25d190125bb07a61b1fe736a23ed919bed0333328f243cf813a1d5947672b1098

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b3279509.exe

    Filesize

    140KB

    MD5

    e2e61b8d433ad4a9f4f0bac71dfed955

    SHA1

    9a9d699e395f39bc3dab218535ed09ea2fdf76d1

    SHA256

    eaad94231b080c32817040ddda5d02a71d6edf7143a224a2e7b8fec21ec19bbc

    SHA512

    46fd2dad5c4b7f134094892f2616cfa9e4ee5ad44f56780c9f008a91a88f57f25d190125bb07a61b1fe736a23ed919bed0333328f243cf813a1d5947672b1098

  • memory/1748-46-0x0000000072D50000-0x000000007343E000-memory.dmp

    Filesize

    6.9MB

  • memory/1748-45-0x0000000000950000-0x0000000000980000-memory.dmp

    Filesize

    192KB

  • memory/1748-47-0x0000000002C20000-0x0000000002C26000-memory.dmp

    Filesize

    24KB

  • memory/1748-48-0x000000000AD30000-0x000000000B336000-memory.dmp

    Filesize

    6.0MB

  • memory/1748-49-0x000000000A830000-0x000000000A93A000-memory.dmp

    Filesize

    1.0MB

  • memory/1748-50-0x0000000005300000-0x0000000005312000-memory.dmp

    Filesize

    72KB

  • memory/1748-51-0x000000000A720000-0x000000000A75E000-memory.dmp

    Filesize

    248KB

  • memory/1748-52-0x0000000005330000-0x000000000537B000-memory.dmp

    Filesize

    300KB

  • memory/1748-53-0x0000000072D50000-0x000000007343E000-memory.dmp

    Filesize

    6.9MB

  • memory/3268-38-0x00007FF91CC90000-0x00007FF91D67C000-memory.dmp

    Filesize

    9.9MB

  • memory/3268-36-0x00007FF91CC90000-0x00007FF91D67C000-memory.dmp

    Filesize

    9.9MB

  • memory/3268-35-0x0000000000300000-0x000000000030A000-memory.dmp

    Filesize

    40KB