Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
30/08/2023, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
e15e8859faa39ca6b7cfcd12e85e199137beea9b181b054440b79945d5ffec37.exe
Resource
win10-20230703-en
General
-
Target
e15e8859faa39ca6b7cfcd12e85e199137beea9b181b054440b79945d5ffec37.exe
-
Size
701KB
-
MD5
4b7df45cdffc5dd3b357b82cc7d2989e
-
SHA1
a32564988cbf0fd1cd89c6d885d7c8f8d6ded667
-
SHA256
e15e8859faa39ca6b7cfcd12e85e199137beea9b181b054440b79945d5ffec37
-
SHA512
04e11c4962d218cb1a12370b679fc8cf52858267c8d34c313dacbaf058343a26dded1938b45d9062f51d45faac6c6442b897865601c23687e0711d7551e9f178
-
SSDEEP
12288:XMrTy90KvMcUvX5zJoucOxq5HNbjLdCAVli3JKMZyAic/zVc:4yBUvJdo5eq9BjE0ldME2c
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afb9-26.dat healer behavioral1/files/0x000700000001afb9-27.dat healer behavioral1/memory/4344-28-0x00000000004B0000-0x00000000004BA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g4619039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g4619039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g4619039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g4619039.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g4619039.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 3536 x9256473.exe 4564 x5374123.exe 428 x4993337.exe 4344 g4619039.exe 4212 h8246011.exe 4500 saves.exe 1264 i5405720.exe 1220 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4620 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g4619039.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e15e8859faa39ca6b7cfcd12e85e199137beea9b181b054440b79945d5ffec37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9256473.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5374123.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4993337.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 948 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4344 g4619039.exe 4344 g4619039.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4344 g4619039.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4724 wrote to memory of 3536 4724 e15e8859faa39ca6b7cfcd12e85e199137beea9b181b054440b79945d5ffec37.exe 70 PID 4724 wrote to memory of 3536 4724 e15e8859faa39ca6b7cfcd12e85e199137beea9b181b054440b79945d5ffec37.exe 70 PID 4724 wrote to memory of 3536 4724 e15e8859faa39ca6b7cfcd12e85e199137beea9b181b054440b79945d5ffec37.exe 70 PID 3536 wrote to memory of 4564 3536 x9256473.exe 71 PID 3536 wrote to memory of 4564 3536 x9256473.exe 71 PID 3536 wrote to memory of 4564 3536 x9256473.exe 71 PID 4564 wrote to memory of 428 4564 x5374123.exe 72 PID 4564 wrote to memory of 428 4564 x5374123.exe 72 PID 4564 wrote to memory of 428 4564 x5374123.exe 72 PID 428 wrote to memory of 4344 428 x4993337.exe 73 PID 428 wrote to memory of 4344 428 x4993337.exe 73 PID 428 wrote to memory of 4212 428 x4993337.exe 74 PID 428 wrote to memory of 4212 428 x4993337.exe 74 PID 428 wrote to memory of 4212 428 x4993337.exe 74 PID 4212 wrote to memory of 4500 4212 h8246011.exe 75 PID 4212 wrote to memory of 4500 4212 h8246011.exe 75 PID 4212 wrote to memory of 4500 4212 h8246011.exe 75 PID 4564 wrote to memory of 1264 4564 x5374123.exe 76 PID 4564 wrote to memory of 1264 4564 x5374123.exe 76 PID 4564 wrote to memory of 1264 4564 x5374123.exe 76 PID 4500 wrote to memory of 948 4500 saves.exe 77 PID 4500 wrote to memory of 948 4500 saves.exe 77 PID 4500 wrote to memory of 948 4500 saves.exe 77 PID 4500 wrote to memory of 3808 4500 saves.exe 79 PID 4500 wrote to memory of 3808 4500 saves.exe 79 PID 4500 wrote to memory of 3808 4500 saves.exe 79 PID 3808 wrote to memory of 4032 3808 cmd.exe 81 PID 3808 wrote to memory of 4032 3808 cmd.exe 81 PID 3808 wrote to memory of 4032 3808 cmd.exe 81 PID 3808 wrote to memory of 3812 3808 cmd.exe 82 PID 3808 wrote to memory of 3812 3808 cmd.exe 82 PID 3808 wrote to memory of 3812 3808 cmd.exe 82 PID 3808 wrote to memory of 2844 3808 cmd.exe 83 PID 3808 wrote to memory of 2844 3808 cmd.exe 83 PID 3808 wrote to memory of 2844 3808 cmd.exe 83 PID 3808 wrote to memory of 2732 3808 cmd.exe 84 PID 3808 wrote to memory of 2732 3808 cmd.exe 84 PID 3808 wrote to memory of 2732 3808 cmd.exe 84 PID 3808 wrote to memory of 4404 3808 cmd.exe 85 PID 3808 wrote to memory of 4404 3808 cmd.exe 85 PID 3808 wrote to memory of 4404 3808 cmd.exe 85 PID 3808 wrote to memory of 1320 3808 cmd.exe 86 PID 3808 wrote to memory of 1320 3808 cmd.exe 86 PID 3808 wrote to memory of 1320 3808 cmd.exe 86 PID 4500 wrote to memory of 4620 4500 saves.exe 87 PID 4500 wrote to memory of 4620 4500 saves.exe 87 PID 4500 wrote to memory of 4620 4500 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e15e8859faa39ca6b7cfcd12e85e199137beea9b181b054440b79945d5ffec37.exe"C:\Users\Admin\AppData\Local\Temp\e15e8859faa39ca6b7cfcd12e85e199137beea9b181b054440b79945d5ffec37.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9256473.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9256473.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5374123.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5374123.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4993337.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4993337.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4619039.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4619039.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8246011.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8246011.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2732
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4404
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1320
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5405720.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i5405720.exe4⤵
- Executes dropped EXE
PID:1264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1220
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD54463e66f0e62334f70ebc655e3359ba8
SHA1d55879378b24f58bd7d9f597b09faa519937807b
SHA25677f5150f9c3400abd4cb7c342a9809f7eeb7ceb2a6b6de07e4ab58adfe088d8b
SHA512c80c3814939ba2fb88bc3dd285e0fc3b83cabf67ff1cc8da5a0447dc909dd0353377de7c2b600248460cc387e961475b85ebcd5bcaf4a0b1de7f78ad5d7583d1
-
Filesize
598KB
MD54463e66f0e62334f70ebc655e3359ba8
SHA1d55879378b24f58bd7d9f597b09faa519937807b
SHA25677f5150f9c3400abd4cb7c342a9809f7eeb7ceb2a6b6de07e4ab58adfe088d8b
SHA512c80c3814939ba2fb88bc3dd285e0fc3b83cabf67ff1cc8da5a0447dc909dd0353377de7c2b600248460cc387e961475b85ebcd5bcaf4a0b1de7f78ad5d7583d1
-
Filesize
432KB
MD590001a3d892dcbd6d2ab8b03f9523803
SHA1710b2aa107609fdcb9cc2779e400ad37ee96fe9c
SHA256a75c8d4adab6d5123c9e03aa481edf6995c5e018c09377cee1e5b8cc3470435a
SHA512e93f10f17d5234d5e38e6cbae70ae667726a1c8e2e40a722dcf03307a19d0d647397789c7f6e82191bc94edf0855947b673cd7139048551ddd1003cfc14e6c59
-
Filesize
432KB
MD590001a3d892dcbd6d2ab8b03f9523803
SHA1710b2aa107609fdcb9cc2779e400ad37ee96fe9c
SHA256a75c8d4adab6d5123c9e03aa481edf6995c5e018c09377cee1e5b8cc3470435a
SHA512e93f10f17d5234d5e38e6cbae70ae667726a1c8e2e40a722dcf03307a19d0d647397789c7f6e82191bc94edf0855947b673cd7139048551ddd1003cfc14e6c59
-
Filesize
175KB
MD54500c6995b39c29b4c9320fd5178db40
SHA1020152b99d122305a6d8f60ffed64392412bf5d8
SHA25644604a6d44e62869825f4c59c7607859dee631e8ff3fa0f89c50f0e1f8ab0f10
SHA5120c28d343e3f59498990da1eeb53dca219e945c4183d9c573abc6e172597a4eb86dc5f64aafa053c146dfcd23ee1441aa6e099f2c1e79b077b553d84bcf04d0a7
-
Filesize
175KB
MD54500c6995b39c29b4c9320fd5178db40
SHA1020152b99d122305a6d8f60ffed64392412bf5d8
SHA25644604a6d44e62869825f4c59c7607859dee631e8ff3fa0f89c50f0e1f8ab0f10
SHA5120c28d343e3f59498990da1eeb53dca219e945c4183d9c573abc6e172597a4eb86dc5f64aafa053c146dfcd23ee1441aa6e099f2c1e79b077b553d84bcf04d0a7
-
Filesize
277KB
MD5af2f3531f08e0b5b2d9489bad49aa531
SHA100f090fc384538de1bb2767eef8a4cb3fe1d9a23
SHA256e0b08b77536de725816ec31d20edfd023241dcf223919ea2458437e64e4d1f95
SHA512ce8213ea1352b65fa1ec38f79f4cee051e34538f1317d8c30611e6ac6f94b413b1d325dfe235aa5cfc982e39d42b140386dd85e3d3d773868f587ade545ea62f
-
Filesize
277KB
MD5af2f3531f08e0b5b2d9489bad49aa531
SHA100f090fc384538de1bb2767eef8a4cb3fe1d9a23
SHA256e0b08b77536de725816ec31d20edfd023241dcf223919ea2458437e64e4d1f95
SHA512ce8213ea1352b65fa1ec38f79f4cee051e34538f1317d8c30611e6ac6f94b413b1d325dfe235aa5cfc982e39d42b140386dd85e3d3d773868f587ade545ea62f
-
Filesize
17KB
MD5d2c725929bde67e65ee2627bf9978359
SHA185e551ace7799732df67f3632d777262e02fc565
SHA256c4a5b6013d15cf06f91292c6a0f94c287efadacbaf4c146443e79376338d27f4
SHA512652212ebf954065e4f61de08abd909b824867aee4a63ef30e61ebb17857f67220922eb3ddad569e25500a00965fcbe8bacd8f8a3cbcbb9e84d3079e0eef02d2e
-
Filesize
17KB
MD5d2c725929bde67e65ee2627bf9978359
SHA185e551ace7799732df67f3632d777262e02fc565
SHA256c4a5b6013d15cf06f91292c6a0f94c287efadacbaf4c146443e79376338d27f4
SHA512652212ebf954065e4f61de08abd909b824867aee4a63ef30e61ebb17857f67220922eb3ddad569e25500a00965fcbe8bacd8f8a3cbcbb9e84d3079e0eef02d2e
-
Filesize
327KB
MD523ac6fa853ef0773b9984d5e857d19a4
SHA1ea0c27f07ef53fe14cbbeb3ef077d8d475fd5484
SHA256c84887e15c4545d8ac5a6fa959349f563ffe3c40ff7f59141052dc0a4f64b8f2
SHA512130a423e35c92b6b08692b2915b7f40b29f80ba6126ad83bb10ac0c8cd77745b23f07ac8afed4fbda23da24ad8a7efda1a52619057539c1639c9f4fb8cefa30d
-
Filesize
327KB
MD523ac6fa853ef0773b9984d5e857d19a4
SHA1ea0c27f07ef53fe14cbbeb3ef077d8d475fd5484
SHA256c84887e15c4545d8ac5a6fa959349f563ffe3c40ff7f59141052dc0a4f64b8f2
SHA512130a423e35c92b6b08692b2915b7f40b29f80ba6126ad83bb10ac0c8cd77745b23f07ac8afed4fbda23da24ad8a7efda1a52619057539c1639c9f4fb8cefa30d
-
Filesize
327KB
MD523ac6fa853ef0773b9984d5e857d19a4
SHA1ea0c27f07ef53fe14cbbeb3ef077d8d475fd5484
SHA256c84887e15c4545d8ac5a6fa959349f563ffe3c40ff7f59141052dc0a4f64b8f2
SHA512130a423e35c92b6b08692b2915b7f40b29f80ba6126ad83bb10ac0c8cd77745b23f07ac8afed4fbda23da24ad8a7efda1a52619057539c1639c9f4fb8cefa30d
-
Filesize
327KB
MD523ac6fa853ef0773b9984d5e857d19a4
SHA1ea0c27f07ef53fe14cbbeb3ef077d8d475fd5484
SHA256c84887e15c4545d8ac5a6fa959349f563ffe3c40ff7f59141052dc0a4f64b8f2
SHA512130a423e35c92b6b08692b2915b7f40b29f80ba6126ad83bb10ac0c8cd77745b23f07ac8afed4fbda23da24ad8a7efda1a52619057539c1639c9f4fb8cefa30d
-
Filesize
327KB
MD523ac6fa853ef0773b9984d5e857d19a4
SHA1ea0c27f07ef53fe14cbbeb3ef077d8d475fd5484
SHA256c84887e15c4545d8ac5a6fa959349f563ffe3c40ff7f59141052dc0a4f64b8f2
SHA512130a423e35c92b6b08692b2915b7f40b29f80ba6126ad83bb10ac0c8cd77745b23f07ac8afed4fbda23da24ad8a7efda1a52619057539c1639c9f4fb8cefa30d
-
Filesize
327KB
MD523ac6fa853ef0773b9984d5e857d19a4
SHA1ea0c27f07ef53fe14cbbeb3ef077d8d475fd5484
SHA256c84887e15c4545d8ac5a6fa959349f563ffe3c40ff7f59141052dc0a4f64b8f2
SHA512130a423e35c92b6b08692b2915b7f40b29f80ba6126ad83bb10ac0c8cd77745b23f07ac8afed4fbda23da24ad8a7efda1a52619057539c1639c9f4fb8cefa30d
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b