Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
31/08/2023, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
c6f8ee96597231bc210e2edd34ef1c4ff5fa7d0994ce80709e15bbcb49837c09.exe
Resource
win10-20230703-en
General
-
Target
c6f8ee96597231bc210e2edd34ef1c4ff5fa7d0994ce80709e15bbcb49837c09.exe
-
Size
704KB
-
MD5
fe2f810291c26e12f798b77521d79190
-
SHA1
dad0c4d454aed7fb054fb25c3b5be0561196900f
-
SHA256
c6f8ee96597231bc210e2edd34ef1c4ff5fa7d0994ce80709e15bbcb49837c09
-
SHA512
710508e2bdb1aad3c17c29fa581455e7f7b117087e9465b577bf6efe3db8c34542b15c6d84f01ac543feb54119b1871b55bfe499c3dab5c5484e1adbbd917d6f
-
SSDEEP
12288:wMrZy90C7kZCbQSSe/WXjt+6Mt0CApxyjcJO4NXdZT5b/BCOfyzi/RETeah:5yT1J6kpAmcJO4NnjUi/sR
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001b064-26.dat healer behavioral1/files/0x000700000001b064-27.dat healer behavioral1/memory/2052-28-0x0000000000DB0000-0x0000000000DBA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g5001077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g5001077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g5001077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g5001077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g5001077.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 808 x9080437.exe 4032 x3317758.exe 1112 x4337420.exe 2052 g5001077.exe 3124 h5950295.exe 3728 saves.exe 1508 i8581510.exe 5036 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4948 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g5001077.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3317758.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4337420.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6f8ee96597231bc210e2edd34ef1c4ff5fa7d0994ce80709e15bbcb49837c09.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9080437.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2052 g5001077.exe 2052 g5001077.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2052 g5001077.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 724 wrote to memory of 808 724 c6f8ee96597231bc210e2edd34ef1c4ff5fa7d0994ce80709e15bbcb49837c09.exe 70 PID 724 wrote to memory of 808 724 c6f8ee96597231bc210e2edd34ef1c4ff5fa7d0994ce80709e15bbcb49837c09.exe 70 PID 724 wrote to memory of 808 724 c6f8ee96597231bc210e2edd34ef1c4ff5fa7d0994ce80709e15bbcb49837c09.exe 70 PID 808 wrote to memory of 4032 808 x9080437.exe 71 PID 808 wrote to memory of 4032 808 x9080437.exe 71 PID 808 wrote to memory of 4032 808 x9080437.exe 71 PID 4032 wrote to memory of 1112 4032 x3317758.exe 72 PID 4032 wrote to memory of 1112 4032 x3317758.exe 72 PID 4032 wrote to memory of 1112 4032 x3317758.exe 72 PID 1112 wrote to memory of 2052 1112 x4337420.exe 73 PID 1112 wrote to memory of 2052 1112 x4337420.exe 73 PID 1112 wrote to memory of 3124 1112 x4337420.exe 74 PID 1112 wrote to memory of 3124 1112 x4337420.exe 74 PID 1112 wrote to memory of 3124 1112 x4337420.exe 74 PID 3124 wrote to memory of 3728 3124 h5950295.exe 75 PID 3124 wrote to memory of 3728 3124 h5950295.exe 75 PID 3124 wrote to memory of 3728 3124 h5950295.exe 75 PID 4032 wrote to memory of 1508 4032 x3317758.exe 76 PID 4032 wrote to memory of 1508 4032 x3317758.exe 76 PID 4032 wrote to memory of 1508 4032 x3317758.exe 76 PID 3728 wrote to memory of 5028 3728 saves.exe 77 PID 3728 wrote to memory of 5028 3728 saves.exe 77 PID 3728 wrote to memory of 5028 3728 saves.exe 77 PID 3728 wrote to memory of 5020 3728 saves.exe 78 PID 3728 wrote to memory of 5020 3728 saves.exe 78 PID 3728 wrote to memory of 5020 3728 saves.exe 78 PID 5020 wrote to memory of 4408 5020 cmd.exe 81 PID 5020 wrote to memory of 4408 5020 cmd.exe 81 PID 5020 wrote to memory of 4408 5020 cmd.exe 81 PID 5020 wrote to memory of 5076 5020 cmd.exe 82 PID 5020 wrote to memory of 5076 5020 cmd.exe 82 PID 5020 wrote to memory of 5076 5020 cmd.exe 82 PID 5020 wrote to memory of 2532 5020 cmd.exe 83 PID 5020 wrote to memory of 2532 5020 cmd.exe 83 PID 5020 wrote to memory of 2532 5020 cmd.exe 83 PID 5020 wrote to memory of 1948 5020 cmd.exe 84 PID 5020 wrote to memory of 1948 5020 cmd.exe 84 PID 5020 wrote to memory of 1948 5020 cmd.exe 84 PID 5020 wrote to memory of 676 5020 cmd.exe 85 PID 5020 wrote to memory of 676 5020 cmd.exe 85 PID 5020 wrote to memory of 676 5020 cmd.exe 85 PID 5020 wrote to memory of 1908 5020 cmd.exe 86 PID 5020 wrote to memory of 1908 5020 cmd.exe 86 PID 5020 wrote to memory of 1908 5020 cmd.exe 86 PID 3728 wrote to memory of 4948 3728 saves.exe 88 PID 3728 wrote to memory of 4948 3728 saves.exe 88 PID 3728 wrote to memory of 4948 3728 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6f8ee96597231bc210e2edd34ef1c4ff5fa7d0994ce80709e15bbcb49837c09.exe"C:\Users\Admin\AppData\Local\Temp\c6f8ee96597231bc210e2edd34ef1c4ff5fa7d0994ce80709e15bbcb49837c09.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9080437.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9080437.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3317758.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3317758.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4337420.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4337420.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5001077.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5001077.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5950295.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5950295.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:5028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4408
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:5076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1948
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1908
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4948
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8581510.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8581510.exe4⤵
- Executes dropped EXE
PID:1508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:5036
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD513a474924a3e5d8e4c4266ab5ff343e6
SHA142256806cf6b231e1a127ced9d6dad34a6995b06
SHA256a67e1c70d6a9b6b6e926e92208b09991bb9222ac4fe4a1e443123458376d557d
SHA512e06d1bd205a9022111d4b4e155c2ae4cb7b1dc3f209b8c9eef885ccdbe134833dda74911439607050446bde96263df9b8f189ae83d7cb09e3dbb04a5279d56aa
-
Filesize
599KB
MD513a474924a3e5d8e4c4266ab5ff343e6
SHA142256806cf6b231e1a127ced9d6dad34a6995b06
SHA256a67e1c70d6a9b6b6e926e92208b09991bb9222ac4fe4a1e443123458376d557d
SHA512e06d1bd205a9022111d4b4e155c2ae4cb7b1dc3f209b8c9eef885ccdbe134833dda74911439607050446bde96263df9b8f189ae83d7cb09e3dbb04a5279d56aa
-
Filesize
433KB
MD5e479598c5e873d3df882409281918d3b
SHA1b3dc7ef5eeccf4bfd4d05aee52cf35f6a48cde3c
SHA2564e529e958bf9fdb50856e35fb0524eb37cd9a940d0e46b4adebcfc28e326e106
SHA512a727819bd0cb7deaf2a910e7d789da60bbcfdb33e1913a0e872c000ee8188abbd73d0acc97c1eb44b1236da48b98d4e9b09d79dea30699182a1455ee4f4bdebf
-
Filesize
433KB
MD5e479598c5e873d3df882409281918d3b
SHA1b3dc7ef5eeccf4bfd4d05aee52cf35f6a48cde3c
SHA2564e529e958bf9fdb50856e35fb0524eb37cd9a940d0e46b4adebcfc28e326e106
SHA512a727819bd0cb7deaf2a910e7d789da60bbcfdb33e1913a0e872c000ee8188abbd73d0acc97c1eb44b1236da48b98d4e9b09d79dea30699182a1455ee4f4bdebf
-
Filesize
175KB
MD50627b48d799f6b163f791af0fd4bedd5
SHA18438ade4e78e033c4d752c85e8e12d0fd900214a
SHA256a0127fa334476cff395284449804ca511cab400479f63d9140f22c9694986314
SHA512492791c0f175ec7286e2c08f34a3677e6fa4266fdeba2d7f9be3b5ba79b1c7f9158e96b54e95e5908fda4c82209c389cddef5214be08f523b99e860ebbec59fa
-
Filesize
175KB
MD50627b48d799f6b163f791af0fd4bedd5
SHA18438ade4e78e033c4d752c85e8e12d0fd900214a
SHA256a0127fa334476cff395284449804ca511cab400479f63d9140f22c9694986314
SHA512492791c0f175ec7286e2c08f34a3677e6fa4266fdeba2d7f9be3b5ba79b1c7f9158e96b54e95e5908fda4c82209c389cddef5214be08f523b99e860ebbec59fa
-
Filesize
277KB
MD597b2c92235542ce25735fd9035081f61
SHA1c4e58d4c4eca3ceeeb6311ae33e395dd5ab88711
SHA2565ae65ee8a5304a41cb44e922e6decead6705f96dfe840804ea6f83af2e11bc94
SHA5126bc4e9910221d63032b02c3306f67090fa4401aa53ea4e071f5c1902f170b3273676a0e345631004529553fda28c35252962d51b4a3bbc1bb6c297983cc0f6db
-
Filesize
277KB
MD597b2c92235542ce25735fd9035081f61
SHA1c4e58d4c4eca3ceeeb6311ae33e395dd5ab88711
SHA2565ae65ee8a5304a41cb44e922e6decead6705f96dfe840804ea6f83af2e11bc94
SHA5126bc4e9910221d63032b02c3306f67090fa4401aa53ea4e071f5c1902f170b3273676a0e345631004529553fda28c35252962d51b4a3bbc1bb6c297983cc0f6db
-
Filesize
18KB
MD5a83558612e0e02b0a540623f17148ce9
SHA17bd345ec71ef1c842f10be0d556f8a4590513249
SHA256d7d682be322c2a400cd84b75395cf6801da102b506fa719237ca2d0c84459154
SHA51285a9ae37ce678c4e7ca3804084a8a0f2a4e5f4ddded9dfcd1bd1b71ead0e891e491a90adbd44075f40acbcd114599860dc23428c16135bf6fef7923439dad3b2
-
Filesize
18KB
MD5a83558612e0e02b0a540623f17148ce9
SHA17bd345ec71ef1c842f10be0d556f8a4590513249
SHA256d7d682be322c2a400cd84b75395cf6801da102b506fa719237ca2d0c84459154
SHA51285a9ae37ce678c4e7ca3804084a8a0f2a4e5f4ddded9dfcd1bd1b71ead0e891e491a90adbd44075f40acbcd114599860dc23428c16135bf6fef7923439dad3b2
-
Filesize
328KB
MD53e5007fd527f67e462238cd96c2fbc14
SHA13e3656c19fe7df897f6ab4bba0556cce0cc99f48
SHA2568881edcd89188e693aa8569bf25ae86ba126ba3693d670bf5c84adf91a6d0a16
SHA512ac597d99f690024679f32555da8032935855ce14928676a50accaf15471f726a238d2befe377185ac05de1dec368aad8a1fa9124f8d8275b10f8eb17238c0a45
-
Filesize
328KB
MD53e5007fd527f67e462238cd96c2fbc14
SHA13e3656c19fe7df897f6ab4bba0556cce0cc99f48
SHA2568881edcd89188e693aa8569bf25ae86ba126ba3693d670bf5c84adf91a6d0a16
SHA512ac597d99f690024679f32555da8032935855ce14928676a50accaf15471f726a238d2befe377185ac05de1dec368aad8a1fa9124f8d8275b10f8eb17238c0a45
-
Filesize
328KB
MD53e5007fd527f67e462238cd96c2fbc14
SHA13e3656c19fe7df897f6ab4bba0556cce0cc99f48
SHA2568881edcd89188e693aa8569bf25ae86ba126ba3693d670bf5c84adf91a6d0a16
SHA512ac597d99f690024679f32555da8032935855ce14928676a50accaf15471f726a238d2befe377185ac05de1dec368aad8a1fa9124f8d8275b10f8eb17238c0a45
-
Filesize
328KB
MD53e5007fd527f67e462238cd96c2fbc14
SHA13e3656c19fe7df897f6ab4bba0556cce0cc99f48
SHA2568881edcd89188e693aa8569bf25ae86ba126ba3693d670bf5c84adf91a6d0a16
SHA512ac597d99f690024679f32555da8032935855ce14928676a50accaf15471f726a238d2befe377185ac05de1dec368aad8a1fa9124f8d8275b10f8eb17238c0a45
-
Filesize
328KB
MD53e5007fd527f67e462238cd96c2fbc14
SHA13e3656c19fe7df897f6ab4bba0556cce0cc99f48
SHA2568881edcd89188e693aa8569bf25ae86ba126ba3693d670bf5c84adf91a6d0a16
SHA512ac597d99f690024679f32555da8032935855ce14928676a50accaf15471f726a238d2befe377185ac05de1dec368aad8a1fa9124f8d8275b10f8eb17238c0a45
-
Filesize
328KB
MD53e5007fd527f67e462238cd96c2fbc14
SHA13e3656c19fe7df897f6ab4bba0556cce0cc99f48
SHA2568881edcd89188e693aa8569bf25ae86ba126ba3693d670bf5c84adf91a6d0a16
SHA512ac597d99f690024679f32555da8032935855ce14928676a50accaf15471f726a238d2befe377185ac05de1dec368aad8a1fa9124f8d8275b10f8eb17238c0a45
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b