Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/08/2023, 05:36

General

  • Target

    3d5c97ff36b88551a9002a56b8b542f2d4824a87477c8f0bcc394298f73faa69.exe

  • Size

    829KB

  • MD5

    7182a2f60b08040d8a583591c243257b

  • SHA1

    33b7cb25f7fb793358d75d485fef4ebe039acce9

  • SHA256

    3d5c97ff36b88551a9002a56b8b542f2d4824a87477c8f0bcc394298f73faa69

  • SHA512

    831232568e27e1ab8eaff7a3674b62248ee2fd2b2e0412d60ce9aaa61c5af38d86e52323d3022663691c499fedf8d0193ac8db75638af7c9979873c9fdd27e9e

  • SSDEEP

    24576:/yQFIX0BhcAW1bLQ2ROw9TXSck4OxQB4cH:KwIX0B6AW1PQiOIYQuc

Malware Config

Extracted

Family

redline

Botnet

sruta

C2

77.91.124.82:19071

Attributes
  • auth_value

    c556edcd49703319eca74247de20c236

Signatures

  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d5c97ff36b88551a9002a56b8b542f2d4824a87477c8f0bcc394298f73faa69.exe
    "C:\Users\Admin\AppData\Local\Temp\3d5c97ff36b88551a9002a56b8b542f2d4824a87477c8f0bcc394298f73faa69.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1761840.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1761840.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5531290.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5531290.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4204
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0419066.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0419066.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4844
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1760479.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1760479.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4880
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2827833.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2827833.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4064
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8231358.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8231358.exe
              6⤵
              • Executes dropped EXE
              PID:2492
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9237042.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9237042.exe
            5⤵
            • Executes dropped EXE
            PID:3536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1761840.exe

    Filesize

    723KB

    MD5

    6b74818d9de06b97e87d05ad6bfd5d68

    SHA1

    e06e501b55af9c983c4d878196210323a79d2f14

    SHA256

    85b71bda6ab262635ce52a09155364f3a471c8f89b25b191250f7fc7d508788c

    SHA512

    3949d6cc5d63d862e3cfa5772849a6c890d7c3e007a2cfd8c4f3624d71c42bf89ba98524387c0824f55eb8a736d8e5ab70ac650a84182a180c73ef9580aad35e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1761840.exe

    Filesize

    723KB

    MD5

    6b74818d9de06b97e87d05ad6bfd5d68

    SHA1

    e06e501b55af9c983c4d878196210323a79d2f14

    SHA256

    85b71bda6ab262635ce52a09155364f3a471c8f89b25b191250f7fc7d508788c

    SHA512

    3949d6cc5d63d862e3cfa5772849a6c890d7c3e007a2cfd8c4f3624d71c42bf89ba98524387c0824f55eb8a736d8e5ab70ac650a84182a180c73ef9580aad35e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5531290.exe

    Filesize

    497KB

    MD5

    5a93e06140e7996810db55a6e79431e1

    SHA1

    57db19d7b0e43dd91b5295b77c0d16fa534f3b86

    SHA256

    1eb7001db3fe3260459cabbb6fe47546e7c26d87e1eb435d3ccf9c6f52b085a1

    SHA512

    965ac9fa6a45b518c8245c4e1e2da90dc5c98c4564540ab0213a089c80cb5d78805ad9abc450503987c4ceaded013840429b4b7dfbc504517541d456d1519ea9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5531290.exe

    Filesize

    497KB

    MD5

    5a93e06140e7996810db55a6e79431e1

    SHA1

    57db19d7b0e43dd91b5295b77c0d16fa534f3b86

    SHA256

    1eb7001db3fe3260459cabbb6fe47546e7c26d87e1eb435d3ccf9c6f52b085a1

    SHA512

    965ac9fa6a45b518c8245c4e1e2da90dc5c98c4564540ab0213a089c80cb5d78805ad9abc450503987c4ceaded013840429b4b7dfbc504517541d456d1519ea9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0419066.exe

    Filesize

    373KB

    MD5

    1d770a56a8b0fe7fe62c46e618fc7327

    SHA1

    848800507abd78e21807ce448c9d1f584a6f21fe

    SHA256

    12d4f50939275058c83afa5639c12ba37f196200f0bdcd96dd81a61fa36fe5e9

    SHA512

    7c92f36f19fa33abd9e1c28b5540717d36ff0ad3b6109d34df438d98fbc203eb38636fe7f3e4046fadf7d0ca13a304cb86441df8aa66c54334ff5926b83388d3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0419066.exe

    Filesize

    373KB

    MD5

    1d770a56a8b0fe7fe62c46e618fc7327

    SHA1

    848800507abd78e21807ce448c9d1f584a6f21fe

    SHA256

    12d4f50939275058c83afa5639c12ba37f196200f0bdcd96dd81a61fa36fe5e9

    SHA512

    7c92f36f19fa33abd9e1c28b5540717d36ff0ad3b6109d34df438d98fbc203eb38636fe7f3e4046fadf7d0ca13a304cb86441df8aa66c54334ff5926b83388d3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9237042.exe

    Filesize

    176KB

    MD5

    5da833fca24916ee46203dfd48f4441f

    SHA1

    83a29408a93d69205fc9da40146c8c154580440e

    SHA256

    bcd8fc530125aaa4b5fdd55f82d5f9a997d6510af4dad1266a0e711ebbe569f1

    SHA512

    d1d17fead710c0be3012e52d0986fc40496082af4c3950b31188ef3e31529863c5e81d4d48878980a5925010de49c7094f6b4f9581077edc8cb1f6a9bf6106ec

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9237042.exe

    Filesize

    176KB

    MD5

    5da833fca24916ee46203dfd48f4441f

    SHA1

    83a29408a93d69205fc9da40146c8c154580440e

    SHA256

    bcd8fc530125aaa4b5fdd55f82d5f9a997d6510af4dad1266a0e711ebbe569f1

    SHA512

    d1d17fead710c0be3012e52d0986fc40496082af4c3950b31188ef3e31529863c5e81d4d48878980a5925010de49c7094f6b4f9581077edc8cb1f6a9bf6106ec

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1760479.exe

    Filesize

    217KB

    MD5

    9f6f6e90d0f6f566699e19c73440d9e3

    SHA1

    eb346209276e98d49db33ec266e516a4e597c585

    SHA256

    03143956e1d08cfa8cd684788d60ee55a426af188bfcb1196af14346e54fdeb5

    SHA512

    082c07ecd85aafd8ece738b75374c2c719a8d5e92b669782e8cedff8a436e1fc6230bd1351b05d4a58d59be1bff669ff0df17daaa8654902eee36662edb3a8f3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1760479.exe

    Filesize

    217KB

    MD5

    9f6f6e90d0f6f566699e19c73440d9e3

    SHA1

    eb346209276e98d49db33ec266e516a4e597c585

    SHA256

    03143956e1d08cfa8cd684788d60ee55a426af188bfcb1196af14346e54fdeb5

    SHA512

    082c07ecd85aafd8ece738b75374c2c719a8d5e92b669782e8cedff8a436e1fc6230bd1351b05d4a58d59be1bff669ff0df17daaa8654902eee36662edb3a8f3

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2827833.exe

    Filesize

    18KB

    MD5

    4c864da684813b589afc33541b32a717

    SHA1

    e39a9331386e05487fb2a45d2d3e9b648a88cd95

    SHA256

    8da7cecff747a63a223f9d382fac5173720042349215bc5debf9b5f3613fccc1

    SHA512

    048c61bf2f01fc9c1483c6b967bed1533faf2eb564940eefd50397d8dfb883027fb31459ef12d80a06a2700167d9c6a12dd606824d3a2ab29cec2645ccbafad2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a2827833.exe

    Filesize

    18KB

    MD5

    4c864da684813b589afc33541b32a717

    SHA1

    e39a9331386e05487fb2a45d2d3e9b648a88cd95

    SHA256

    8da7cecff747a63a223f9d382fac5173720042349215bc5debf9b5f3613fccc1

    SHA512

    048c61bf2f01fc9c1483c6b967bed1533faf2eb564940eefd50397d8dfb883027fb31459ef12d80a06a2700167d9c6a12dd606824d3a2ab29cec2645ccbafad2

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8231358.exe

    Filesize

    140KB

    MD5

    191a9eda2e89eaec556e60fb22e791d9

    SHA1

    5d2f42fbf7bcd6294821967effe41c85473479ed

    SHA256

    6b0afa6b6c05cb061c479786509825e49eae06db0a43dcb9f4efd0bb4b92b312

    SHA512

    026e716dac5d0a61019683f3f88bb8f03165c7ad6b2846f8bf6ab28994fc59b0eef6fbedd04ecab48dbc1fdbd423962fb70c666353a3a21c6228fe82ffb5504c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8231358.exe

    Filesize

    140KB

    MD5

    191a9eda2e89eaec556e60fb22e791d9

    SHA1

    5d2f42fbf7bcd6294821967effe41c85473479ed

    SHA256

    6b0afa6b6c05cb061c479786509825e49eae06db0a43dcb9f4efd0bb4b92b312

    SHA512

    026e716dac5d0a61019683f3f88bb8f03165c7ad6b2846f8bf6ab28994fc59b0eef6fbedd04ecab48dbc1fdbd423962fb70c666353a3a21c6228fe82ffb5504c

  • memory/3536-45-0x0000000000770000-0x00000000007A0000-memory.dmp

    Filesize

    192KB

  • memory/3536-46-0x0000000072DC0000-0x00000000734AE000-memory.dmp

    Filesize

    6.9MB

  • memory/3536-47-0x0000000005030000-0x0000000005036000-memory.dmp

    Filesize

    24KB

  • memory/3536-48-0x000000000AA80000-0x000000000B086000-memory.dmp

    Filesize

    6.0MB

  • memory/3536-49-0x000000000A580000-0x000000000A68A000-memory.dmp

    Filesize

    1.0MB

  • memory/3536-50-0x000000000A4B0000-0x000000000A4C2000-memory.dmp

    Filesize

    72KB

  • memory/3536-51-0x000000000A510000-0x000000000A54E000-memory.dmp

    Filesize

    248KB

  • memory/3536-52-0x000000000A690000-0x000000000A6DB000-memory.dmp

    Filesize

    300KB

  • memory/3536-53-0x0000000072DC0000-0x00000000734AE000-memory.dmp

    Filesize

    6.9MB

  • memory/4064-38-0x00007FFB6D010000-0x00007FFB6D9FC000-memory.dmp

    Filesize

    9.9MB

  • memory/4064-36-0x00007FFB6D010000-0x00007FFB6D9FC000-memory.dmp

    Filesize

    9.9MB

  • memory/4064-35-0x0000000000630000-0x000000000063A000-memory.dmp

    Filesize

    40KB