Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2023, 00:47

General

  • Target

    file.exe

  • Size

    826KB

  • MD5

    686ab02eb6ffcb31d58c9c8ca19d2d36

  • SHA1

    1c894794ad123b296979545418ffe0cfc1d86b0e

  • SHA256

    0b830ec86137a0e93bb892190f894830e35ebe4ce18dd5efb3b5124fb63cd534

  • SHA512

    ad6b4fba91f1bf3625792472e32099d31d1941f9d8c854c3557f2c2271dbb8aad37a5f36128146566f9a9f4549a4ffcf6c8ad85d05a24cae777f14ea451e8fc7

  • SSDEEP

    24576:ZydcAlZrQUg6KnO5U0nV9O1IcZxz80qodvpIYBG:MhlVQUgDuU0nLO1nZW0qo9H

Malware Config

Extracted

Family

redline

Botnet

jang

C2

77.91.124.82:19071

Attributes
  • auth_value

    662102010afcbe9e22b13116b1c1a088

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1356430.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1356430.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6848111.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6848111.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2068
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0602106.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0602106.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2916
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4621808.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4621808.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2768
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4632335.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4632335.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2900
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5570947.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5570947.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2764
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8649989.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8649989.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1356430.exe

    Filesize

    723KB

    MD5

    3b1e8201be99aabf73730cf3c2611fc6

    SHA1

    14a051195f45cb4a0f5f756465b05600a2fa5a99

    SHA256

    828c47feac220e6b0e71ff0abd858963afa83eec2f02bde58c5d1828bf409058

    SHA512

    94c45c32304c710dd4878a2fb1b327d3a8d27887e56127adf71db2aaedc2a7d36e3aeaa021a4c6cf107eb370813a858f5e0a556df89225e8e4bd5264de186227

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1356430.exe

    Filesize

    723KB

    MD5

    3b1e8201be99aabf73730cf3c2611fc6

    SHA1

    14a051195f45cb4a0f5f756465b05600a2fa5a99

    SHA256

    828c47feac220e6b0e71ff0abd858963afa83eec2f02bde58c5d1828bf409058

    SHA512

    94c45c32304c710dd4878a2fb1b327d3a8d27887e56127adf71db2aaedc2a7d36e3aeaa021a4c6cf107eb370813a858f5e0a556df89225e8e4bd5264de186227

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6848111.exe

    Filesize

    498KB

    MD5

    a00577cb96ddbddad4a30954ba30cd64

    SHA1

    0748deeca7e77668de34bca7bf90047be10be366

    SHA256

    d0aa5a61eff0dda1ee3ce7fa62e1721712260baaf06ce85fa579674a9876fb67

    SHA512

    a5eacc98270c4f11e1f8c856183441ecc207af73a871bb80d7a0d078be0b7aafaab2986f45acc81fe35c32f1d635d293ba58c11eba07966a775844fd9ba47bf6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6848111.exe

    Filesize

    498KB

    MD5

    a00577cb96ddbddad4a30954ba30cd64

    SHA1

    0748deeca7e77668de34bca7bf90047be10be366

    SHA256

    d0aa5a61eff0dda1ee3ce7fa62e1721712260baaf06ce85fa579674a9876fb67

    SHA512

    a5eacc98270c4f11e1f8c856183441ecc207af73a871bb80d7a0d078be0b7aafaab2986f45acc81fe35c32f1d635d293ba58c11eba07966a775844fd9ba47bf6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0602106.exe

    Filesize

    373KB

    MD5

    ce386ddb5c298a42b6fe0c60922feef9

    SHA1

    101734cc1ea5003d963a5f8bf277b5ce2e7ad629

    SHA256

    6c3693c97a9b6ac75da6af9f9723b6ac347d8635ea027abea65c607203a94ae1

    SHA512

    1a3067ac65a21f4b303070a6511eda5359347c9e996e4c08157673441f6b5b1c599bff0ceb363418df258557f74a027e472422b3425700f0ae78935e77f5b80c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0602106.exe

    Filesize

    373KB

    MD5

    ce386ddb5c298a42b6fe0c60922feef9

    SHA1

    101734cc1ea5003d963a5f8bf277b5ce2e7ad629

    SHA256

    6c3693c97a9b6ac75da6af9f9723b6ac347d8635ea027abea65c607203a94ae1

    SHA512

    1a3067ac65a21f4b303070a6511eda5359347c9e996e4c08157673441f6b5b1c599bff0ceb363418df258557f74a027e472422b3425700f0ae78935e77f5b80c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8649989.exe

    Filesize

    174KB

    MD5

    5a47499897440f09709c1a3652c3e95f

    SHA1

    35390d85cb1a18a0cecd1537260e84d28a9c994f

    SHA256

    3f37fd089a1d7f55e136f3f581e0129948e8e9742a741c41a9ff0b5cf98a89e5

    SHA512

    fa9d1b3f44715bae551e0640dce4f9d62ef3d30c96da3d7d2ad06ebb8c6b366c8a5a8d813f98ae89fee14c791954ae8b6da6bf46731d53596dd769c5b55edce9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8649989.exe

    Filesize

    174KB

    MD5

    5a47499897440f09709c1a3652c3e95f

    SHA1

    35390d85cb1a18a0cecd1537260e84d28a9c994f

    SHA256

    3f37fd089a1d7f55e136f3f581e0129948e8e9742a741c41a9ff0b5cf98a89e5

    SHA512

    fa9d1b3f44715bae551e0640dce4f9d62ef3d30c96da3d7d2ad06ebb8c6b366c8a5a8d813f98ae89fee14c791954ae8b6da6bf46731d53596dd769c5b55edce9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4621808.exe

    Filesize

    217KB

    MD5

    a077b69989aa9594fc298fe435e9c7a2

    SHA1

    cb762a27a24b4819c317667ea92eb0326822019f

    SHA256

    109e73663b9c14cc4fb3206f62205ee39480af1c605d21875a8454ce8a39bb82

    SHA512

    99b9fc56a105f005e71ea2163651d676b03263cb92cc9dec13c385258e73de8b4535cb5320b9400a4a128ab45cb8614ed0bb26cebb910e5e231a2ca1a7800681

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4621808.exe

    Filesize

    217KB

    MD5

    a077b69989aa9594fc298fe435e9c7a2

    SHA1

    cb762a27a24b4819c317667ea92eb0326822019f

    SHA256

    109e73663b9c14cc4fb3206f62205ee39480af1c605d21875a8454ce8a39bb82

    SHA512

    99b9fc56a105f005e71ea2163651d676b03263cb92cc9dec13c385258e73de8b4535cb5320b9400a4a128ab45cb8614ed0bb26cebb910e5e231a2ca1a7800681

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4632335.exe

    Filesize

    19KB

    MD5

    5fc49a5b2cadf2d975fc6deeef89c1e8

    SHA1

    20e785be0cb20bc972f90252aee62508327403e1

    SHA256

    a755cb2dd5d4390369336ddb2573a61db7d4e0f38b002fbd477b4f42bd28b220

    SHA512

    390f3f6c8afb81702989074b7d3cd60fd2a4a52344b2775e2af6dd66224498e7ec52a93c1429bd41146ac1ec03cc2f2113087c76940de560f89ded27d3639efe

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4632335.exe

    Filesize

    19KB

    MD5

    5fc49a5b2cadf2d975fc6deeef89c1e8

    SHA1

    20e785be0cb20bc972f90252aee62508327403e1

    SHA256

    a755cb2dd5d4390369336ddb2573a61db7d4e0f38b002fbd477b4f42bd28b220

    SHA512

    390f3f6c8afb81702989074b7d3cd60fd2a4a52344b2775e2af6dd66224498e7ec52a93c1429bd41146ac1ec03cc2f2113087c76940de560f89ded27d3639efe

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5570947.exe

    Filesize

    140KB

    MD5

    9ef49e0de12a7013a88e0ea4cce8b744

    SHA1

    89dfc3641832926430aa34556fbe19f368c8f663

    SHA256

    5fca5449a47ce89d759e8a2a1e71d1f6c2439031206f6a58e4c706bdb240411a

    SHA512

    62937fcdae304c91c92a5f7f8858e63dcd994bbeda10156676c1a15ccafd8556937d7ea8d7e53d9c5d7ad6fb54b5c9ddc61a947fe07909d2e513f4b3800224d0

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5570947.exe

    Filesize

    140KB

    MD5

    9ef49e0de12a7013a88e0ea4cce8b744

    SHA1

    89dfc3641832926430aa34556fbe19f368c8f663

    SHA256

    5fca5449a47ce89d759e8a2a1e71d1f6c2439031206f6a58e4c706bdb240411a

    SHA512

    62937fcdae304c91c92a5f7f8858e63dcd994bbeda10156676c1a15ccafd8556937d7ea8d7e53d9c5d7ad6fb54b5c9ddc61a947fe07909d2e513f4b3800224d0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1356430.exe

    Filesize

    723KB

    MD5

    3b1e8201be99aabf73730cf3c2611fc6

    SHA1

    14a051195f45cb4a0f5f756465b05600a2fa5a99

    SHA256

    828c47feac220e6b0e71ff0abd858963afa83eec2f02bde58c5d1828bf409058

    SHA512

    94c45c32304c710dd4878a2fb1b327d3a8d27887e56127adf71db2aaedc2a7d36e3aeaa021a4c6cf107eb370813a858f5e0a556df89225e8e4bd5264de186227

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v1356430.exe

    Filesize

    723KB

    MD5

    3b1e8201be99aabf73730cf3c2611fc6

    SHA1

    14a051195f45cb4a0f5f756465b05600a2fa5a99

    SHA256

    828c47feac220e6b0e71ff0abd858963afa83eec2f02bde58c5d1828bf409058

    SHA512

    94c45c32304c710dd4878a2fb1b327d3a8d27887e56127adf71db2aaedc2a7d36e3aeaa021a4c6cf107eb370813a858f5e0a556df89225e8e4bd5264de186227

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6848111.exe

    Filesize

    498KB

    MD5

    a00577cb96ddbddad4a30954ba30cd64

    SHA1

    0748deeca7e77668de34bca7bf90047be10be366

    SHA256

    d0aa5a61eff0dda1ee3ce7fa62e1721712260baaf06ce85fa579674a9876fb67

    SHA512

    a5eacc98270c4f11e1f8c856183441ecc207af73a871bb80d7a0d078be0b7aafaab2986f45acc81fe35c32f1d635d293ba58c11eba07966a775844fd9ba47bf6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v6848111.exe

    Filesize

    498KB

    MD5

    a00577cb96ddbddad4a30954ba30cd64

    SHA1

    0748deeca7e77668de34bca7bf90047be10be366

    SHA256

    d0aa5a61eff0dda1ee3ce7fa62e1721712260baaf06ce85fa579674a9876fb67

    SHA512

    a5eacc98270c4f11e1f8c856183441ecc207af73a871bb80d7a0d078be0b7aafaab2986f45acc81fe35c32f1d635d293ba58c11eba07966a775844fd9ba47bf6

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0602106.exe

    Filesize

    373KB

    MD5

    ce386ddb5c298a42b6fe0c60922feef9

    SHA1

    101734cc1ea5003d963a5f8bf277b5ce2e7ad629

    SHA256

    6c3693c97a9b6ac75da6af9f9723b6ac347d8635ea027abea65c607203a94ae1

    SHA512

    1a3067ac65a21f4b303070a6511eda5359347c9e996e4c08157673441f6b5b1c599bff0ceb363418df258557f74a027e472422b3425700f0ae78935e77f5b80c

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v0602106.exe

    Filesize

    373KB

    MD5

    ce386ddb5c298a42b6fe0c60922feef9

    SHA1

    101734cc1ea5003d963a5f8bf277b5ce2e7ad629

    SHA256

    6c3693c97a9b6ac75da6af9f9723b6ac347d8635ea027abea65c607203a94ae1

    SHA512

    1a3067ac65a21f4b303070a6511eda5359347c9e996e4c08157673441f6b5b1c599bff0ceb363418df258557f74a027e472422b3425700f0ae78935e77f5b80c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c8649989.exe

    Filesize

    174KB

    MD5

    5a47499897440f09709c1a3652c3e95f

    SHA1

    35390d85cb1a18a0cecd1537260e84d28a9c994f

    SHA256

    3f37fd089a1d7f55e136f3f581e0129948e8e9742a741c41a9ff0b5cf98a89e5

    SHA512

    fa9d1b3f44715bae551e0640dce4f9d62ef3d30c96da3d7d2ad06ebb8c6b366c8a5a8d813f98ae89fee14c791954ae8b6da6bf46731d53596dd769c5b55edce9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\c8649989.exe

    Filesize

    174KB

    MD5

    5a47499897440f09709c1a3652c3e95f

    SHA1

    35390d85cb1a18a0cecd1537260e84d28a9c994f

    SHA256

    3f37fd089a1d7f55e136f3f581e0129948e8e9742a741c41a9ff0b5cf98a89e5

    SHA512

    fa9d1b3f44715bae551e0640dce4f9d62ef3d30c96da3d7d2ad06ebb8c6b366c8a5a8d813f98ae89fee14c791954ae8b6da6bf46731d53596dd769c5b55edce9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4621808.exe

    Filesize

    217KB

    MD5

    a077b69989aa9594fc298fe435e9c7a2

    SHA1

    cb762a27a24b4819c317667ea92eb0326822019f

    SHA256

    109e73663b9c14cc4fb3206f62205ee39480af1c605d21875a8454ce8a39bb82

    SHA512

    99b9fc56a105f005e71ea2163651d676b03263cb92cc9dec13c385258e73de8b4535cb5320b9400a4a128ab45cb8614ed0bb26cebb910e5e231a2ca1a7800681

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\v4621808.exe

    Filesize

    217KB

    MD5

    a077b69989aa9594fc298fe435e9c7a2

    SHA1

    cb762a27a24b4819c317667ea92eb0326822019f

    SHA256

    109e73663b9c14cc4fb3206f62205ee39480af1c605d21875a8454ce8a39bb82

    SHA512

    99b9fc56a105f005e71ea2163651d676b03263cb92cc9dec13c385258e73de8b4535cb5320b9400a4a128ab45cb8614ed0bb26cebb910e5e231a2ca1a7800681

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\a4632335.exe

    Filesize

    19KB

    MD5

    5fc49a5b2cadf2d975fc6deeef89c1e8

    SHA1

    20e785be0cb20bc972f90252aee62508327403e1

    SHA256

    a755cb2dd5d4390369336ddb2573a61db7d4e0f38b002fbd477b4f42bd28b220

    SHA512

    390f3f6c8afb81702989074b7d3cd60fd2a4a52344b2775e2af6dd66224498e7ec52a93c1429bd41146ac1ec03cc2f2113087c76940de560f89ded27d3639efe

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b5570947.exe

    Filesize

    140KB

    MD5

    9ef49e0de12a7013a88e0ea4cce8b744

    SHA1

    89dfc3641832926430aa34556fbe19f368c8f663

    SHA256

    5fca5449a47ce89d759e8a2a1e71d1f6c2439031206f6a58e4c706bdb240411a

    SHA512

    62937fcdae304c91c92a5f7f8858e63dcd994bbeda10156676c1a15ccafd8556937d7ea8d7e53d9c5d7ad6fb54b5c9ddc61a947fe07909d2e513f4b3800224d0

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\b5570947.exe

    Filesize

    140KB

    MD5

    9ef49e0de12a7013a88e0ea4cce8b744

    SHA1

    89dfc3641832926430aa34556fbe19f368c8f663

    SHA256

    5fca5449a47ce89d759e8a2a1e71d1f6c2439031206f6a58e4c706bdb240411a

    SHA512

    62937fcdae304c91c92a5f7f8858e63dcd994bbeda10156676c1a15ccafd8556937d7ea8d7e53d9c5d7ad6fb54b5c9ddc61a947fe07909d2e513f4b3800224d0

  • memory/2548-64-0x00000000010D0000-0x0000000001100000-memory.dmp

    Filesize

    192KB

  • memory/2548-65-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2900-51-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-50-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-49-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-48-0x0000000000F60000-0x0000000000F6A000-memory.dmp

    Filesize

    40KB