Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
JC_2676ca708434b145e84d0e9b16c8e30faa706f5eea9802c4cec9727fb5c6c305.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_2676ca708434b145e84d0e9b16c8e30faa706f5eea9802c4cec9727fb5c6c305.exe
Resource
win10v2004-20230831-en
General
-
Target
JC_2676ca708434b145e84d0e9b16c8e30faa706f5eea9802c4cec9727fb5c6c305.exe
-
Size
829KB
-
MD5
d86336b7ee0ef9b59c2882c30c948df1
-
SHA1
172b3b44ce68a05d5591bf0230a95e74c15062af
-
SHA256
2676ca708434b145e84d0e9b16c8e30faa706f5eea9802c4cec9727fb5c6c305
-
SHA512
7c577d1cd5c549baf9553bcddab5f3c07624735a02303a9d6a414131e4e97839b9726501dbbadd26d79dfd01b7fc7114039afb56aa0ec51c6b728a6f8b2f0a7f
-
SSDEEP
12288:lMrby90yeLXK0ZLOJmogUxOKDHW4QsCZ7KCmMDrx9jcVt12JXTFmD3jQ0dZ0OaZd:+y8L/O55Qsf+X30UJXTQD3jQ0v34d
Malware Config
Extracted
redline
domka
77.91.124.82:19071
-
auth_value
74e19436acac85e44d691aebcc617529
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000700000002326c-33.dat healer behavioral2/files/0x000700000002326c-34.dat healer behavioral2/memory/4796-35-0x00000000005D0000-0x00000000005DA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6778844.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6778844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6778844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6778844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6778844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6778844.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 5056 v4128350.exe 3896 v6612405.exe 2808 v4096299.exe 4856 v0027778.exe 4796 a6778844.exe 388 b2174158.exe 3404 c6853029.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6778844.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JC_2676ca708434b145e84d0e9b16c8e30faa706f5eea9802c4cec9727fb5c6c305.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4128350.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6612405.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4096299.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0027778.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4796 a6778844.exe 4796 a6778844.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4796 a6778844.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3108 wrote to memory of 5056 3108 JC_2676ca708434b145e84d0e9b16c8e30faa706f5eea9802c4cec9727fb5c6c305.exe 85 PID 3108 wrote to memory of 5056 3108 JC_2676ca708434b145e84d0e9b16c8e30faa706f5eea9802c4cec9727fb5c6c305.exe 85 PID 3108 wrote to memory of 5056 3108 JC_2676ca708434b145e84d0e9b16c8e30faa706f5eea9802c4cec9727fb5c6c305.exe 85 PID 5056 wrote to memory of 3896 5056 v4128350.exe 86 PID 5056 wrote to memory of 3896 5056 v4128350.exe 86 PID 5056 wrote to memory of 3896 5056 v4128350.exe 86 PID 3896 wrote to memory of 2808 3896 v6612405.exe 87 PID 3896 wrote to memory of 2808 3896 v6612405.exe 87 PID 3896 wrote to memory of 2808 3896 v6612405.exe 87 PID 2808 wrote to memory of 4856 2808 v4096299.exe 88 PID 2808 wrote to memory of 4856 2808 v4096299.exe 88 PID 2808 wrote to memory of 4856 2808 v4096299.exe 88 PID 4856 wrote to memory of 4796 4856 v0027778.exe 89 PID 4856 wrote to memory of 4796 4856 v0027778.exe 89 PID 4856 wrote to memory of 388 4856 v0027778.exe 92 PID 4856 wrote to memory of 388 4856 v0027778.exe 92 PID 4856 wrote to memory of 388 4856 v0027778.exe 92 PID 2808 wrote to memory of 3404 2808 v4096299.exe 93 PID 2808 wrote to memory of 3404 2808 v4096299.exe 93 PID 2808 wrote to memory of 3404 2808 v4096299.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JC_2676ca708434b145e84d0e9b16c8e30faa706f5eea9802c4cec9727fb5c6c305.exe"C:\Users\Admin\AppData\Local\Temp\JC_2676ca708434b145e84d0e9b16c8e30faa706f5eea9802c4cec9727fb5c6c305.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4128350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4128350.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6612405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6612405.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4096299.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4096299.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0027778.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0027778.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6778844.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a6778844.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2174158.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2174158.exe6⤵
- Executes dropped EXE
PID:388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6853029.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c6853029.exe5⤵
- Executes dropped EXE
PID:3404
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
723KB
MD5bf1533c36915530b9036f4bcb5e2b279
SHA1531450492749584bfed8c3627ec8daace6ff0ac9
SHA256161c4efc0fc084f86a9a4c7a3b8fcb046ec72ce6ff77329266eca59bfb6b95b6
SHA51262d0cbb1b2476b815c0fac859f623a115b3fdfa315fb1c43a28828a5b246a70a9932834a1843ce6308c20fa8f5e20591e77ad9addc7ca8b8105fce552c5e7625
-
Filesize
723KB
MD5bf1533c36915530b9036f4bcb5e2b279
SHA1531450492749584bfed8c3627ec8daace6ff0ac9
SHA256161c4efc0fc084f86a9a4c7a3b8fcb046ec72ce6ff77329266eca59bfb6b95b6
SHA51262d0cbb1b2476b815c0fac859f623a115b3fdfa315fb1c43a28828a5b246a70a9932834a1843ce6308c20fa8f5e20591e77ad9addc7ca8b8105fce552c5e7625
-
Filesize
497KB
MD503b4dfa2dfd8dff835cb40579152911a
SHA1e865b13737a7aff83ff00a2733e66b96de8eb244
SHA2564daf6f6f9c2d3bbba696e084e38e65bc13459d68143fb422d4798ef2e0c9b541
SHA512c5b555de069f4cc766ec63a0ef4e088e5fdbc3936c251d3b7245803fe1ff575de07acd038e02b9f8ba687466ef082b4cd339fa520427f2a5950b2564ec07da09
-
Filesize
497KB
MD503b4dfa2dfd8dff835cb40579152911a
SHA1e865b13737a7aff83ff00a2733e66b96de8eb244
SHA2564daf6f6f9c2d3bbba696e084e38e65bc13459d68143fb422d4798ef2e0c9b541
SHA512c5b555de069f4cc766ec63a0ef4e088e5fdbc3936c251d3b7245803fe1ff575de07acd038e02b9f8ba687466ef082b4cd339fa520427f2a5950b2564ec07da09
-
Filesize
372KB
MD59a647182b94802afc6d00a4b14dad6d5
SHA1b56c87d992efd18d2eccbc0f0f095745f08fa231
SHA256349a845f95b6a94004d70e1d49a1d55cf50fdfb53c1db6b3dd8efdc89a6f9cf9
SHA51246bb5d142bb4c93c3ec3f41a755e3d744f6df8d6a7b84a228d23e3c30919affdc8cf4730aff4c00b1563b4937a25a8dc6772a6bda33c218043cf119f856a30f2
-
Filesize
372KB
MD59a647182b94802afc6d00a4b14dad6d5
SHA1b56c87d992efd18d2eccbc0f0f095745f08fa231
SHA256349a845f95b6a94004d70e1d49a1d55cf50fdfb53c1db6b3dd8efdc89a6f9cf9
SHA51246bb5d142bb4c93c3ec3f41a755e3d744f6df8d6a7b84a228d23e3c30919affdc8cf4730aff4c00b1563b4937a25a8dc6772a6bda33c218043cf119f856a30f2
-
Filesize
174KB
MD59198914322155d33bc84232970d8317f
SHA1b402a7a04defe3ec650e958d3104af38077f7e29
SHA25604b1be4fa503a0aba0ae14f705eb45c1e98f368d9490c27bb3bef96f5d9788b4
SHA512d89f2a909aa4e0ed4df18d719b4741c7127a4383f0f3fcd15b1057b5041ce867feb90af7e0b676fd397f7127caf19da2475a9353d468ee45693aa0607c23b8fc
-
Filesize
174KB
MD59198914322155d33bc84232970d8317f
SHA1b402a7a04defe3ec650e958d3104af38077f7e29
SHA25604b1be4fa503a0aba0ae14f705eb45c1e98f368d9490c27bb3bef96f5d9788b4
SHA512d89f2a909aa4e0ed4df18d719b4741c7127a4383f0f3fcd15b1057b5041ce867feb90af7e0b676fd397f7127caf19da2475a9353d468ee45693aa0607c23b8fc
-
Filesize
217KB
MD5d5a417fd126093d1a6e22ac926893c29
SHA182ad6db707e410d507ea8c722d99f16ee232ee3d
SHA2568ab8fee0e4a736f0bb7ce1af8436ae14988528a0ba3332040bd8968a06ae9398
SHA51287423ddaf6881b9e9f6832c75d468ae45218cc9d0f61da4db6239447177e1792840d09fb88b1ade681666e4f956171ed6cdf83b26800afba622a4da3a6ceb0b6
-
Filesize
217KB
MD5d5a417fd126093d1a6e22ac926893c29
SHA182ad6db707e410d507ea8c722d99f16ee232ee3d
SHA2568ab8fee0e4a736f0bb7ce1af8436ae14988528a0ba3332040bd8968a06ae9398
SHA51287423ddaf6881b9e9f6832c75d468ae45218cc9d0f61da4db6239447177e1792840d09fb88b1ade681666e4f956171ed6cdf83b26800afba622a4da3a6ceb0b6
-
Filesize
19KB
MD5960a47b85bfc826a48704f1c74c89fd8
SHA1a298a25f60b8752075bb97a60efbd851de540284
SHA2568555688d8807506bf3ca7931a913be7d16ebfaa5a46ef2ae99e443e3eb825660
SHA5128577ab4508b113ba5bd6921288145ea5b96ffa9ff63cb2898d1cde31cd235b6e6b3e7ea7d1f57850508412f0dc6fcb974dbc3f3a3df477c9001909945b4005c2
-
Filesize
19KB
MD5960a47b85bfc826a48704f1c74c89fd8
SHA1a298a25f60b8752075bb97a60efbd851de540284
SHA2568555688d8807506bf3ca7931a913be7d16ebfaa5a46ef2ae99e443e3eb825660
SHA5128577ab4508b113ba5bd6921288145ea5b96ffa9ff63cb2898d1cde31cd235b6e6b3e7ea7d1f57850508412f0dc6fcb974dbc3f3a3df477c9001909945b4005c2
-
Filesize
140KB
MD58e91d830903d06863371d8c8701b3f27
SHA10121ae30d8855e8cb565075990e2b0bcdf1b5445
SHA2561434b8d9b9636797b5a4c9eb288bbaa7322170880a1aee44fad36d40e6c6b809
SHA5122ec9fdd1bd32149cfb714dfdaa4a60966e3b55ee0ab6954deabb910d8c6bdadf042088a7cd25077658016c460defe005a446ebf6cb06308c80294e852e9628bf
-
Filesize
140KB
MD58e91d830903d06863371d8c8701b3f27
SHA10121ae30d8855e8cb565075990e2b0bcdf1b5445
SHA2561434b8d9b9636797b5a4c9eb288bbaa7322170880a1aee44fad36d40e6c6b809
SHA5122ec9fdd1bd32149cfb714dfdaa4a60966e3b55ee0ab6954deabb910d8c6bdadf042088a7cd25077658016c460defe005a446ebf6cb06308c80294e852e9628bf