Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
277s -
max time network
291s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
04/09/2023, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
x8617677.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x8617677.exe
Resource
win10-20230831-en
General
-
Target
x8617677.exe
-
Size
433KB
-
MD5
962e75dbc359c90f0bba2a023ddcd05b
-
SHA1
3998ab0085eba0f94ad2ce1e14c7f33b4b2a277f
-
SHA256
90aa8dd0fdcecd5f6823dfca45358d244df4e3174736f5d5f42d04d90acabcb3
-
SHA512
aa3a0dac5c461fea5a2704984fde4bc6d7ddf9c6ce9d20c7bed7ba11cf24e8313804b6d16ec0430365c4e25c0d616e5bd3eaec48464bc26cf3698205fbacb6d2
-
SSDEEP
6144:KQy+bnr+up0yN90QE8LVuuyjnVdtwXKFxouT9M7n2lzIsTsir/U8r60iJBZ:IMriy90eLVuuyzPtXgu5Gn26eMZ
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000700000001afe5-12.dat healer behavioral2/files/0x000700000001afe5-13.dat healer behavioral2/memory/2188-14-0x00000000003D0000-0x00000000003DA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g9252344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g9252344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g9252344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g9252344.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g9252344.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 3040 x7048562.exe 2188 g9252344.exe 4068 h5429603.exe 2372 saves.exe 4380 i7987797.exe 2232 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3948 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g9252344.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x8617677.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7048562.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2188 g9252344.exe 2188 g9252344.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2188 g9252344.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1124 wrote to memory of 3040 1124 x8617677.exe 70 PID 1124 wrote to memory of 3040 1124 x8617677.exe 70 PID 1124 wrote to memory of 3040 1124 x8617677.exe 70 PID 3040 wrote to memory of 2188 3040 x7048562.exe 71 PID 3040 wrote to memory of 2188 3040 x7048562.exe 71 PID 3040 wrote to memory of 4068 3040 x7048562.exe 72 PID 3040 wrote to memory of 4068 3040 x7048562.exe 72 PID 3040 wrote to memory of 4068 3040 x7048562.exe 72 PID 4068 wrote to memory of 2372 4068 h5429603.exe 73 PID 4068 wrote to memory of 2372 4068 h5429603.exe 73 PID 4068 wrote to memory of 2372 4068 h5429603.exe 73 PID 1124 wrote to memory of 4380 1124 x8617677.exe 74 PID 1124 wrote to memory of 4380 1124 x8617677.exe 74 PID 1124 wrote to memory of 4380 1124 x8617677.exe 74 PID 2372 wrote to memory of 1848 2372 saves.exe 75 PID 2372 wrote to memory of 1848 2372 saves.exe 75 PID 2372 wrote to memory of 1848 2372 saves.exe 75 PID 2372 wrote to memory of 2448 2372 saves.exe 77 PID 2372 wrote to memory of 2448 2372 saves.exe 77 PID 2372 wrote to memory of 2448 2372 saves.exe 77 PID 2448 wrote to memory of 3316 2448 cmd.exe 79 PID 2448 wrote to memory of 3316 2448 cmd.exe 79 PID 2448 wrote to memory of 3316 2448 cmd.exe 79 PID 2448 wrote to memory of 3392 2448 cmd.exe 80 PID 2448 wrote to memory of 3392 2448 cmd.exe 80 PID 2448 wrote to memory of 3392 2448 cmd.exe 80 PID 2448 wrote to memory of 3144 2448 cmd.exe 81 PID 2448 wrote to memory of 3144 2448 cmd.exe 81 PID 2448 wrote to memory of 3144 2448 cmd.exe 81 PID 2448 wrote to memory of 2816 2448 cmd.exe 82 PID 2448 wrote to memory of 2816 2448 cmd.exe 82 PID 2448 wrote to memory of 2816 2448 cmd.exe 82 PID 2448 wrote to memory of 660 2448 cmd.exe 83 PID 2448 wrote to memory of 660 2448 cmd.exe 83 PID 2448 wrote to memory of 660 2448 cmd.exe 83 PID 2448 wrote to memory of 3792 2448 cmd.exe 84 PID 2448 wrote to memory of 3792 2448 cmd.exe 84 PID 2448 wrote to memory of 3792 2448 cmd.exe 84 PID 2372 wrote to memory of 3948 2372 saves.exe 86 PID 2372 wrote to memory of 3948 2372 saves.exe 86 PID 2372 wrote to memory of 3948 2372 saves.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\x8617677.exe"C:\Users\Admin\AppData\Local\Temp\x8617677.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7048562.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7048562.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9252344.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9252344.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5429603.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5429603.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F5⤵
- Creates scheduled task(s)
PID:1848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"6⤵PID:3392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E6⤵PID:3144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"6⤵PID:660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E6⤵PID:3792
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3948
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7987797.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7987797.exe2⤵
- Executes dropped EXE
PID:4380
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD527830a7fe2b012714be9395fe7583b5f
SHA159a25359ddc1e3592b24fcb3c1df5eb850a2d86c
SHA2565573670c3ac48e85fb9010c9a7c82392d19c8aa802459a85b78f5d84ac7175ff
SHA512e93692a0eb9c973fa1b30e3ec7302cb3236a6fc6b7c3fe625944ee7cb85f95a51bbe2dc0aa51bec2eaa8d762ed6237caa2b3aa94dfbb3bb14b62421a040168de
-
Filesize
175KB
MD527830a7fe2b012714be9395fe7583b5f
SHA159a25359ddc1e3592b24fcb3c1df5eb850a2d86c
SHA2565573670c3ac48e85fb9010c9a7c82392d19c8aa802459a85b78f5d84ac7175ff
SHA512e93692a0eb9c973fa1b30e3ec7302cb3236a6fc6b7c3fe625944ee7cb85f95a51bbe2dc0aa51bec2eaa8d762ed6237caa2b3aa94dfbb3bb14b62421a040168de
-
Filesize
277KB
MD51ae32eb5fb9255dc05b2580d837c3344
SHA1d411a154f5b27d4981b0f8e8c21ebb8edc58fb8d
SHA256ca2f4b27d1459e1f9da3397d803d1fc9010c03ebf50a720aaac97ff7e9d6114a
SHA512167f022cbd9cb7114b8e720e30280086374011ae3dafe47f9e1009e0d42f075f37399a1296fa5420d44fa47a1a7e4cc4112815aa6eb2e703704b48c5f3ef672f
-
Filesize
277KB
MD51ae32eb5fb9255dc05b2580d837c3344
SHA1d411a154f5b27d4981b0f8e8c21ebb8edc58fb8d
SHA256ca2f4b27d1459e1f9da3397d803d1fc9010c03ebf50a720aaac97ff7e9d6114a
SHA512167f022cbd9cb7114b8e720e30280086374011ae3dafe47f9e1009e0d42f075f37399a1296fa5420d44fa47a1a7e4cc4112815aa6eb2e703704b48c5f3ef672f
-
Filesize
18KB
MD57b68a5f47d2f218187d237d6ad810c53
SHA1019af96113e2682a79374de83c22945d7623b438
SHA256e80b7aa83d7a7e8e56bea13cbfb53e0b7b2167e0936067ad4b2d89407acbc9eb
SHA512f41533118a0e5ac1e1820634eca051ca1900c857c56d751b26ef87aa2acbda8db8bcfe84cb9e7f461490f4ccc9b5f594605074803ee07271884b8718f0097173
-
Filesize
18KB
MD57b68a5f47d2f218187d237d6ad810c53
SHA1019af96113e2682a79374de83c22945d7623b438
SHA256e80b7aa83d7a7e8e56bea13cbfb53e0b7b2167e0936067ad4b2d89407acbc9eb
SHA512f41533118a0e5ac1e1820634eca051ca1900c857c56d751b26ef87aa2acbda8db8bcfe84cb9e7f461490f4ccc9b5f594605074803ee07271884b8718f0097173
-
Filesize
328KB
MD5becb3e4af9f80f76d3b98a25c72741dd
SHA16705f23a1cd2b9ccf11938d3fea8a256bb3622cc
SHA2561b27215e48aafca4a2d6dfd76737f02d65b4798205a1b6a0ef3d83f7b285a71c
SHA51227d879d05a432fc67fd4bcf022a20d7a9f10619673d6acad4622f012c48826be9e885bf92dddd2fbb122f91da9ac2f3108e0132b6a7a629c267df12d1f7fbef4
-
Filesize
328KB
MD5becb3e4af9f80f76d3b98a25c72741dd
SHA16705f23a1cd2b9ccf11938d3fea8a256bb3622cc
SHA2561b27215e48aafca4a2d6dfd76737f02d65b4798205a1b6a0ef3d83f7b285a71c
SHA51227d879d05a432fc67fd4bcf022a20d7a9f10619673d6acad4622f012c48826be9e885bf92dddd2fbb122f91da9ac2f3108e0132b6a7a629c267df12d1f7fbef4
-
Filesize
328KB
MD5becb3e4af9f80f76d3b98a25c72741dd
SHA16705f23a1cd2b9ccf11938d3fea8a256bb3622cc
SHA2561b27215e48aafca4a2d6dfd76737f02d65b4798205a1b6a0ef3d83f7b285a71c
SHA51227d879d05a432fc67fd4bcf022a20d7a9f10619673d6acad4622f012c48826be9e885bf92dddd2fbb122f91da9ac2f3108e0132b6a7a629c267df12d1f7fbef4
-
Filesize
328KB
MD5becb3e4af9f80f76d3b98a25c72741dd
SHA16705f23a1cd2b9ccf11938d3fea8a256bb3622cc
SHA2561b27215e48aafca4a2d6dfd76737f02d65b4798205a1b6a0ef3d83f7b285a71c
SHA51227d879d05a432fc67fd4bcf022a20d7a9f10619673d6acad4622f012c48826be9e885bf92dddd2fbb122f91da9ac2f3108e0132b6a7a629c267df12d1f7fbef4
-
Filesize
328KB
MD5becb3e4af9f80f76d3b98a25c72741dd
SHA16705f23a1cd2b9ccf11938d3fea8a256bb3622cc
SHA2561b27215e48aafca4a2d6dfd76737f02d65b4798205a1b6a0ef3d83f7b285a71c
SHA51227d879d05a432fc67fd4bcf022a20d7a9f10619673d6acad4622f012c48826be9e885bf92dddd2fbb122f91da9ac2f3108e0132b6a7a629c267df12d1f7fbef4
-
Filesize
328KB
MD5becb3e4af9f80f76d3b98a25c72741dd
SHA16705f23a1cd2b9ccf11938d3fea8a256bb3622cc
SHA2561b27215e48aafca4a2d6dfd76737f02d65b4798205a1b6a0ef3d83f7b285a71c
SHA51227d879d05a432fc67fd4bcf022a20d7a9f10619673d6acad4622f012c48826be9e885bf92dddd2fbb122f91da9ac2f3108e0132b6a7a629c267df12d1f7fbef4
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b