Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
176s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
17/09/2023, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe
Resource
win10-20230915-en
General
-
Target
c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe
-
Size
1.3MB
-
MD5
4a05dd3afee92c247ae5afd584217677
-
SHA1
85617a85e1183f160afbac80fde61aac8c4540e6
-
SHA256
c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5
-
SHA512
596e928da5749a9db9a1f2927511aedb3eb81b844639749b55ac1d7e25e1c000160b27c8bef55afd3e39bb242861b3daa5d73aff07dc53f6b956dfcc0175eaf0
-
SSDEEP
24576:209BY6wnpPsz9R8UuCUjEdp/BPsG29RIn+uxiFMcBtPuYdQ:209DUp2CUmj+ZPB29SxtcBs6Q
Malware Config
Extracted
redline
black
77.91.124.82:19071
-
auth_value
c5887216cebc5a219113738140bc3047
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral1/memory/3060-34-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 2748 x7070397.exe 3280 x6064401.exe 4628 x8843737.exe 1240 g5557687.exe 3868 h0046556.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6064401.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8843737.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7070397.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1440 set thread context of 3168 1440 c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe 70 PID 1240 set thread context of 3060 1240 g5557687.exe 75 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3060 AppLaunch.exe 3060 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3060 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1440 wrote to memory of 3168 1440 c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe 70 PID 1440 wrote to memory of 3168 1440 c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe 70 PID 1440 wrote to memory of 3168 1440 c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe 70 PID 1440 wrote to memory of 3168 1440 c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe 70 PID 1440 wrote to memory of 3168 1440 c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe 70 PID 1440 wrote to memory of 3168 1440 c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe 70 PID 1440 wrote to memory of 3168 1440 c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe 70 PID 1440 wrote to memory of 3168 1440 c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe 70 PID 1440 wrote to memory of 3168 1440 c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe 70 PID 1440 wrote to memory of 3168 1440 c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe 70 PID 3168 wrote to memory of 2748 3168 AppLaunch.exe 71 PID 3168 wrote to memory of 2748 3168 AppLaunch.exe 71 PID 3168 wrote to memory of 2748 3168 AppLaunch.exe 71 PID 2748 wrote to memory of 3280 2748 x7070397.exe 72 PID 2748 wrote to memory of 3280 2748 x7070397.exe 72 PID 2748 wrote to memory of 3280 2748 x7070397.exe 72 PID 3280 wrote to memory of 4628 3280 x6064401.exe 73 PID 3280 wrote to memory of 4628 3280 x6064401.exe 73 PID 3280 wrote to memory of 4628 3280 x6064401.exe 73 PID 4628 wrote to memory of 1240 4628 x8843737.exe 74 PID 4628 wrote to memory of 1240 4628 x8843737.exe 74 PID 4628 wrote to memory of 1240 4628 x8843737.exe 74 PID 1240 wrote to memory of 3060 1240 g5557687.exe 75 PID 1240 wrote to memory of 3060 1240 g5557687.exe 75 PID 1240 wrote to memory of 3060 1240 g5557687.exe 75 PID 1240 wrote to memory of 3060 1240 g5557687.exe 75 PID 1240 wrote to memory of 3060 1240 g5557687.exe 75 PID 1240 wrote to memory of 3060 1240 g5557687.exe 75 PID 1240 wrote to memory of 3060 1240 g5557687.exe 75 PID 1240 wrote to memory of 3060 1240 g5557687.exe 75 PID 4628 wrote to memory of 3868 4628 x8843737.exe 76 PID 4628 wrote to memory of 3868 4628 x8843737.exe 76 PID 4628 wrote to memory of 3868 4628 x8843737.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe"C:\Users\Admin\AppData\Local\Temp\c8ae519292c26b32d79e82cc41bbe68a91bb0db3d13035117111475f6c2e15c5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7070397.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7070397.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6064401.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6064401.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8843737.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8843737.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5557687.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5557687.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0046556.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0046556.exe6⤵
- Executes dropped EXE
PID:3868
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
767KB
MD55a774f41c940b22f7c9bbfd74764bed4
SHA173668037d23e1738fe71acdf95bd46d9117b5230
SHA2562429b3f2c283da7544fad317611e0406fa73e9459728496656b2d030a96e9fc7
SHA51226b9a3ed8e53f6b7e40e9b08d104b7598846541b3742c87699bdacbf43a615c49a7aef1f750565afad7068cf7de52e9241f4dab1de7b3cc79188808c77dec3ee
-
Filesize
767KB
MD55a774f41c940b22f7c9bbfd74764bed4
SHA173668037d23e1738fe71acdf95bd46d9117b5230
SHA2562429b3f2c283da7544fad317611e0406fa73e9459728496656b2d030a96e9fc7
SHA51226b9a3ed8e53f6b7e40e9b08d104b7598846541b3742c87699bdacbf43a615c49a7aef1f750565afad7068cf7de52e9241f4dab1de7b3cc79188808c77dec3ee
-
Filesize
492KB
MD5f2c63e89afa3b80f6d08fbd38c82ed7e
SHA124d3c662c3fd420731c795e7b297f98d24489e2f
SHA256809d37d028744a2b9b7e797573b1c3431a885593706b202714774288c2561d97
SHA512a1117acbb1871c784989aff50e6e32d1d8f6abf3b73ecf464ae9c57c29ae46eb7190e63ebe15f5561c7c306e83df7875221b713335edf83739d483b062685035
-
Filesize
492KB
MD5f2c63e89afa3b80f6d08fbd38c82ed7e
SHA124d3c662c3fd420731c795e7b297f98d24489e2f
SHA256809d37d028744a2b9b7e797573b1c3431a885593706b202714774288c2561d97
SHA512a1117acbb1871c784989aff50e6e32d1d8f6abf3b73ecf464ae9c57c29ae46eb7190e63ebe15f5561c7c306e83df7875221b713335edf83739d483b062685035
-
Filesize
327KB
MD5cd47d9dd00168041f651ef91d51873e8
SHA184a9a758688f527f7e139ea62613349ab56c45d1
SHA25683d9409cff763532818552b8659e2bf225b01424ad0e4063ce4d822ddc764c02
SHA51296ee8a19e29f74cb709a784af5866d9f94bb3867756c1fa6b4e129b7ee99ec7156c1c82ea9f7594ab2fa15e4db67a982ce7b3dd86916fdd91998fff8b0ddcd8d
-
Filesize
327KB
MD5cd47d9dd00168041f651ef91d51873e8
SHA184a9a758688f527f7e139ea62613349ab56c45d1
SHA25683d9409cff763532818552b8659e2bf225b01424ad0e4063ce4d822ddc764c02
SHA51296ee8a19e29f74cb709a784af5866d9f94bb3867756c1fa6b4e129b7ee99ec7156c1c82ea9f7594ab2fa15e4db67a982ce7b3dd86916fdd91998fff8b0ddcd8d
-
Filesize
242KB
MD57440c11c60ca4f79c188f8a2304d57d1
SHA13e842a1c814606390b8a36fc8f6f240d0ebc418a
SHA25675970f7c84baf69b1557bf1cbd76596b995552243add75f7bdd692141b63fbb4
SHA5124c4dab580b809bf5a0f8dfac6527c8d1c54eaaad7263e33b8ca22982841f580b604984df98cf7c1b49c394cd23e933bb053e91be6db778cb4afbcc92f15bfcdd
-
Filesize
242KB
MD57440c11c60ca4f79c188f8a2304d57d1
SHA13e842a1c814606390b8a36fc8f6f240d0ebc418a
SHA25675970f7c84baf69b1557bf1cbd76596b995552243add75f7bdd692141b63fbb4
SHA5124c4dab580b809bf5a0f8dfac6527c8d1c54eaaad7263e33b8ca22982841f580b604984df98cf7c1b49c394cd23e933bb053e91be6db778cb4afbcc92f15bfcdd
-
Filesize
174KB
MD5005ee76a889964cd4316947e4a036303
SHA13df590396be6c4d3b81baa374e221ee578cfcf61
SHA256e34a31e874d68154076fcd274a39328deb5f19ab438a8d9783cc8197c12a40cf
SHA5121c519289ca4cf067326f0d2c687af2eeec51ee399dc213157889f6448703c34e18b61024c3f9bfcfa2dd06857d99dd14e09acd2bc4c0ad3b82b203515b57058a
-
Filesize
174KB
MD5005ee76a889964cd4316947e4a036303
SHA13df590396be6c4d3b81baa374e221ee578cfcf61
SHA256e34a31e874d68154076fcd274a39328deb5f19ab438a8d9783cc8197c12a40cf
SHA5121c519289ca4cf067326f0d2c687af2eeec51ee399dc213157889f6448703c34e18b61024c3f9bfcfa2dd06857d99dd14e09acd2bc4c0ad3b82b203515b57058a