Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 06:24

General

  • Target

    94e6ed3afb6e6cd8310c82c09174889fdac0b2b938e86017ad2210bafffac200_JC.exe

  • Size

    1.3MB

  • MD5

    949daf21eda6f1b54801319a3b3788bc

  • SHA1

    c81320bfd645836c70d328ff859b8b80f204a79a

  • SHA256

    94e6ed3afb6e6cd8310c82c09174889fdac0b2b938e86017ad2210bafffac200

  • SHA512

    0148f1586fc787e4f76349fdffada0f48f346751a878bd26aa2a638fa4c709db95234cb2b39ae7c108564cc42bfabc1e54b41bfa8e482a7e3a9652635f676815

  • SSDEEP

    24576:Yyf9Xrc6Yl0Ajrh8W+G/bizQ4RUVhER0hsoX2zx2SctkdirIlyCl6R6x:ffhmdjVdFD+gER0bXgxlcGdiZCl6

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94e6ed3afb6e6cd8310c82c09174889fdac0b2b938e86017ad2210bafffac200_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\94e6ed3afb6e6cd8310c82c09174889fdac0b2b938e86017ad2210bafffac200_JC.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5921228.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5921228.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1257398.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1257398.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2112
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4795189.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4795189.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1868
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8988752.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8988752.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4672
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1750571.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1750571.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:4676
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a9123200.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a9123200.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4268
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:728
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 564
                  8⤵
                  • Program crash
                  PID:4584
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b2652920.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b2652920.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2140
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:520
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 540
                      9⤵
                      • Program crash
                      PID:1496
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 592
                    8⤵
                    • Program crash
                    PID:2440
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c4348844.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c4348844.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4248
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:912
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 592
                    7⤵
                    • Program crash
                    PID:3992
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d7234324.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d7234324.exe
                5⤵
                • Executes dropped EXE
                PID:1764
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e0272302.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e0272302.exe
              4⤵
              • Executes dropped EXE
              PID:3672
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4268 -ip 4268
        1⤵
          PID:3836
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2140 -ip 2140
          1⤵
            PID:2444
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 520 -ip 520
            1⤵
              PID:2672
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4248 -ip 4248
              1⤵
                PID:4472

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5921228.exe

                Filesize

                1.2MB

                MD5

                2011215a213671a4655f400be4651a96

                SHA1

                88b92c107cb616f61b02db72c15709e1eb281675

                SHA256

                bc03a0ddcf71f3feb0bc2b06aa51c27992bfeabba44a0fbeb6e7d7510c6f286f

                SHA512

                4a7414955a54e4b649d74dfe40c9df5c460332c75b954770e3ebbf0d0e57797dfe4b7f8e27f62c7c6e4d80e6cdcf2830a62ccfe97d6016875e80c163bd03cfd4

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5921228.exe

                Filesize

                1.2MB

                MD5

                2011215a213671a4655f400be4651a96

                SHA1

                88b92c107cb616f61b02db72c15709e1eb281675

                SHA256

                bc03a0ddcf71f3feb0bc2b06aa51c27992bfeabba44a0fbeb6e7d7510c6f286f

                SHA512

                4a7414955a54e4b649d74dfe40c9df5c460332c75b954770e3ebbf0d0e57797dfe4b7f8e27f62c7c6e4d80e6cdcf2830a62ccfe97d6016875e80c163bd03cfd4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1257398.exe

                Filesize

                953KB

                MD5

                ca46cb944b8a58ec13018bbb563be394

                SHA1

                9d1ed27510155e061ad705308e0ffc7e06c4454d

                SHA256

                fb6cfbb1cd0882d5a908bdaee23eadf008d32b963a588cb4d4a509a88a96fd60

                SHA512

                d3eba8efc9a57cbea7dcfc77c1cb67c7efc58b55f26aa10ef47bf38d036b9fadd2309f538a08de582de53c93eb4b482af174c00ae63e4f778af4a3c55d3e1736

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1257398.exe

                Filesize

                953KB

                MD5

                ca46cb944b8a58ec13018bbb563be394

                SHA1

                9d1ed27510155e061ad705308e0ffc7e06c4454d

                SHA256

                fb6cfbb1cd0882d5a908bdaee23eadf008d32b963a588cb4d4a509a88a96fd60

                SHA512

                d3eba8efc9a57cbea7dcfc77c1cb67c7efc58b55f26aa10ef47bf38d036b9fadd2309f538a08de582de53c93eb4b482af174c00ae63e4f778af4a3c55d3e1736

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e0272302.exe

                Filesize

                174KB

                MD5

                d312299a96e382217fe8bbf5d5d07794

                SHA1

                71310546a59dfb725d2153546c429c9337392df6

                SHA256

                699aecbeeb4972296ab85e23abf78eac079613beb0e2e6463ed9d89c3f1342fa

                SHA512

                efc4b19478720309931e027e5248eab3c42d702ff6abc208a307cf3c8e71523a0ef4276d0ed20c80e3dd60786027b125e3ff7858fdae7a78ac54d13e76365efe

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e0272302.exe

                Filesize

                174KB

                MD5

                d312299a96e382217fe8bbf5d5d07794

                SHA1

                71310546a59dfb725d2153546c429c9337392df6

                SHA256

                699aecbeeb4972296ab85e23abf78eac079613beb0e2e6463ed9d89c3f1342fa

                SHA512

                efc4b19478720309931e027e5248eab3c42d702ff6abc208a307cf3c8e71523a0ef4276d0ed20c80e3dd60786027b125e3ff7858fdae7a78ac54d13e76365efe

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4795189.exe

                Filesize

                797KB

                MD5

                5826104d7ec9cfd465255364251a388c

                SHA1

                c2fdea5e5a504d249010e207774aa6e6920ebd37

                SHA256

                36d8dd8d87712d004b53790298aff826f606671a39551b9c0403ed9ccf7db152

                SHA512

                d7fa2e4a143f1d0717f1c2ffe16bb2fd5ded944249ef558bd9c9291cca09289256f98cbfa443d626197e2d77405d5387ed1183c77ba5a0a37fa25e730167ad28

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4795189.exe

                Filesize

                797KB

                MD5

                5826104d7ec9cfd465255364251a388c

                SHA1

                c2fdea5e5a504d249010e207774aa6e6920ebd37

                SHA256

                36d8dd8d87712d004b53790298aff826f606671a39551b9c0403ed9ccf7db152

                SHA512

                d7fa2e4a143f1d0717f1c2ffe16bb2fd5ded944249ef558bd9c9291cca09289256f98cbfa443d626197e2d77405d5387ed1183c77ba5a0a37fa25e730167ad28

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d7234324.exe

                Filesize

                140KB

                MD5

                ed05f559d6f760154c9e388583c88a59

                SHA1

                ff7a2f84907e907aa161529f39cf1f168d98fd91

                SHA256

                d841e1cd0d674744ca2d7dae8d00fafe00ad8f58479ace673e52cc4de1934272

                SHA512

                3c27d173e23aa63c2123782b7d7c22184970c493c7675e54aaa2417734ec67c48cd1f5948bd22aadb72fb3a5845c1ea53e30b82d1fd8f44dbc9d72944cd02031

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d7234324.exe

                Filesize

                140KB

                MD5

                ed05f559d6f760154c9e388583c88a59

                SHA1

                ff7a2f84907e907aa161529f39cf1f168d98fd91

                SHA256

                d841e1cd0d674744ca2d7dae8d00fafe00ad8f58479ace673e52cc4de1934272

                SHA512

                3c27d173e23aa63c2123782b7d7c22184970c493c7675e54aaa2417734ec67c48cd1f5948bd22aadb72fb3a5845c1ea53e30b82d1fd8f44dbc9d72944cd02031

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8988752.exe

                Filesize

                631KB

                MD5

                3ebd7b789bd95a263959a38b3fd3a6a3

                SHA1

                1244662c5b24f6a6b4d0bf2cc87242118508ea69

                SHA256

                bc70a2fc8eda1479486143cd8faf3e4170bfaac9c9f3d09568d04afbee662716

                SHA512

                86c5f3220ddc9d6daea7301b9871865e428230ce6f34d60d1bbc703bc6c80c6580d83cf823771c0fc77cf7d57f28a858633e34d973de56d559162d34fd9856a3

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8988752.exe

                Filesize

                631KB

                MD5

                3ebd7b789bd95a263959a38b3fd3a6a3

                SHA1

                1244662c5b24f6a6b4d0bf2cc87242118508ea69

                SHA256

                bc70a2fc8eda1479486143cd8faf3e4170bfaac9c9f3d09568d04afbee662716

                SHA512

                86c5f3220ddc9d6daea7301b9871865e428230ce6f34d60d1bbc703bc6c80c6580d83cf823771c0fc77cf7d57f28a858633e34d973de56d559162d34fd9856a3

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c4348844.exe

                Filesize

                413KB

                MD5

                bd86b41915b341e36b9362d1d1259092

                SHA1

                4f8c89bd01b8a65492166c60d60f000cbe334787

                SHA256

                9051623a6516136a31d5e963c74b98db718a52988e087c850bdfff4c52443461

                SHA512

                8b9e1d4115ac87ba91be25decb9679adbe8c3fa99f4801dfd725a4f5fee20abcad4e17772298b0e7a4823297c44f9189fc3797ebd3ce9ddc1d9c41eed62f4660

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c4348844.exe

                Filesize

                413KB

                MD5

                bd86b41915b341e36b9362d1d1259092

                SHA1

                4f8c89bd01b8a65492166c60d60f000cbe334787

                SHA256

                9051623a6516136a31d5e963c74b98db718a52988e087c850bdfff4c52443461

                SHA512

                8b9e1d4115ac87ba91be25decb9679adbe8c3fa99f4801dfd725a4f5fee20abcad4e17772298b0e7a4823297c44f9189fc3797ebd3ce9ddc1d9c41eed62f4660

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1750571.exe

                Filesize

                354KB

                MD5

                c85c6ad1347fb3a9b816b78a36971f55

                SHA1

                2d52459b9f475b0d35207379808e67dd446e0d81

                SHA256

                3517eb11c6474add064024e664913c3b02d4806d9ac557675fcefebc732d0619

                SHA512

                594cb40abddef9c26521cc10dc1bd01da744913ce912b1d83aa4e2f76d2eb8c30dce707c85cad1eab53e5c3c6ba7f73c43eb6f09904fe42ca85fe77c93aa9141

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1750571.exe

                Filesize

                354KB

                MD5

                c85c6ad1347fb3a9b816b78a36971f55

                SHA1

                2d52459b9f475b0d35207379808e67dd446e0d81

                SHA256

                3517eb11c6474add064024e664913c3b02d4806d9ac557675fcefebc732d0619

                SHA512

                594cb40abddef9c26521cc10dc1bd01da744913ce912b1d83aa4e2f76d2eb8c30dce707c85cad1eab53e5c3c6ba7f73c43eb6f09904fe42ca85fe77c93aa9141

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a9123200.exe

                Filesize

                250KB

                MD5

                610ceb932064854662d2e6176dfba746

                SHA1

                75737ce5977a7ea1652e0e997d9a430f0833f817

                SHA256

                bc6ef296307b57bb69ce14e084759ba13e2b54ab37af382c193c4d3e7dab542f

                SHA512

                4b84308987465b6184e00388a6eb655b54ad111b08fd9ccb93627dd7519655bee38e3c9588d775f020ce18fb9dee1dd8196d4dd98de0639342eda75f0dd0750c

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a9123200.exe

                Filesize

                250KB

                MD5

                610ceb932064854662d2e6176dfba746

                SHA1

                75737ce5977a7ea1652e0e997d9a430f0833f817

                SHA256

                bc6ef296307b57bb69ce14e084759ba13e2b54ab37af382c193c4d3e7dab542f

                SHA512

                4b84308987465b6184e00388a6eb655b54ad111b08fd9ccb93627dd7519655bee38e3c9588d775f020ce18fb9dee1dd8196d4dd98de0639342eda75f0dd0750c

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b2652920.exe

                Filesize

                379KB

                MD5

                97e8bdaaf991eedf81b9845dba88507c

                SHA1

                cc929dca17168b1d47a356c938b5b89e1af0951c

                SHA256

                fc147d9974ab54a88d7e2712602b7aaa42061f687cfa50609f122a1fcf4cb963

                SHA512

                634ceb6a20aa2049b1eed049819fa6343c1312adbbaac751291a46a7d249e47f1364c11f80fdd8496b3a19a6a8455a4af973165b5aee6f3925159b0abb717c6f

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b2652920.exe

                Filesize

                379KB

                MD5

                97e8bdaaf991eedf81b9845dba88507c

                SHA1

                cc929dca17168b1d47a356c938b5b89e1af0951c

                SHA256

                fc147d9974ab54a88d7e2712602b7aaa42061f687cfa50609f122a1fcf4cb963

                SHA512

                634ceb6a20aa2049b1eed049819fa6343c1312adbbaac751291a46a7d249e47f1364c11f80fdd8496b3a19a6a8455a4af973165b5aee6f3925159b0abb717c6f

              • memory/520-51-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/520-54-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/520-50-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/520-52-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/728-44-0x0000000074610000-0x0000000074DC0000-memory.dmp

                Filesize

                7.7MB

              • memory/728-42-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/728-43-0x0000000074610000-0x0000000074DC0000-memory.dmp

                Filesize

                7.7MB

              • memory/728-46-0x0000000074610000-0x0000000074DC0000-memory.dmp

                Filesize

                7.7MB

              • memory/912-66-0x000000000B390000-0x000000000B9A8000-memory.dmp

                Filesize

                6.1MB

              • memory/912-78-0x000000000B010000-0x000000000B05C000-memory.dmp

                Filesize

                304KB

              • memory/912-61-0x0000000003140000-0x0000000003146000-memory.dmp

                Filesize

                24KB

              • memory/912-60-0x0000000073900000-0x00000000740B0000-memory.dmp

                Filesize

                7.7MB

              • memory/912-70-0x000000000AF00000-0x000000000B00A000-memory.dmp

                Filesize

                1.0MB

              • memory/912-58-0x0000000000400000-0x0000000000430000-memory.dmp

                Filesize

                192KB

              • memory/912-72-0x000000000AE40000-0x000000000AE52000-memory.dmp

                Filesize

                72KB

              • memory/912-79-0x0000000003160000-0x0000000003170000-memory.dmp

                Filesize

                64KB

              • memory/912-71-0x0000000003160000-0x0000000003170000-memory.dmp

                Filesize

                64KB

              • memory/912-65-0x0000000073900000-0x00000000740B0000-memory.dmp

                Filesize

                7.7MB

              • memory/912-76-0x000000000AEA0000-0x000000000AEDC000-memory.dmp

                Filesize

                240KB

              • memory/3672-75-0x0000000073900000-0x00000000740B0000-memory.dmp

                Filesize

                7.7MB

              • memory/3672-77-0x00000000051A0000-0x00000000051B0000-memory.dmp

                Filesize

                64KB

              • memory/3672-74-0x0000000005180000-0x0000000005186000-memory.dmp

                Filesize

                24KB

              • memory/3672-73-0x0000000000860000-0x0000000000890000-memory.dmp

                Filesize

                192KB

              • memory/3672-80-0x0000000073900000-0x00000000740B0000-memory.dmp

                Filesize

                7.7MB

              • memory/3672-81-0x00000000051A0000-0x00000000051B0000-memory.dmp

                Filesize

                64KB