Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 14:08

General

  • Target

    9ea54921590b553600072b5ca0b801fec3549e221065ea0d7dd0c6ad62ff9a22.exe

  • Size

    1.3MB

  • MD5

    49a7273dff0c9221b76f310aef760ac1

  • SHA1

    789bfc37396eb9153e8a0e63f8189e12f7bea154

  • SHA256

    9ea54921590b553600072b5ca0b801fec3549e221065ea0d7dd0c6ad62ff9a22

  • SHA512

    60aaf4181f196c2c8c8e5793618ba2f5433b89bc1ed7a3e03b6182d1eba07d178f34e856fe4af8b0d52e58cc74a296c817626e2d33504b36a2422b8a72a7c0f1

  • SSDEEP

    24576:3ynSyMxEkIamMhpmbggMoJF08aZgegjwJh6vEaxMKZAsSyNOxNYVba:CXMxfIam9d0vZgegcJTaxn43YV

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ea54921590b553600072b5ca0b801fec3549e221065ea0d7dd0c6ad62ff9a22.exe
    "C:\Users\Admin\AppData\Local\Temp\9ea54921590b553600072b5ca0b801fec3549e221065ea0d7dd0c6ad62ff9a22.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1143355.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1143355.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1694085.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1694085.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3284
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8499222.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8499222.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3368
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8363568.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8363568.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3300
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1108616.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1108616.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:4828
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a4028768.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a4028768.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4108
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4444
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 592
                  8⤵
                  • Program crash
                  PID:1216
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6198713.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6198713.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4020
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:980
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 540
                      9⤵
                      • Program crash
                      PID:1800
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 564
                    8⤵
                    • Program crash
                    PID:4868
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c6356745.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c6356745.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:5004
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                    PID:4784
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 564
                    7⤵
                    • Program crash
                    PID:3552
              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d8291402.exe
                C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d8291402.exe
                5⤵
                • Executes dropped EXE
                PID:3136
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7358780.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7358780.exe
              4⤵
              • Executes dropped EXE
              PID:4348
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4108 -ip 4108
        1⤵
          PID:3840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4020 -ip 4020
          1⤵
            PID:4092
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 980 -ip 980
            1⤵
              PID:4996
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5004 -ip 5004
              1⤵
                PID:4796

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1143355.exe

                Filesize

                1.2MB

                MD5

                a2ae86856bb45a6a941f0a6f66ca43a3

                SHA1

                535701a179573689c60e7603c71db3fb9e26228a

                SHA256

                afea19916e01a44e4be11169a28f97505dc83ce082c31a93c4aa911366965f89

                SHA512

                c77f64b6a3b6c21edd4bd4fe4ea099f7dc8ad6daef4ce791057bfd4e4198a67d6b970bcb14efd36eda3f55e2903715a38b1b0f1c174e15837eaf833164d0f6df

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1143355.exe

                Filesize

                1.2MB

                MD5

                a2ae86856bb45a6a941f0a6f66ca43a3

                SHA1

                535701a179573689c60e7603c71db3fb9e26228a

                SHA256

                afea19916e01a44e4be11169a28f97505dc83ce082c31a93c4aa911366965f89

                SHA512

                c77f64b6a3b6c21edd4bd4fe4ea099f7dc8ad6daef4ce791057bfd4e4198a67d6b970bcb14efd36eda3f55e2903715a38b1b0f1c174e15837eaf833164d0f6df

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1694085.exe

                Filesize

                953KB

                MD5

                fdacb070480e0aa33c1e684e95563743

                SHA1

                27b7aa79b3c9e42dbf6262f7c53179ea5a5e222f

                SHA256

                28f1d774ed42b8294187c21c9d034eec66c7baf15926816eb448975622c81f0e

                SHA512

                1bb5d3a3a13cb8e57f287e5c40e163672ca810f3529f0e3614022dc603cbd595da0e1d3a359197a818c7d3b6e28e321f8d0c1f804a788550006508cc9d306066

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1694085.exe

                Filesize

                953KB

                MD5

                fdacb070480e0aa33c1e684e95563743

                SHA1

                27b7aa79b3c9e42dbf6262f7c53179ea5a5e222f

                SHA256

                28f1d774ed42b8294187c21c9d034eec66c7baf15926816eb448975622c81f0e

                SHA512

                1bb5d3a3a13cb8e57f287e5c40e163672ca810f3529f0e3614022dc603cbd595da0e1d3a359197a818c7d3b6e28e321f8d0c1f804a788550006508cc9d306066

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7358780.exe

                Filesize

                174KB

                MD5

                9cb49e0ab8054ba6c17bf2a2f9fad368

                SHA1

                bb2dd0f99f6a62b10f976d6baff31da2bc10101e

                SHA256

                3201db8bdd35d3c358612d2f32daa0a227109ab73edf2d5126fbd2deeea8fb45

                SHA512

                3e20e256e7a43ef34312489ba77464d2b1ee1a2ff3673159103e50c38c416a608fb18c788a9aba0dc919ea02dbb194d356b4d5d914b1df68894e35b6b713c212

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7358780.exe

                Filesize

                174KB

                MD5

                9cb49e0ab8054ba6c17bf2a2f9fad368

                SHA1

                bb2dd0f99f6a62b10f976d6baff31da2bc10101e

                SHA256

                3201db8bdd35d3c358612d2f32daa0a227109ab73edf2d5126fbd2deeea8fb45

                SHA512

                3e20e256e7a43ef34312489ba77464d2b1ee1a2ff3673159103e50c38c416a608fb18c788a9aba0dc919ea02dbb194d356b4d5d914b1df68894e35b6b713c212

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8499222.exe

                Filesize

                797KB

                MD5

                6a94c5364062a2251e6a67469fea848c

                SHA1

                707051411a2cbef4bf29657ab89a64b09f08d5ba

                SHA256

                15f9b92615392fce677bb9cf719249e8043a8f008361160a18efe0d4729978bc

                SHA512

                18f8d79124609c3648a459ff92ff45747199508d589eea751b9634c5a415f810470759de8965696164f6163ac936072257f486001edddff3fad34c8e0ce6cc30

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8499222.exe

                Filesize

                797KB

                MD5

                6a94c5364062a2251e6a67469fea848c

                SHA1

                707051411a2cbef4bf29657ab89a64b09f08d5ba

                SHA256

                15f9b92615392fce677bb9cf719249e8043a8f008361160a18efe0d4729978bc

                SHA512

                18f8d79124609c3648a459ff92ff45747199508d589eea751b9634c5a415f810470759de8965696164f6163ac936072257f486001edddff3fad34c8e0ce6cc30

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d8291402.exe

                Filesize

                140KB

                MD5

                68f3413ccdd5d3708fca52064287c596

                SHA1

                4fc078d9a2c161fa0c87c26e22f1cbb99cf121b7

                SHA256

                dfa595fbe5d4550f9329434c6214efcce461447460b69153a0edef158d15b25e

                SHA512

                d87d1f5bb61e0598bba74929e88b1a371efb1ab913aa2a8b0941b4835fd72bb3a7361b9ab9f4a5a48cb07a291922fde06ab728c162f527cc60c36a8c950f167b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d8291402.exe

                Filesize

                140KB

                MD5

                68f3413ccdd5d3708fca52064287c596

                SHA1

                4fc078d9a2c161fa0c87c26e22f1cbb99cf121b7

                SHA256

                dfa595fbe5d4550f9329434c6214efcce461447460b69153a0edef158d15b25e

                SHA512

                d87d1f5bb61e0598bba74929e88b1a371efb1ab913aa2a8b0941b4835fd72bb3a7361b9ab9f4a5a48cb07a291922fde06ab728c162f527cc60c36a8c950f167b

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8363568.exe

                Filesize

                631KB

                MD5

                e4dc3740697e6699ce464e01a3827d34

                SHA1

                714eee6e4e952275933f7b82db11a29502d7f355

                SHA256

                600fe1b0fcffae27ce655488a4e6a89c72256ba62a9a2a4581a0a1899533a1f5

                SHA512

                f7ae7d76494d2409d3ebd8e6fe8f52864985d2c2cefa1c621fd8ea44cfa4aa0aa00936bfef172d938f584c1a1d9885e1dbf7910e1f6f4a619421609e5f960144

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8363568.exe

                Filesize

                631KB

                MD5

                e4dc3740697e6699ce464e01a3827d34

                SHA1

                714eee6e4e952275933f7b82db11a29502d7f355

                SHA256

                600fe1b0fcffae27ce655488a4e6a89c72256ba62a9a2a4581a0a1899533a1f5

                SHA512

                f7ae7d76494d2409d3ebd8e6fe8f52864985d2c2cefa1c621fd8ea44cfa4aa0aa00936bfef172d938f584c1a1d9885e1dbf7910e1f6f4a619421609e5f960144

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c6356745.exe

                Filesize

                413KB

                MD5

                cc07b96fbd2f551de6687b8e2fb89cc4

                SHA1

                43d06ce75ca9a0623d07b7afbe3b291b3ecdd0f8

                SHA256

                dc4fd07804460e0552786f3dde624d11bbff45f86554afebc949323db9f34ba7

                SHA512

                5b1fcd845399826e3e6c04278f5cc843a44f7284df80504a4dfea8bf79fe3d02ffec46ee18f1e64739143833593cbe9bbb108874cc613fae83c3a3d44da28073

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c6356745.exe

                Filesize

                413KB

                MD5

                cc07b96fbd2f551de6687b8e2fb89cc4

                SHA1

                43d06ce75ca9a0623d07b7afbe3b291b3ecdd0f8

                SHA256

                dc4fd07804460e0552786f3dde624d11bbff45f86554afebc949323db9f34ba7

                SHA512

                5b1fcd845399826e3e6c04278f5cc843a44f7284df80504a4dfea8bf79fe3d02ffec46ee18f1e64739143833593cbe9bbb108874cc613fae83c3a3d44da28073

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1108616.exe

                Filesize

                354KB

                MD5

                d9679936d55ae92d8dde1a35c9966f0c

                SHA1

                b2336d74f93bdf9c8c39a0e6ed869ff54e9170ca

                SHA256

                0c7546611961708fc1911b2613d289e66d0e59631b66625d42834f9b7d13cabc

                SHA512

                d8911b9c748cc2620a0c8ad52745af125cd826d205879ab34edf962ae4743b3f53b074735740e59a406887f5eec51b0aae80e0b54eacdfa522d7f4c85cb529bc

              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v1108616.exe

                Filesize

                354KB

                MD5

                d9679936d55ae92d8dde1a35c9966f0c

                SHA1

                b2336d74f93bdf9c8c39a0e6ed869ff54e9170ca

                SHA256

                0c7546611961708fc1911b2613d289e66d0e59631b66625d42834f9b7d13cabc

                SHA512

                d8911b9c748cc2620a0c8ad52745af125cd826d205879ab34edf962ae4743b3f53b074735740e59a406887f5eec51b0aae80e0b54eacdfa522d7f4c85cb529bc

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a4028768.exe

                Filesize

                250KB

                MD5

                d11eefadf6f3b707f8a621f9878f137e

                SHA1

                34ccb7ced5a2ff078e752ce139004146abe09c03

                SHA256

                7b37e62f3d38fbd10789b69ccf04ba9920c69f759131b77808711486ceaf14c6

                SHA512

                7c0a5dc372b1971d86e8f9d8db30546f5d08dfafc4b97cb901587ea6648cbf80e1b9b29849383ec9918e8c45d7a9b5d2b6d349a1ec37096458db6f917884ac75

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a4028768.exe

                Filesize

                250KB

                MD5

                d11eefadf6f3b707f8a621f9878f137e

                SHA1

                34ccb7ced5a2ff078e752ce139004146abe09c03

                SHA256

                7b37e62f3d38fbd10789b69ccf04ba9920c69f759131b77808711486ceaf14c6

                SHA512

                7c0a5dc372b1971d86e8f9d8db30546f5d08dfafc4b97cb901587ea6648cbf80e1b9b29849383ec9918e8c45d7a9b5d2b6d349a1ec37096458db6f917884ac75

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6198713.exe

                Filesize

                379KB

                MD5

                8902c6218503bc8e8958c911b2d6522a

                SHA1

                920d8ae429ed96306f32af48f179f0a3ab4ea8fd

                SHA256

                540c73721ad0ed8d41b423e232f49731c312fbcfbf29c6734b5906227b9c6fb2

                SHA512

                2329eb2a254d5cce14dc0a91ad6751055ddaa498fc6a613984b98dbf2819d64789994d2a6498398b349528ff35652cdec752de781b7b4f4b72bcee4a91319a5f

              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6198713.exe

                Filesize

                379KB

                MD5

                8902c6218503bc8e8958c911b2d6522a

                SHA1

                920d8ae429ed96306f32af48f179f0a3ab4ea8fd

                SHA256

                540c73721ad0ed8d41b423e232f49731c312fbcfbf29c6734b5906227b9c6fb2

                SHA512

                2329eb2a254d5cce14dc0a91ad6751055ddaa498fc6a613984b98dbf2819d64789994d2a6498398b349528ff35652cdec752de781b7b4f4b72bcee4a91319a5f

              • memory/980-49-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/980-47-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/980-48-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/980-51-0x0000000000400000-0x0000000000428000-memory.dmp

                Filesize

                160KB

              • memory/4348-79-0x00000000744E0000-0x0000000074C90000-memory.dmp

                Filesize

                7.7MB

              • memory/4348-74-0x0000000002390000-0x00000000023A0000-memory.dmp

                Filesize

                64KB

              • memory/4348-70-0x0000000002370000-0x0000000002376000-memory.dmp

                Filesize

                24KB

              • memory/4348-71-0x00000000744E0000-0x0000000074C90000-memory.dmp

                Filesize

                7.7MB

              • memory/4348-69-0x0000000000380000-0x00000000003B0000-memory.dmp

                Filesize

                192KB

              • memory/4444-76-0x00000000744E0000-0x0000000074C90000-memory.dmp

                Filesize

                7.7MB

              • memory/4444-42-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/4444-73-0x00000000744E0000-0x0000000074C90000-memory.dmp

                Filesize

                7.7MB

              • memory/4444-43-0x00000000744E0000-0x0000000074C90000-memory.dmp

                Filesize

                7.7MB

              • memory/4784-56-0x0000000002BC0000-0x0000000002BC6000-memory.dmp

                Filesize

                24KB

              • memory/4784-68-0x00000000054C0000-0x00000000054FC000-memory.dmp

                Filesize

                240KB

              • memory/4784-63-0x0000000005460000-0x0000000005472000-memory.dmp

                Filesize

                72KB

              • memory/4784-64-0x0000000005450000-0x0000000005460000-memory.dmp

                Filesize

                64KB

              • memory/4784-72-0x0000000005500000-0x000000000554C000-memory.dmp

                Filesize

                304KB

              • memory/4784-62-0x0000000005570000-0x000000000567A000-memory.dmp

                Filesize

                1.0MB

              • memory/4784-61-0x0000000005A80000-0x0000000006098000-memory.dmp

                Filesize

                6.1MB

              • memory/4784-57-0x00000000744E0000-0x0000000074C90000-memory.dmp

                Filesize

                7.7MB

              • memory/4784-77-0x00000000744E0000-0x0000000074C90000-memory.dmp

                Filesize

                7.7MB

              • memory/4784-78-0x0000000005450000-0x0000000005460000-memory.dmp

                Filesize

                64KB

              • memory/4784-55-0x0000000000400000-0x0000000000430000-memory.dmp

                Filesize

                192KB