Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 15:01

General

  • Target

    fa96f32dffc26c286f041c805998e70bb94f3ece02d1e791b5b604880aba297c.exe

  • Size

    1.3MB

  • MD5

    813b11893d5e6eba84f93dfac75647bf

  • SHA1

    00acdd2bcc7f5e9c43e53ac3f98e9679a721a125

  • SHA256

    fa96f32dffc26c286f041c805998e70bb94f3ece02d1e791b5b604880aba297c

  • SHA512

    1f3e18ed8d87245a55836d17e454022133b660eb69c055b2ecc8e72dbcec30efb763f8be02cda56c4fedb735b91192955f0ca2c219dfd5e9faa18ac421b5e1fc

  • SSDEEP

    24576:7ytr9PzrKs/ETwpimtsA6ewpI/n65hnL/xFkcgUQxRhpcIAdvLa4iZzyr2H8Syss:ussiKaeF/S5yUYXi+4iAr2cSys

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa96f32dffc26c286f041c805998e70bb94f3ece02d1e791b5b604880aba297c.exe
    "C:\Users\Admin\AppData\Local\Temp\fa96f32dffc26c286f041c805998e70bb94f3ece02d1e791b5b604880aba297c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3940
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2564
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1680
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2328
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4148
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 552
                  8⤵
                  • Program crash
                  PID:3228
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b4993620.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b4993620.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2992
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:1468
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    8⤵
                      PID:1528
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 540
                        9⤵
                        • Program crash
                        PID:4988
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 572
                      8⤵
                      • Program crash
                      PID:4468
                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8673143.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8673143.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3756
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:4488
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 576
                      7⤵
                      • Program crash
                      PID:2860
                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6207196.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6207196.exe
                  5⤵
                  • Executes dropped EXE
                  PID:4908
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7761357.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7761357.exe
                4⤵
                • Executes dropped EXE
                PID:1084
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2328 -ip 2328
          1⤵
            PID:3572
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2992 -ip 2992
            1⤵
              PID:1172
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1528 -ip 1528
              1⤵
                PID:4772
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3756 -ip 3756
                1⤵
                  PID:4700

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe

                  Filesize

                  1.2MB

                  MD5

                  7737e80b017cd71e83b1b925710e4605

                  SHA1

                  14b816f7fa9e5dce7a4d8175f76d2d435778068d

                  SHA256

                  06c09be6dd27c6b40e7ce307aa2266476b9e2c04989b7f03da24d588cc49d7c4

                  SHA512

                  5a9134f795d741ac43a9d799264101d44e6e7ad4f3b5594f5b2f893463d216000b37697f658340d022b172213541e0f9d020fe98b3ba5a40113dd18440efdc77

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7878794.exe

                  Filesize

                  1.2MB

                  MD5

                  7737e80b017cd71e83b1b925710e4605

                  SHA1

                  14b816f7fa9e5dce7a4d8175f76d2d435778068d

                  SHA256

                  06c09be6dd27c6b40e7ce307aa2266476b9e2c04989b7f03da24d588cc49d7c4

                  SHA512

                  5a9134f795d741ac43a9d799264101d44e6e7ad4f3b5594f5b2f893463d216000b37697f658340d022b172213541e0f9d020fe98b3ba5a40113dd18440efdc77

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe

                  Filesize

                  939KB

                  MD5

                  f124481a40d388571d1da8596e520f1b

                  SHA1

                  7ecbc6c502d2c4074636cd4e15c1df3a28532516

                  SHA256

                  584688f84074c2d0d9398648a91153b79c4a853d3800b8f1dbd48a4fc8d11842

                  SHA512

                  e4d8fd9e4ffbfbf925be569f12443b732d1d2040069c02364ec37bce987720089db8b9c2292ac32f575061fb082556b76a9761f45b5fc82e9f5bdb84496a2bdf

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8880905.exe

                  Filesize

                  939KB

                  MD5

                  f124481a40d388571d1da8596e520f1b

                  SHA1

                  7ecbc6c502d2c4074636cd4e15c1df3a28532516

                  SHA256

                  584688f84074c2d0d9398648a91153b79c4a853d3800b8f1dbd48a4fc8d11842

                  SHA512

                  e4d8fd9e4ffbfbf925be569f12443b732d1d2040069c02364ec37bce987720089db8b9c2292ac32f575061fb082556b76a9761f45b5fc82e9f5bdb84496a2bdf

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7761357.exe

                  Filesize

                  174KB

                  MD5

                  a89450e6dc196591c0f7278a3d563844

                  SHA1

                  59e1a598facc826e4e648fb53bc07c6e0d1ba9ee

                  SHA256

                  1ece47f4b67d2346c1ecd568a8df7818bdd49c372a6507527f5ed8f58101bc7d

                  SHA512

                  420beb44e07d8ab04db439617d79db9557a7025e37dfb151535c12033e351b856bc2469a092aebdd6f1321b0219914c6a3fd7f693e05431e9eba34d2bcf9c858

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7761357.exe

                  Filesize

                  174KB

                  MD5

                  a89450e6dc196591c0f7278a3d563844

                  SHA1

                  59e1a598facc826e4e648fb53bc07c6e0d1ba9ee

                  SHA256

                  1ece47f4b67d2346c1ecd568a8df7818bdd49c372a6507527f5ed8f58101bc7d

                  SHA512

                  420beb44e07d8ab04db439617d79db9557a7025e37dfb151535c12033e351b856bc2469a092aebdd6f1321b0219914c6a3fd7f693e05431e9eba34d2bcf9c858

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe

                  Filesize

                  783KB

                  MD5

                  670fbb95b400bd7c7db58303914c0c26

                  SHA1

                  f327763c8223a1d3e3c899d98c101b317cd64b0c

                  SHA256

                  f885d06dcaa54a34f6413c44332b73351c07cd3a137f09592067921e49a78562

                  SHA512

                  3230c5776e42f56c0977319b29f47c2e5c5e2581e32fff5727349e9b3c1c91c7c27dad98a92daf2de9de1949b10e83c3af79cccc6c4b329c9a296d11e1cec195

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2212635.exe

                  Filesize

                  783KB

                  MD5

                  670fbb95b400bd7c7db58303914c0c26

                  SHA1

                  f327763c8223a1d3e3c899d98c101b317cd64b0c

                  SHA256

                  f885d06dcaa54a34f6413c44332b73351c07cd3a137f09592067921e49a78562

                  SHA512

                  3230c5776e42f56c0977319b29f47c2e5c5e2581e32fff5727349e9b3c1c91c7c27dad98a92daf2de9de1949b10e83c3af79cccc6c4b329c9a296d11e1cec195

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6207196.exe

                  Filesize

                  140KB

                  MD5

                  b200e0b4dfdbe129f6a72ac3e9261a2f

                  SHA1

                  88231355441b4eb173d3084d7904aefba7e7687e

                  SHA256

                  901ec5f7ff085330112810a8a9a235b2e189d4744ffd2da7c6437f15b172ba64

                  SHA512

                  ec6ad900274b5d4ce533ebb7733f94d806d19b1afacda70dac7101cce9650d5780532cb9544b962810b12be788f5a7359d3a8935e750ca44161051be3183891a

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d6207196.exe

                  Filesize

                  140KB

                  MD5

                  b200e0b4dfdbe129f6a72ac3e9261a2f

                  SHA1

                  88231355441b4eb173d3084d7904aefba7e7687e

                  SHA256

                  901ec5f7ff085330112810a8a9a235b2e189d4744ffd2da7c6437f15b172ba64

                  SHA512

                  ec6ad900274b5d4ce533ebb7733f94d806d19b1afacda70dac7101cce9650d5780532cb9544b962810b12be788f5a7359d3a8935e750ca44161051be3183891a

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe

                  Filesize

                  617KB

                  MD5

                  6c0f76b729260b1b679eda22b9ccc6b2

                  SHA1

                  91755ccc984a0cd9fcfcd37e8267f6f09e9c882b

                  SHA256

                  9c33a9f2410742cfd3d4c678ea0f57a29fc6aa324db7f3c2c9285e84f3bee67a

                  SHA512

                  8e4267a94a6a6071c64586e05e1c159c7404b85c8b1d6285e1ff072709ae30c8b98c5479bc567e71c741fcb881ae93bff9c68150c34ee01c6c73d12e8672c4e8

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8976906.exe

                  Filesize

                  617KB

                  MD5

                  6c0f76b729260b1b679eda22b9ccc6b2

                  SHA1

                  91755ccc984a0cd9fcfcd37e8267f6f09e9c882b

                  SHA256

                  9c33a9f2410742cfd3d4c678ea0f57a29fc6aa324db7f3c2c9285e84f3bee67a

                  SHA512

                  8e4267a94a6a6071c64586e05e1c159c7404b85c8b1d6285e1ff072709ae30c8b98c5479bc567e71c741fcb881ae93bff9c68150c34ee01c6c73d12e8672c4e8

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8673143.exe

                  Filesize

                  398KB

                  MD5

                  2685dc4b5b4e62a15314c728faca5870

                  SHA1

                  2073fe029377cc831212597470c09f83708dd6c3

                  SHA256

                  809ff2a82115457978ec891b7e0e7deda088a751c2c5b6d8be893728b37172ca

                  SHA512

                  8e2ce4974b6e718b62498f41dffc6c76199ac8e0762136f6dd01dc964da4c71567119f482eef3ad50a69a28cae7579094b22e579e56a3053aae2f8d0bd658c48

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c8673143.exe

                  Filesize

                  398KB

                  MD5

                  2685dc4b5b4e62a15314c728faca5870

                  SHA1

                  2073fe029377cc831212597470c09f83708dd6c3

                  SHA256

                  809ff2a82115457978ec891b7e0e7deda088a751c2c5b6d8be893728b37172ca

                  SHA512

                  8e2ce4974b6e718b62498f41dffc6c76199ac8e0762136f6dd01dc964da4c71567119f482eef3ad50a69a28cae7579094b22e579e56a3053aae2f8d0bd658c48

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe

                  Filesize

                  346KB

                  MD5

                  56b6f992cec1c8126e84cd956393b7d1

                  SHA1

                  930def526998a662268dc726d73462ce2f5ec285

                  SHA256

                  ea4495fbb1ce8bbd4a5666d28153701708e57b276befb3425d6b845400e7809c

                  SHA512

                  6c5ebeb7cfd1e3f13640385955f411521bc7ae4fac94eeb185f3a705d9a141f353dbba4a36e6e3c69095c32527a5dc5666f163daa35471f00b7af97203f51367

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v3563900.exe

                  Filesize

                  346KB

                  MD5

                  56b6f992cec1c8126e84cd956393b7d1

                  SHA1

                  930def526998a662268dc726d73462ce2f5ec285

                  SHA256

                  ea4495fbb1ce8bbd4a5666d28153701708e57b276befb3425d6b845400e7809c

                  SHA512

                  6c5ebeb7cfd1e3f13640385955f411521bc7ae4fac94eeb185f3a705d9a141f353dbba4a36e6e3c69095c32527a5dc5666f163daa35471f00b7af97203f51367

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

                  Filesize

                  235KB

                  MD5

                  fba4fb38f3cbf2260b62a4e604f66082

                  SHA1

                  b2de378967c375b186cafa796f371241a47c5936

                  SHA256

                  99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

                  SHA512

                  40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a6004896.exe

                  Filesize

                  235KB

                  MD5

                  fba4fb38f3cbf2260b62a4e604f66082

                  SHA1

                  b2de378967c375b186cafa796f371241a47c5936

                  SHA256

                  99cfe20d3200f5320594905448b676d3a51f915685942f7c543ffe5c16529185

                  SHA512

                  40937876ab46a943a49520e7da86dc2e59cafd3ff1d9baba7bae63d31c5a63cfa4e80624d7b5816f647e5b4ba47796f2537e7b5e9a71f57395b7c81c7023de5e

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b4993620.exe

                  Filesize

                  364KB

                  MD5

                  4733def067883715f7c8b4c998c05353

                  SHA1

                  b6f7d9153b78fc2c083556398c941999301624e8

                  SHA256

                  b19d73011a0f5f2b8d36ca63ea05027851a83c6885dedcb50569267a66ac08e2

                  SHA512

                  e6ea1fda17b78d99c3bc1d109abf8cdb0bc047ea08e6cb7b7fc820efe019e0ef020df9253f1974b20c5b48614337b434b52a6449ecb3b886e6ea831e54a3b86b

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b4993620.exe

                  Filesize

                  364KB

                  MD5

                  4733def067883715f7c8b4c998c05353

                  SHA1

                  b6f7d9153b78fc2c083556398c941999301624e8

                  SHA256

                  b19d73011a0f5f2b8d36ca63ea05027851a83c6885dedcb50569267a66ac08e2

                  SHA512

                  e6ea1fda17b78d99c3bc1d109abf8cdb0bc047ea08e6cb7b7fc820efe019e0ef020df9253f1974b20c5b48614337b434b52a6449ecb3b886e6ea831e54a3b86b

                • memory/1084-74-0x00000000051E0000-0x00000000051F0000-memory.dmp

                  Filesize

                  64KB

                • memory/1084-65-0x0000000000810000-0x0000000000840000-memory.dmp

                  Filesize

                  192KB

                • memory/1084-75-0x0000000073BC0000-0x0000000074370000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1084-80-0x00000000051E0000-0x00000000051F0000-memory.dmp

                  Filesize

                  64KB

                • memory/1084-78-0x0000000005390000-0x00000000053DC000-memory.dmp

                  Filesize

                  304KB

                • memory/1084-76-0x00000000052F0000-0x0000000005302000-memory.dmp

                  Filesize

                  72KB

                • memory/1084-67-0x0000000005130000-0x0000000005136000-memory.dmp

                  Filesize

                  24KB

                • memory/1084-66-0x0000000073BC0000-0x0000000074370000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1528-52-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/1528-48-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/1528-49-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/1528-50-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/4148-42-0x0000000000400000-0x000000000040A000-memory.dmp

                  Filesize

                  40KB

                • memory/4148-43-0x0000000073BC0000-0x0000000074370000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4148-44-0x0000000073BC0000-0x0000000074370000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4148-70-0x0000000073BC0000-0x0000000074370000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4488-61-0x00000000051D0000-0x00000000051D6000-memory.dmp

                  Filesize

                  24KB

                • memory/4488-73-0x00000000052A0000-0x00000000052B0000-memory.dmp

                  Filesize

                  64KB

                • memory/4488-72-0x000000000A960000-0x000000000AA6A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/4488-71-0x000000000AE50000-0x000000000B468000-memory.dmp

                  Filesize

                  6.1MB

                • memory/4488-68-0x0000000073BC0000-0x0000000074370000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4488-77-0x000000000A900000-0x000000000A93C000-memory.dmp

                  Filesize

                  240KB

                • memory/4488-57-0x0000000073BC0000-0x0000000074370000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4488-79-0x00000000052A0000-0x00000000052B0000-memory.dmp

                  Filesize

                  64KB

                • memory/4488-56-0x0000000000400000-0x0000000000430000-memory.dmp

                  Filesize

                  192KB