Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
2bee83bd8b98126276cc698b79e3e877fb379c0f6565b7cf2bafbd6a3b621b83.exe
Resource
win7-20230831-en
General
-
Target
2bee83bd8b98126276cc698b79e3e877fb379c0f6565b7cf2bafbd6a3b621b83.exe
-
Size
1001KB
-
MD5
884a5abdc43c6a038209439e9d614dfd
-
SHA1
b249e10460da3bcf796a51bfc57aec09dc9f741d
-
SHA256
2bee83bd8b98126276cc698b79e3e877fb379c0f6565b7cf2bafbd6a3b621b83
-
SHA512
e3c09b7fc558dc901370e4cbe0e82da0f85a5a9105c083e6a37ac386a9db017bbac0aed009661f8469563caf4b51a05fb434fab5a552d6e4b90a8084db610edc
-
SSDEEP
24576:NyQciuQ8Gq/8aeLKSuCpIcPr7s/5g2QPuD0EjbNiXRSoEOBhsZ:oQci2Gq/veluCpxirYPEFF4Y
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
redline
kendo
77.91.124.82:19071
-
auth_value
5a22a881561d49941415902859b51f14
Extracted
mystic
http://5.42.92.211/loghub/master
Signatures
-
Detect Mystic stealer payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023229-48.dat family_mystic behavioral2/files/0x0007000000023229-49.dat family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/1404-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 1332 v7926481.exe 2952 v9689946.exe 4556 v5772103.exe 4484 v8785677.exe 828 a8909220.exe 2208 c9598481.exe 3668 d2062165.exe 1952 e5940336.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9689946.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5772103.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v8785677.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2bee83bd8b98126276cc698b79e3e877fb379c0f6565b7cf2bafbd6a3b621b83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7926481.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 828 set thread context of 1404 828 a8909220.exe 92 PID 2208 set thread context of 3480 2208 c9598481.exe 101 -
Program crash 2 IoCs
pid pid_target Process procid_target 1340 828 WerFault.exe 91 544 2208 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1404 AppLaunch.exe 1404 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1404 AppLaunch.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1332 5072 2bee83bd8b98126276cc698b79e3e877fb379c0f6565b7cf2bafbd6a3b621b83.exe 87 PID 5072 wrote to memory of 1332 5072 2bee83bd8b98126276cc698b79e3e877fb379c0f6565b7cf2bafbd6a3b621b83.exe 87 PID 5072 wrote to memory of 1332 5072 2bee83bd8b98126276cc698b79e3e877fb379c0f6565b7cf2bafbd6a3b621b83.exe 87 PID 1332 wrote to memory of 2952 1332 v7926481.exe 88 PID 1332 wrote to memory of 2952 1332 v7926481.exe 88 PID 1332 wrote to memory of 2952 1332 v7926481.exe 88 PID 2952 wrote to memory of 4556 2952 v9689946.exe 89 PID 2952 wrote to memory of 4556 2952 v9689946.exe 89 PID 2952 wrote to memory of 4556 2952 v9689946.exe 89 PID 4556 wrote to memory of 4484 4556 v5772103.exe 90 PID 4556 wrote to memory of 4484 4556 v5772103.exe 90 PID 4556 wrote to memory of 4484 4556 v5772103.exe 90 PID 4484 wrote to memory of 828 4484 v8785677.exe 91 PID 4484 wrote to memory of 828 4484 v8785677.exe 91 PID 4484 wrote to memory of 828 4484 v8785677.exe 91 PID 828 wrote to memory of 1404 828 a8909220.exe 92 PID 828 wrote to memory of 1404 828 a8909220.exe 92 PID 828 wrote to memory of 1404 828 a8909220.exe 92 PID 828 wrote to memory of 1404 828 a8909220.exe 92 PID 828 wrote to memory of 1404 828 a8909220.exe 92 PID 828 wrote to memory of 1404 828 a8909220.exe 92 PID 828 wrote to memory of 1404 828 a8909220.exe 92 PID 828 wrote to memory of 1404 828 a8909220.exe 92 PID 4484 wrote to memory of 2208 4484 v8785677.exe 98 PID 4484 wrote to memory of 2208 4484 v8785677.exe 98 PID 4484 wrote to memory of 2208 4484 v8785677.exe 98 PID 2208 wrote to memory of 3392 2208 c9598481.exe 100 PID 2208 wrote to memory of 3392 2208 c9598481.exe 100 PID 2208 wrote to memory of 3392 2208 c9598481.exe 100 PID 2208 wrote to memory of 3480 2208 c9598481.exe 101 PID 2208 wrote to memory of 3480 2208 c9598481.exe 101 PID 2208 wrote to memory of 3480 2208 c9598481.exe 101 PID 2208 wrote to memory of 3480 2208 c9598481.exe 101 PID 2208 wrote to memory of 3480 2208 c9598481.exe 101 PID 2208 wrote to memory of 3480 2208 c9598481.exe 101 PID 2208 wrote to memory of 3480 2208 c9598481.exe 101 PID 2208 wrote to memory of 3480 2208 c9598481.exe 101 PID 4556 wrote to memory of 3668 4556 v5772103.exe 104 PID 4556 wrote to memory of 3668 4556 v5772103.exe 104 PID 4556 wrote to memory of 3668 4556 v5772103.exe 104 PID 2952 wrote to memory of 1952 2952 v9689946.exe 107 PID 2952 wrote to memory of 1952 2952 v9689946.exe 107 PID 2952 wrote to memory of 1952 2952 v9689946.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bee83bd8b98126276cc698b79e3e877fb379c0f6565b7cf2bafbd6a3b621b83.exe"C:\Users\Admin\AppData\Local\Temp\2bee83bd8b98126276cc698b79e3e877fb379c0f6565b7cf2bafbd6a3b621b83.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7926481.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7926481.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9689946.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9689946.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5772103.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5772103.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8785677.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8785677.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8909220.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8909220.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 5527⤵
- Program crash
PID:1340
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c9598481.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c9598481.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3392
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 5727⤵
- Program crash
PID:544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d2062165.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d2062165.exe5⤵
- Executes dropped EXE
PID:3668
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e5940336.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e5940336.exe4⤵
- Executes dropped EXE
PID:1952
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 828 -ip 8281⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2208 -ip 22081⤵PID:2168
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD51bcd45d681c1624c410b46ed0067319a
SHA13eb679311e1baeb821b8c495446d81226c75c394
SHA256d720f3f1d4e44951f27554c99df03cea37005640c514e9c80aa743ae4d7ec352
SHA51250382e1d6e64f5b88935ec8c330a83fdaa1d5b4a588dc90303c8970c04b1453246b8b77e04a158a50e1ea14f080c307cde97990ea8e2e6cd181c52374a5dd83d
-
Filesize
900KB
MD51bcd45d681c1624c410b46ed0067319a
SHA13eb679311e1baeb821b8c495446d81226c75c394
SHA256d720f3f1d4e44951f27554c99df03cea37005640c514e9c80aa743ae4d7ec352
SHA51250382e1d6e64f5b88935ec8c330a83fdaa1d5b4a588dc90303c8970c04b1453246b8b77e04a158a50e1ea14f080c307cde97990ea8e2e6cd181c52374a5dd83d
-
Filesize
659KB
MD5daccc182422d9b4bf65cfdd548c5b5f8
SHA19805e6f30a250b248b3f8791cf0907aae923aa70
SHA256cec98a5456d0203861573ac053a2632f324c44ebe661799fa980d97482f38de0
SHA512a2afee01efdc10230bc3f038d181de95c5d6a428e5d2f9aa573e095567cec040f10dd76abbae5a77e189e0e54c282b020a4f670c485f6b817878fb4105155f29
-
Filesize
659KB
MD5daccc182422d9b4bf65cfdd548c5b5f8
SHA19805e6f30a250b248b3f8791cf0907aae923aa70
SHA256cec98a5456d0203861573ac053a2632f324c44ebe661799fa980d97482f38de0
SHA512a2afee01efdc10230bc3f038d181de95c5d6a428e5d2f9aa573e095567cec040f10dd76abbae5a77e189e0e54c282b020a4f670c485f6b817878fb4105155f29
-
Filesize
173KB
MD537782c216c6c3bf4596df770861071b7
SHA1f5fb5d62eede9bd5ecc0b27262decf6621dee939
SHA25644e27dd72ab58bc3bb9d562fc85dce5bc30fc30425b74c6c5600483d950fc1c2
SHA512d0c9c8ffc782896c833407eb3d63e0bf137f99983f134c7f75a890b5db22634313904f1e3207ef7c6e2d7e89d8da3037e4f0a77c30b50265d1d84d394516bd16
-
Filesize
173KB
MD537782c216c6c3bf4596df770861071b7
SHA1f5fb5d62eede9bd5ecc0b27262decf6621dee939
SHA25644e27dd72ab58bc3bb9d562fc85dce5bc30fc30425b74c6c5600483d950fc1c2
SHA512d0c9c8ffc782896c833407eb3d63e0bf137f99983f134c7f75a890b5db22634313904f1e3207ef7c6e2d7e89d8da3037e4f0a77c30b50265d1d84d394516bd16
-
Filesize
503KB
MD59b3856f024726dd70838fb7073815e83
SHA18f09d8d6fa5c5c07feab9c5f519397c419e9b177
SHA256ab4cdf6477c5c22a9a8fcb7d8b28e67fff6923eddde0e30b7cbb0f57647dec50
SHA51288b352ccf3d99c62945bbe59819cc273a39b6d652af2fd56c440fda05b6d35ada43119c17c0f53eb527b0be6d48034775b95f40b37d4b5cbacd98d3207fc9c97
-
Filesize
503KB
MD59b3856f024726dd70838fb7073815e83
SHA18f09d8d6fa5c5c07feab9c5f519397c419e9b177
SHA256ab4cdf6477c5c22a9a8fcb7d8b28e67fff6923eddde0e30b7cbb0f57647dec50
SHA51288b352ccf3d99c62945bbe59819cc273a39b6d652af2fd56c440fda05b6d35ada43119c17c0f53eb527b0be6d48034775b95f40b37d4b5cbacd98d3207fc9c97
-
Filesize
140KB
MD5a46f5056ee765ce4baf4b5c20d5ec7f1
SHA1fb225f2abc806c6c30f9069ce3a94b9d510b626d
SHA2567c59151fbfe08d8576cc10ea0d3025d80a22627620243424f6a4031cc7cd6407
SHA5124e8ea4f5d11ab760515dd6a969d5ada8587b88926fd01062d8425bb08a85e08973163d704685fcbd2f627f0f2b32036c57bdc5c7a49072198a6e48944555ed12
-
Filesize
140KB
MD5a46f5056ee765ce4baf4b5c20d5ec7f1
SHA1fb225f2abc806c6c30f9069ce3a94b9d510b626d
SHA2567c59151fbfe08d8576cc10ea0d3025d80a22627620243424f6a4031cc7cd6407
SHA5124e8ea4f5d11ab760515dd6a969d5ada8587b88926fd01062d8425bb08a85e08973163d704685fcbd2f627f0f2b32036c57bdc5c7a49072198a6e48944555ed12
-
Filesize
338KB
MD516e1211766fedb71511c9463f9f19b34
SHA1dfafb64d563fca3d0f3da7cd503fc4f6e3336bbd
SHA25619d4a1d4276cfa0abf24aa653c6ea9c99b98f5276df8140613b3362d46ba9ba3
SHA51291604e6fcd0ca91f2424b1cab6f122684c43ca3402f2ecbd32caa377b90050755de3bbf3bf1824e437ff89093f6c6bafa1c7dd825a4be39681886cc912d48b40
-
Filesize
338KB
MD516e1211766fedb71511c9463f9f19b34
SHA1dfafb64d563fca3d0f3da7cd503fc4f6e3336bbd
SHA25619d4a1d4276cfa0abf24aa653c6ea9c99b98f5276df8140613b3362d46ba9ba3
SHA51291604e6fcd0ca91f2424b1cab6f122684c43ca3402f2ecbd32caa377b90050755de3bbf3bf1824e437ff89093f6c6bafa1c7dd825a4be39681886cc912d48b40
-
Filesize
251KB
MD5c18ace5b73fed238792c109d72d6428f
SHA108e73b21ccb83b9bc4e9bfef59958aababe4e813
SHA256244d6a337b8a2cdac6e3e6487c1912d4f4acb65ae29607a8ae56bf53f301cd8b
SHA512a95967d38e66ffaa41dbf88e91544531ed6dcbf3504f40fdf25a6ca78bc084fb835fc0d9680245cb31ccaf28d3ad9d875d84092f9f07c0de6eb62cfcc74fcf54
-
Filesize
251KB
MD5c18ace5b73fed238792c109d72d6428f
SHA108e73b21ccb83b9bc4e9bfef59958aababe4e813
SHA256244d6a337b8a2cdac6e3e6487c1912d4f4acb65ae29607a8ae56bf53f301cd8b
SHA512a95967d38e66ffaa41dbf88e91544531ed6dcbf3504f40fdf25a6ca78bc084fb835fc0d9680245cb31ccaf28d3ad9d875d84092f9f07c0de6eb62cfcc74fcf54
-
Filesize
414KB
MD5750dcb4fc36ec1900af37ce658ee4e30
SHA19a57f21ff725dee3971ad62504f31e15aa8c975e
SHA256b94e23e2e927359253ea6fff2cc9097d218af336dd2b04704ca4324c0d1fc518
SHA5125f36b499798aa8ade3dca5ea0ac77a2a1150c960e981e67d19a545e0d7e0df9277ecf8201efdc46d63f2b92af4ccb3a0ab605fd3c9e3dbe440c263ef2b0af02d
-
Filesize
414KB
MD5750dcb4fc36ec1900af37ce658ee4e30
SHA19a57f21ff725dee3971ad62504f31e15aa8c975e
SHA256b94e23e2e927359253ea6fff2cc9097d218af336dd2b04704ca4324c0d1fc518
SHA5125f36b499798aa8ade3dca5ea0ac77a2a1150c960e981e67d19a545e0d7e0df9277ecf8201efdc46d63f2b92af4ccb3a0ab605fd3c9e3dbe440c263ef2b0af02d