Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
185s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe
Resource
win10v2004-20230915-en
General
-
Target
cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe
-
Size
1.2MB
-
MD5
be82daf864e184a14fb43525cf7e8053
-
SHA1
744444df20e5c732afa11044f0b7f55136d15294
-
SHA256
cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d
-
SHA512
28ed5630d95abe1b8d828985388934854571eb5ee692f67af82c6ed3559b50728c61d3220c709d578952649714c037e86361d4e008667967f69f41399b8221b4
-
SSDEEP
24576:cZtRSzcCvwDpJZucgChLL9+/5lfdu8Tek8xQctShZ:cZtqKuS3+/5ZTa2ctShZ
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4332-33-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 8 x4031435.exe 2944 x6093243.exe 3868 x1470694.exe 2012 g0066233.exe 4016 h8152203.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4031435.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6093243.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1470694.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4648 set thread context of 1504 4648 cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe 84 PID 2012 set thread context of 4332 2012 g0066233.exe 92 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4332 AppLaunch.exe 4332 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4332 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4648 wrote to memory of 1504 4648 cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe 84 PID 4648 wrote to memory of 1504 4648 cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe 84 PID 4648 wrote to memory of 1504 4648 cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe 84 PID 4648 wrote to memory of 1504 4648 cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe 84 PID 4648 wrote to memory of 1504 4648 cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe 84 PID 4648 wrote to memory of 1504 4648 cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe 84 PID 4648 wrote to memory of 1504 4648 cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe 84 PID 4648 wrote to memory of 1504 4648 cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe 84 PID 4648 wrote to memory of 1504 4648 cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe 84 PID 4648 wrote to memory of 1504 4648 cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe 84 PID 1504 wrote to memory of 8 1504 AppLaunch.exe 85 PID 1504 wrote to memory of 8 1504 AppLaunch.exe 85 PID 1504 wrote to memory of 8 1504 AppLaunch.exe 85 PID 8 wrote to memory of 2944 8 x4031435.exe 86 PID 8 wrote to memory of 2944 8 x4031435.exe 86 PID 8 wrote to memory of 2944 8 x4031435.exe 86 PID 2944 wrote to memory of 3868 2944 x6093243.exe 87 PID 2944 wrote to memory of 3868 2944 x6093243.exe 87 PID 2944 wrote to memory of 3868 2944 x6093243.exe 87 PID 3868 wrote to memory of 2012 3868 x1470694.exe 88 PID 3868 wrote to memory of 2012 3868 x1470694.exe 88 PID 3868 wrote to memory of 2012 3868 x1470694.exe 88 PID 2012 wrote to memory of 2340 2012 g0066233.exe 91 PID 2012 wrote to memory of 2340 2012 g0066233.exe 91 PID 2012 wrote to memory of 2340 2012 g0066233.exe 91 PID 2012 wrote to memory of 4332 2012 g0066233.exe 92 PID 2012 wrote to memory of 4332 2012 g0066233.exe 92 PID 2012 wrote to memory of 4332 2012 g0066233.exe 92 PID 2012 wrote to memory of 4332 2012 g0066233.exe 92 PID 2012 wrote to memory of 4332 2012 g0066233.exe 92 PID 2012 wrote to memory of 4332 2012 g0066233.exe 92 PID 2012 wrote to memory of 4332 2012 g0066233.exe 92 PID 2012 wrote to memory of 4332 2012 g0066233.exe 92 PID 3868 wrote to memory of 4016 3868 x1470694.exe 93 PID 3868 wrote to memory of 4016 3868 x1470694.exe 93 PID 3868 wrote to memory of 4016 3868 x1470694.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe"C:\Users\Admin\AppData\Local\Temp\cd2899e0893d0111481044897c0a48e73b9f32123e329d0b3ed541755d75f29d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4031435.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4031435.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6093243.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6093243.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1470694.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1470694.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0066233.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0066233.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8152203.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8152203.exe6⤵
- Executes dropped EXE
PID:4016
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD58869aae3404cc1047d5002c8a1b94102
SHA16e852ca57952055bdd0e29de792f810ed8b8cbf5
SHA25621204a5ef05e66082a40c77ddc1ebbaf4689c2dba0d8d4ce08f5ff2e2f78f4ef
SHA512f985b7fe94f8f2b00e6dde99bcc737d33cc904b164e52959546e0cd2ecf3b032e7543d9db5a4e820e9ce4f75d532411f967b224dc4162c23a4bf4ee3b7af8b16
-
Filesize
749KB
MD58869aae3404cc1047d5002c8a1b94102
SHA16e852ca57952055bdd0e29de792f810ed8b8cbf5
SHA25621204a5ef05e66082a40c77ddc1ebbaf4689c2dba0d8d4ce08f5ff2e2f78f4ef
SHA512f985b7fe94f8f2b00e6dde99bcc737d33cc904b164e52959546e0cd2ecf3b032e7543d9db5a4e820e9ce4f75d532411f967b224dc4162c23a4bf4ee3b7af8b16
-
Filesize
483KB
MD5ab5ca7778692875a70dae78ec5a522d3
SHA1c3b04a14cf437bebce63751df0d2dfb7fb3ca23e
SHA256550e11cec630e570045e8d1d46842f67ace80793566a40ad82b2bac2b2329169
SHA512d1f538e435cb263359fc2785fabfd52d161b22fa9e16477d9ba99801992afd9dae763bdf442fb531cfa3b4763ec151b773a71d818e8dd9839ac2afebcbfea993
-
Filesize
483KB
MD5ab5ca7778692875a70dae78ec5a522d3
SHA1c3b04a14cf437bebce63751df0d2dfb7fb3ca23e
SHA256550e11cec630e570045e8d1d46842f67ace80793566a40ad82b2bac2b2329169
SHA512d1f538e435cb263359fc2785fabfd52d161b22fa9e16477d9ba99801992afd9dae763bdf442fb531cfa3b4763ec151b773a71d818e8dd9839ac2afebcbfea993
-
Filesize
317KB
MD5b9fe1be778bded6115c2c8e2a4ceb574
SHA1fe4884e2cf177e35b4ffbbf53a214d6bbfacc735
SHA2566fd02e1399b8feb6c0357e4c098ca8c7a12186b0e5cf8f336cbdcaa685a42b9e
SHA512dd510c8c85b61543a1b2a3ae1da66c76f6623e4664b24cb499439fc2ae4a97f745dd8ece875ad4d1f6248747f968d254a9ca323892407a50d4f945af11cb4609
-
Filesize
317KB
MD5b9fe1be778bded6115c2c8e2a4ceb574
SHA1fe4884e2cf177e35b4ffbbf53a214d6bbfacc735
SHA2566fd02e1399b8feb6c0357e4c098ca8c7a12186b0e5cf8f336cbdcaa685a42b9e
SHA512dd510c8c85b61543a1b2a3ae1da66c76f6623e4664b24cb499439fc2ae4a97f745dd8ece875ad4d1f6248747f968d254a9ca323892407a50d4f945af11cb4609
-
Filesize
230KB
MD52ae234182fd12e98caaafbcb331c203f
SHA1e74cf4c4196ceb7c3459a8c7e7ecd7f5645b8ad4
SHA2565adebeaf82a6e1accad8a5f860327d072f279c30132f9cd4849c4effb291b22d
SHA5127b65a05aa4962148b7ef59417f4717bc450c1bcb5458136ba37949bdb5eb4be1b786e1260181417d007e3a8219500845fd4eb743b46fb945c0ae4897898c5e8e
-
Filesize
230KB
MD52ae234182fd12e98caaafbcb331c203f
SHA1e74cf4c4196ceb7c3459a8c7e7ecd7f5645b8ad4
SHA2565adebeaf82a6e1accad8a5f860327d072f279c30132f9cd4849c4effb291b22d
SHA5127b65a05aa4962148b7ef59417f4717bc450c1bcb5458136ba37949bdb5eb4be1b786e1260181417d007e3a8219500845fd4eb743b46fb945c0ae4897898c5e8e
-
Filesize
174KB
MD5a79404a0cb3047b879049cb9322bd1ac
SHA1b02f6043cf86ed883c023f0dbcef126fef8b78f2
SHA2564180117110856432d8e954dfc0f0579e51f0217d2d0a1afab5ceefb2d6395562
SHA512d1d3b6270fb82f10df3d6585a7c66a7d03af47173f9c8e86ebb525082b387b0179bd5616d936e28695c70f64a74627533bd8522c0723cd5006b1cfda18dcef14
-
Filesize
174KB
MD5a79404a0cb3047b879049cb9322bd1ac
SHA1b02f6043cf86ed883c023f0dbcef126fef8b78f2
SHA2564180117110856432d8e954dfc0f0579e51f0217d2d0a1afab5ceefb2d6395562
SHA512d1d3b6270fb82f10df3d6585a7c66a7d03af47173f9c8e86ebb525082b387b0179bd5616d936e28695c70f64a74627533bd8522c0723cd5006b1cfda18dcef14