Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
169s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
a500b971ebacac5bdf1d6a3c11a1a86ad1beb53f5d5c76734f6d02810edac9ac.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a500b971ebacac5bdf1d6a3c11a1a86ad1beb53f5d5c76734f6d02810edac9ac.exe
Resource
win10v2004-20230915-en
General
-
Target
a500b971ebacac5bdf1d6a3c11a1a86ad1beb53f5d5c76734f6d02810edac9ac.exe
-
Size
754KB
-
MD5
828e0ed8997abebc44cdc8f2d330ff1b
-
SHA1
9155992b31a36d926ba400837e380dedb1793746
-
SHA256
a500b971ebacac5bdf1d6a3c11a1a86ad1beb53f5d5c76734f6d02810edac9ac
-
SHA512
5b4d8eff80d2f3ebe545c1470a5932e9094f8e9be0d3a9e553ae00c2c5e1a4a865c5eb11d2387ee14563088ed6aa521e43a7244134723b63e83627cf24250cf2
-
SSDEEP
12288:yMrsy90sbBONZtssZ+qgV/7z1FnasnGXIC4jVUUUlm6Elb6yDX:qytsgsZ+qg/RGGB0lIN6yDX
Malware Config
Extracted
redline
buben
77.91.124.82:19071
-
auth_value
c62fa04aa45f5b78f62d2c21fcbefdec
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2904-21-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1136 x8401701.exe 1608 x0968766.exe 2820 g7801694.exe 3872 h7324244.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8401701.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0968766.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a500b971ebacac5bdf1d6a3c11a1a86ad1beb53f5d5c76734f6d02810edac9ac.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2820 set thread context of 2904 2820 g7801694.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 2000 2820 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2904 AppLaunch.exe 2904 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2904 AppLaunch.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1136 1708 a500b971ebacac5bdf1d6a3c11a1a86ad1beb53f5d5c76734f6d02810edac9ac.exe 82 PID 1708 wrote to memory of 1136 1708 a500b971ebacac5bdf1d6a3c11a1a86ad1beb53f5d5c76734f6d02810edac9ac.exe 82 PID 1708 wrote to memory of 1136 1708 a500b971ebacac5bdf1d6a3c11a1a86ad1beb53f5d5c76734f6d02810edac9ac.exe 82 PID 1136 wrote to memory of 1608 1136 x8401701.exe 83 PID 1136 wrote to memory of 1608 1136 x8401701.exe 83 PID 1136 wrote to memory of 1608 1136 x8401701.exe 83 PID 1608 wrote to memory of 2820 1608 x0968766.exe 84 PID 1608 wrote to memory of 2820 1608 x0968766.exe 84 PID 1608 wrote to memory of 2820 1608 x0968766.exe 84 PID 2820 wrote to memory of 2904 2820 g7801694.exe 86 PID 2820 wrote to memory of 2904 2820 g7801694.exe 86 PID 2820 wrote to memory of 2904 2820 g7801694.exe 86 PID 2820 wrote to memory of 2904 2820 g7801694.exe 86 PID 2820 wrote to memory of 2904 2820 g7801694.exe 86 PID 2820 wrote to memory of 2904 2820 g7801694.exe 86 PID 2820 wrote to memory of 2904 2820 g7801694.exe 86 PID 2820 wrote to memory of 2904 2820 g7801694.exe 86 PID 1608 wrote to memory of 3872 1608 x0968766.exe 91 PID 1608 wrote to memory of 3872 1608 x0968766.exe 91 PID 1608 wrote to memory of 3872 1608 x0968766.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a500b971ebacac5bdf1d6a3c11a1a86ad1beb53f5d5c76734f6d02810edac9ac.exe"C:\Users\Admin\AppData\Local\Temp\a500b971ebacac5bdf1d6a3c11a1a86ad1beb53f5d5c76734f6d02810edac9ac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8401701.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8401701.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0968766.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0968766.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7801694.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7801694.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 1485⤵
- Program crash
PID:2000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h7324244.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h7324244.exe4⤵
- Executes dropped EXE
PID:3872
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2820 -ip 28201⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652KB
MD54bb7ae935460f7c917f658614f4ebe56
SHA17959f2b8e1cc4dd03632b172927201cc5d0541d4
SHA2567274f079b438a4c75db999714e9c9b881da444b35f58260b3ea05dfbb798f92b
SHA51243aacd2e29c218a156ff02405e153872f7d8a04e06a6a808d5b292dfac7908394277fca3e4fc28d802cad192f335cae66cac216d68162b863bb8c71d816618fd
-
Filesize
652KB
MD54bb7ae935460f7c917f658614f4ebe56
SHA17959f2b8e1cc4dd03632b172927201cc5d0541d4
SHA2567274f079b438a4c75db999714e9c9b881da444b35f58260b3ea05dfbb798f92b
SHA51243aacd2e29c218a156ff02405e153872f7d8a04e06a6a808d5b292dfac7908394277fca3e4fc28d802cad192f335cae66cac216d68162b863bb8c71d816618fd
-
Filesize
467KB
MD5a7f4dd799db4bd8719441224a08c18c7
SHA18bb844618ae0145bad547b9e434c1e329857abc0
SHA256934f703374d9513623146da91717a703f20c27a0f80e0da1ca0f8384b090b71b
SHA512f5968a9c9c6eae09a80c577c3a41891d968ccb7348a0ab4bcc4a476c3eaa7f8384cf6892929da8887577bc95b2bc8b6c9191aec9ca5237b996a704cadd51d140
-
Filesize
467KB
MD5a7f4dd799db4bd8719441224a08c18c7
SHA18bb844618ae0145bad547b9e434c1e329857abc0
SHA256934f703374d9513623146da91717a703f20c27a0f80e0da1ca0f8384b090b71b
SHA512f5968a9c9c6eae09a80c577c3a41891d968ccb7348a0ab4bcc4a476c3eaa7f8384cf6892929da8887577bc95b2bc8b6c9191aec9ca5237b996a704cadd51d140
-
Filesize
899KB
MD5a1abdb76b29f5bf7e1a9ecd0030ef1a7
SHA176d389becea05ef859273507951318326e83c6f5
SHA2564ebc70142820830a1898175f1df6cba1df353cd6e176af8b53a7a40040220714
SHA512ff48b8a263659f1ce6461e5558d1e93c8dad68557d9d6963e5779ec0c27b4b89373300ad483445b7d44e44d34440c9c659eec57f039f5b1919d3b5317eee884d
-
Filesize
899KB
MD5a1abdb76b29f5bf7e1a9ecd0030ef1a7
SHA176d389becea05ef859273507951318326e83c6f5
SHA2564ebc70142820830a1898175f1df6cba1df353cd6e176af8b53a7a40040220714
SHA512ff48b8a263659f1ce6461e5558d1e93c8dad68557d9d6963e5779ec0c27b4b89373300ad483445b7d44e44d34440c9c659eec57f039f5b1919d3b5317eee884d
-
Filesize
174KB
MD54d2e38444f677f2e94f1ce9929b8ead3
SHA1542be923940455241c1f8db4c78eea7e2b63d84d
SHA256a77a8d9cdac77ddab660d0a63d6a91152305c8b6ec2bb4bdbc47a25cd851a1ce
SHA512f9f132d1c36c746c9a91185f7ba2839e8c9b4d5d10992ceb65fe294dd66bcd3882b91fcdac7d614a06f5e4ba7535f10a934de0d48b6efa246df4679ba3387854
-
Filesize
174KB
MD54d2e38444f677f2e94f1ce9929b8ead3
SHA1542be923940455241c1f8db4c78eea7e2b63d84d
SHA256a77a8d9cdac77ddab660d0a63d6a91152305c8b6ec2bb4bdbc47a25cd851a1ce
SHA512f9f132d1c36c746c9a91185f7ba2839e8c9b4d5d10992ceb65fe294dd66bcd3882b91fcdac7d614a06f5e4ba7535f10a934de0d48b6efa246df4679ba3387854