Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 14:36

General

  • Target

    e64f15aafb19cc0c568c25aab4ed9e339e9948537882cdf2c6a22c53507fe930.exe

  • Size

    1.3MB

  • MD5

    da1333144d8b061a48cb0401f52f2d3e

  • SHA1

    cedec8d21fdf51a8f95eee01f41fae764f5711f5

  • SHA256

    e64f15aafb19cc0c568c25aab4ed9e339e9948537882cdf2c6a22c53507fe930

  • SHA512

    65d679934febb8fccceedfb5436fa535482f8e1c43adf1b712481deed328a628fac1188ec8ff743996e3e9099f0bde8b7dfa1721e4cdc55b042c6337ed9d07fd

  • SSDEEP

    24576:3Ld650qMgM/k/Q1ZaKjeeNfmdPvnQD9hUUpeN2RK9kvI7AfCSrHqMdxQs:s50q/M/k/oZaKjeeA9vQD7Dq2RJ2AfCY

Malware Config

Extracted

Family

redline

Botnet

vasha

C2

77.91.124.82:19071

Attributes
  • auth_value

    42fc61786274daca54d589b85a2c1954

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e64f15aafb19cc0c568c25aab4ed9e339e9948537882cdf2c6a22c53507fe930.exe
    "C:\Users\Admin\AppData\Local\Temp\e64f15aafb19cc0c568c25aab4ed9e339e9948537882cdf2c6a22c53507fe930.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:3924
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        2⤵
          PID:884
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          2⤵
            PID:1344
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            2⤵
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4436
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3349345.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3349345.exe
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:4760
              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1088888.exe
                C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1088888.exe
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:3852
                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9617804.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9617804.exe
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:4084
                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8180581.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8180581.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of WriteProcessMemory
                    PID:1768
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                      7⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2620
                  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0623228.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0623228.exe
                    6⤵
                    • Executes dropped EXE
                    PID:1068

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3349345.exe

          Filesize

          777KB

          MD5

          01f7bc13f5bf98743a4ac244cfb26624

          SHA1

          71c07cc8abd45a4023caaef4815cafd1fadad48d

          SHA256

          57cc193a0e2c8ba945044078c2d6466ec6b02d699c1a56febc82b434cecbebf9

          SHA512

          01e36caf5781973052968a3af8db846291e584476dd1376b971437c0319e9cfe8ee7e0a5223f1f6082f7040524811b08944ea0bcc0cf3181e126f605a045ea2f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3349345.exe

          Filesize

          777KB

          MD5

          01f7bc13f5bf98743a4ac244cfb26624

          SHA1

          71c07cc8abd45a4023caaef4815cafd1fadad48d

          SHA256

          57cc193a0e2c8ba945044078c2d6466ec6b02d699c1a56febc82b434cecbebf9

          SHA512

          01e36caf5781973052968a3af8db846291e584476dd1376b971437c0319e9cfe8ee7e0a5223f1f6082f7040524811b08944ea0bcc0cf3181e126f605a045ea2f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1088888.exe

          Filesize

          506KB

          MD5

          479a912291b87a4b075447e395e24151

          SHA1

          910bff7b031c30edea77eef3468f8288a1746ca9

          SHA256

          1556232e47857f9971b8232151e21c19f0477c097aa6b4bf4ba72f64e0ffd3e8

          SHA512

          0ddb9ef30ae6831c9783e7ff0e1286c22c4723769836799292f94a76aa813056b8483edc90f07d0cc19a22d7784c56f622fa596d0b35cbc93438e3a372707ca2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1088888.exe

          Filesize

          506KB

          MD5

          479a912291b87a4b075447e395e24151

          SHA1

          910bff7b031c30edea77eef3468f8288a1746ca9

          SHA256

          1556232e47857f9971b8232151e21c19f0477c097aa6b4bf4ba72f64e0ffd3e8

          SHA512

          0ddb9ef30ae6831c9783e7ff0e1286c22c4723769836799292f94a76aa813056b8483edc90f07d0cc19a22d7784c56f622fa596d0b35cbc93438e3a372707ca2

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9617804.exe

          Filesize

          321KB

          MD5

          692987fa95ff799a4b41215ee12c63c0

          SHA1

          7330e53387046362ea8e673a4ff884c26bcb1da4

          SHA256

          5605028707cb5b50d1bad8475a951d75e1860cd696b546479b794d065ff8e742

          SHA512

          a651ab1b1fd5081185c8da4a132663c069077e0127dd68e8db575d09d282e00ea19cd1de98d2ad761c752a4ca37d7c7639744aa626a37be23729e02290e5131b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9617804.exe

          Filesize

          321KB

          MD5

          692987fa95ff799a4b41215ee12c63c0

          SHA1

          7330e53387046362ea8e673a4ff884c26bcb1da4

          SHA256

          5605028707cb5b50d1bad8475a951d75e1860cd696b546479b794d065ff8e742

          SHA512

          a651ab1b1fd5081185c8da4a132663c069077e0127dd68e8db575d09d282e00ea19cd1de98d2ad761c752a4ca37d7c7639744aa626a37be23729e02290e5131b

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8180581.exe

          Filesize

          236KB

          MD5

          08c4b9d37d6e589942205e077b026052

          SHA1

          20f37b62395dbae53c2cccf2b3541e545c52a41f

          SHA256

          3e9cce257ffb96907a3e4bae0659148ceb219ee7722aae4d77b32a1a780b5353

          SHA512

          c5fbd4fc7a1ed9ee3aa280b84f459a2f848af3b706a68730c5e9dc772d974a2410ebdf27b461679e7f1a1e9b783c44369d61917c4be646a0476ee33652523465

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8180581.exe

          Filesize

          236KB

          MD5

          08c4b9d37d6e589942205e077b026052

          SHA1

          20f37b62395dbae53c2cccf2b3541e545c52a41f

          SHA256

          3e9cce257ffb96907a3e4bae0659148ceb219ee7722aae4d77b32a1a780b5353

          SHA512

          c5fbd4fc7a1ed9ee3aa280b84f459a2f848af3b706a68730c5e9dc772d974a2410ebdf27b461679e7f1a1e9b783c44369d61917c4be646a0476ee33652523465

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0623228.exe

          Filesize

          174KB

          MD5

          3553e2fecd9db0114f98bd28aba3644f

          SHA1

          46a98ab55c8c56b85671b7755fbafae1135c2894

          SHA256

          9f7383e9dce1775de7f4797b7be31c33477d4eaf600cf3b5105ec2c5b9947900

          SHA512

          74a37a71521084a3d566cb5b89b45f0c37ae081a3d1e74efc933403d853da723d31e667f300703180c9d2d732aacc4d63ac0be003841854665e91b42f863caef

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0623228.exe

          Filesize

          174KB

          MD5

          3553e2fecd9db0114f98bd28aba3644f

          SHA1

          46a98ab55c8c56b85671b7755fbafae1135c2894

          SHA256

          9f7383e9dce1775de7f4797b7be31c33477d4eaf600cf3b5105ec2c5b9947900

          SHA512

          74a37a71521084a3d566cb5b89b45f0c37ae081a3d1e74efc933403d853da723d31e667f300703180c9d2d732aacc4d63ac0be003841854665e91b42f863caef

        • memory/1068-41-0x0000000004EA0000-0x0000000004FAA000-memory.dmp

          Filesize

          1.0MB

        • memory/1068-44-0x0000000004DF0000-0x0000000004E2C000-memory.dmp

          Filesize

          240KB

        • memory/1068-51-0x0000000004C80000-0x0000000004C90000-memory.dmp

          Filesize

          64KB

        • memory/1068-47-0x0000000074150000-0x0000000074900000-memory.dmp

          Filesize

          7.7MB

        • memory/1068-45-0x0000000004E30000-0x0000000004E7C000-memory.dmp

          Filesize

          304KB

        • memory/1068-36-0x00000000002B0000-0x00000000002E0000-memory.dmp

          Filesize

          192KB

        • memory/1068-37-0x0000000074150000-0x0000000074900000-memory.dmp

          Filesize

          7.7MB

        • memory/1068-38-0x0000000000930000-0x0000000000936000-memory.dmp

          Filesize

          24KB

        • memory/1068-40-0x00000000053B0000-0x00000000059C8000-memory.dmp

          Filesize

          6.1MB

        • memory/1068-43-0x0000000004C80000-0x0000000004C90000-memory.dmp

          Filesize

          64KB

        • memory/1068-42-0x0000000004D90000-0x0000000004DA2000-memory.dmp

          Filesize

          72KB

        • memory/2620-39-0x0000000074150000-0x0000000074900000-memory.dmp

          Filesize

          7.7MB

        • memory/2620-48-0x0000000074150000-0x0000000074900000-memory.dmp

          Filesize

          7.7MB

        • memory/2620-50-0x0000000074150000-0x0000000074900000-memory.dmp

          Filesize

          7.7MB

        • memory/2620-32-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4436-2-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/4436-3-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/4436-0-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/4436-46-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB

        • memory/4436-1-0x0000000000400000-0x0000000000513000-memory.dmp

          Filesize

          1.1MB