Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
178s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe
Resource
win10v2004-20230915-en
General
-
Target
05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe
-
Size
1.2MB
-
MD5
1887ee1fe7412938d0b50e5048e66022
-
SHA1
221ec027a401906ad86063ee058f029298989798
-
SHA256
05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c
-
SHA512
b2336235c24fe1d3df8e732bd10520d78043739701a6e40dd5f87ab094b1fd35556f22f1fed9bb6c722829b6395f560a39703229e475598b7f391dc0819fb092
-
SSDEEP
24576:VYtTYUw0/rq2RKjMWtjW5dXdswgy0nEGfyi0qdmGSygOTMrZV2RZ:VYtTYH0/O2vWNCrDgy0nEXi0bDbIZ
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2772-32-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 3936 x1998759.exe 2896 x6720256.exe 4648 x7516645.exe 4492 g6292954.exe 4424 h9563774.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1998759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6720256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7516645.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2320 set thread context of 1796 2320 05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe 93 PID 4492 set thread context of 2772 4492 g6292954.exe 99 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2772 AppLaunch.exe 2772 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2772 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1796 2320 05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe 93 PID 2320 wrote to memory of 1796 2320 05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe 93 PID 2320 wrote to memory of 1796 2320 05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe 93 PID 2320 wrote to memory of 1796 2320 05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe 93 PID 2320 wrote to memory of 1796 2320 05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe 93 PID 2320 wrote to memory of 1796 2320 05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe 93 PID 2320 wrote to memory of 1796 2320 05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe 93 PID 2320 wrote to memory of 1796 2320 05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe 93 PID 2320 wrote to memory of 1796 2320 05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe 93 PID 2320 wrote to memory of 1796 2320 05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe 93 PID 1796 wrote to memory of 3936 1796 AppLaunch.exe 94 PID 1796 wrote to memory of 3936 1796 AppLaunch.exe 94 PID 1796 wrote to memory of 3936 1796 AppLaunch.exe 94 PID 3936 wrote to memory of 2896 3936 x1998759.exe 95 PID 3936 wrote to memory of 2896 3936 x1998759.exe 95 PID 3936 wrote to memory of 2896 3936 x1998759.exe 95 PID 2896 wrote to memory of 4648 2896 x6720256.exe 96 PID 2896 wrote to memory of 4648 2896 x6720256.exe 96 PID 2896 wrote to memory of 4648 2896 x6720256.exe 96 PID 4648 wrote to memory of 4492 4648 x7516645.exe 97 PID 4648 wrote to memory of 4492 4648 x7516645.exe 97 PID 4648 wrote to memory of 4492 4648 x7516645.exe 97 PID 4492 wrote to memory of 2772 4492 g6292954.exe 99 PID 4492 wrote to memory of 2772 4492 g6292954.exe 99 PID 4492 wrote to memory of 2772 4492 g6292954.exe 99 PID 4492 wrote to memory of 2772 4492 g6292954.exe 99 PID 4492 wrote to memory of 2772 4492 g6292954.exe 99 PID 4492 wrote to memory of 2772 4492 g6292954.exe 99 PID 4492 wrote to memory of 2772 4492 g6292954.exe 99 PID 4492 wrote to memory of 2772 4492 g6292954.exe 99 PID 4648 wrote to memory of 4424 4648 x7516645.exe 100 PID 4648 wrote to memory of 4424 4648 x7516645.exe 100 PID 4648 wrote to memory of 4424 4648 x7516645.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe"C:\Users\Admin\AppData\Local\Temp\05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1998759.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1998759.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6720256.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6720256.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7516645.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7516645.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6292954.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6292954.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9563774.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9563774.exe6⤵
- Executes dropped EXE
PID:4424
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
748KB
MD53f642aaa745e38888c7d895e55bee0ce
SHA19f3e4a1893cd5060e168215f43b369da675360ed
SHA256a57a5dcb47762873ff06ba88acdb14e2ba6f33370a8e489adaabc202339ff2c1
SHA5128bbee6295a16895ec7727c20c29e4962fba1f6be8113730c7b93abf9e0114b3ef141eefc428ab706f20056b2ee6d548973b2d5856eacde0bbdc69d8724f553d1
-
Filesize
748KB
MD53f642aaa745e38888c7d895e55bee0ce
SHA19f3e4a1893cd5060e168215f43b369da675360ed
SHA256a57a5dcb47762873ff06ba88acdb14e2ba6f33370a8e489adaabc202339ff2c1
SHA5128bbee6295a16895ec7727c20c29e4962fba1f6be8113730c7b93abf9e0114b3ef141eefc428ab706f20056b2ee6d548973b2d5856eacde0bbdc69d8724f553d1
-
Filesize
482KB
MD5df20897691a63416669e93beef8d4a04
SHA152058b710ac8e982de186ea1e4ff269bf31929d7
SHA256a03aeef9767047e28a0a8a90e332f3984491e0058468d2f404498cc9a1c526e9
SHA512db59829f5fbc551cc23955c98b215e97ada6cd39f60cea0561b59d6650c321d8ce977d32a1b32172b0645016e3f2b028219c838cdc05dcbf77157f2af832724f
-
Filesize
482KB
MD5df20897691a63416669e93beef8d4a04
SHA152058b710ac8e982de186ea1e4ff269bf31929d7
SHA256a03aeef9767047e28a0a8a90e332f3984491e0058468d2f404498cc9a1c526e9
SHA512db59829f5fbc551cc23955c98b215e97ada6cd39f60cea0561b59d6650c321d8ce977d32a1b32172b0645016e3f2b028219c838cdc05dcbf77157f2af832724f
-
Filesize
317KB
MD53955b8605058d135eba88a6fd222aea9
SHA155b9042aa6214a6f80a6998598f632d98181e5f3
SHA2563369874d48e071441dd9443bf199e7110968ca6e35af5178a075d220d873d9d4
SHA512a7cb741779039a02a76b95b46e76e88ead23d7d4f0ab056dd539820ec97c7c60e9d95129342084feb285ed691394d49c3559ab681faded80306af183b6873a0b
-
Filesize
317KB
MD53955b8605058d135eba88a6fd222aea9
SHA155b9042aa6214a6f80a6998598f632d98181e5f3
SHA2563369874d48e071441dd9443bf199e7110968ca6e35af5178a075d220d873d9d4
SHA512a7cb741779039a02a76b95b46e76e88ead23d7d4f0ab056dd539820ec97c7c60e9d95129342084feb285ed691394d49c3559ab681faded80306af183b6873a0b
-
Filesize
230KB
MD55ab037c7da61e4e073b98ce5b0989c68
SHA1dde4dc6a2e8faeb6e4df99c65b5f3ef9cc8f1853
SHA256152260d3db6670684ffe6ec08fce7a30f0b66a6d0fcb01e6a92e547b038c84cd
SHA51293d5e97e9b54d431b4d96dfac51e83cd47a78656fd55ce2da385efe8b1b6970b1f9f2b1bed4240765314608cfbd4f4876f5842134e43ae2ea7baf1e4dd0a3d94
-
Filesize
230KB
MD55ab037c7da61e4e073b98ce5b0989c68
SHA1dde4dc6a2e8faeb6e4df99c65b5f3ef9cc8f1853
SHA256152260d3db6670684ffe6ec08fce7a30f0b66a6d0fcb01e6a92e547b038c84cd
SHA51293d5e97e9b54d431b4d96dfac51e83cd47a78656fd55ce2da385efe8b1b6970b1f9f2b1bed4240765314608cfbd4f4876f5842134e43ae2ea7baf1e4dd0a3d94
-
Filesize
174KB
MD5246abffada26d9bb6f3444c7e8772d94
SHA19846e92b329e17fbb3f8c14ecf486c56467373fd
SHA256b9681fd53d44a66034139375a182a7a704b4f31793727a868e7b0328817a2b19
SHA512c0f5a2f7c0aeab9dc6b9324dff53ed8f89a94ef6ab8b6b79ae8fae53f89ea86172984f162a0ac045cbcecce5db1977600789d06cee9b265bfc3992df7191ae46
-
Filesize
174KB
MD5246abffada26d9bb6f3444c7e8772d94
SHA19846e92b329e17fbb3f8c14ecf486c56467373fd
SHA256b9681fd53d44a66034139375a182a7a704b4f31793727a868e7b0328817a2b19
SHA512c0f5a2f7c0aeab9dc6b9324dff53ed8f89a94ef6ab8b6b79ae8fae53f89ea86172984f162a0ac045cbcecce5db1977600789d06cee9b265bfc3992df7191ae46