Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    178s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 17:33

General

  • Target

    05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe

  • Size

    1.2MB

  • MD5

    1887ee1fe7412938d0b50e5048e66022

  • SHA1

    221ec027a401906ad86063ee058f029298989798

  • SHA256

    05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c

  • SHA512

    b2336235c24fe1d3df8e732bd10520d78043739701a6e40dd5f87ab094b1fd35556f22f1fed9bb6c722829b6395f560a39703229e475598b7f391dc0819fb092

  • SSDEEP

    24576:VYtTYUw0/rq2RKjMWtjW5dXdswgy0nEGfyi0qdmGSygOTMrZV2RZ:VYtTYH0/O2vWNCrDgy0nEXi0bDbIZ

Malware Config

Extracted

Family

redline

Botnet

petin

C2

77.91.124.82:19071

Attributes
  • auth_value

    f6cf7a48c0291d1ef5a3440429827d6d

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe
    "C:\Users\Admin\AppData\Local\Temp\05be32c1ac4d4f8080d6afa867e7a9cbdef17ca4b426a65580ae9b5f99b4741c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1998759.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1998759.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3936
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6720256.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6720256.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2896
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7516645.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7516645.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4648
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6292954.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6292954.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4492
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2772
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9563774.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9563774.exe
              6⤵
              • Executes dropped EXE
              PID:4424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1998759.exe

    Filesize

    748KB

    MD5

    3f642aaa745e38888c7d895e55bee0ce

    SHA1

    9f3e4a1893cd5060e168215f43b369da675360ed

    SHA256

    a57a5dcb47762873ff06ba88acdb14e2ba6f33370a8e489adaabc202339ff2c1

    SHA512

    8bbee6295a16895ec7727c20c29e4962fba1f6be8113730c7b93abf9e0114b3ef141eefc428ab706f20056b2ee6d548973b2d5856eacde0bbdc69d8724f553d1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1998759.exe

    Filesize

    748KB

    MD5

    3f642aaa745e38888c7d895e55bee0ce

    SHA1

    9f3e4a1893cd5060e168215f43b369da675360ed

    SHA256

    a57a5dcb47762873ff06ba88acdb14e2ba6f33370a8e489adaabc202339ff2c1

    SHA512

    8bbee6295a16895ec7727c20c29e4962fba1f6be8113730c7b93abf9e0114b3ef141eefc428ab706f20056b2ee6d548973b2d5856eacde0bbdc69d8724f553d1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6720256.exe

    Filesize

    482KB

    MD5

    df20897691a63416669e93beef8d4a04

    SHA1

    52058b710ac8e982de186ea1e4ff269bf31929d7

    SHA256

    a03aeef9767047e28a0a8a90e332f3984491e0058468d2f404498cc9a1c526e9

    SHA512

    db59829f5fbc551cc23955c98b215e97ada6cd39f60cea0561b59d6650c321d8ce977d32a1b32172b0645016e3f2b028219c838cdc05dcbf77157f2af832724f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6720256.exe

    Filesize

    482KB

    MD5

    df20897691a63416669e93beef8d4a04

    SHA1

    52058b710ac8e982de186ea1e4ff269bf31929d7

    SHA256

    a03aeef9767047e28a0a8a90e332f3984491e0058468d2f404498cc9a1c526e9

    SHA512

    db59829f5fbc551cc23955c98b215e97ada6cd39f60cea0561b59d6650c321d8ce977d32a1b32172b0645016e3f2b028219c838cdc05dcbf77157f2af832724f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7516645.exe

    Filesize

    317KB

    MD5

    3955b8605058d135eba88a6fd222aea9

    SHA1

    55b9042aa6214a6f80a6998598f632d98181e5f3

    SHA256

    3369874d48e071441dd9443bf199e7110968ca6e35af5178a075d220d873d9d4

    SHA512

    a7cb741779039a02a76b95b46e76e88ead23d7d4f0ab056dd539820ec97c7c60e9d95129342084feb285ed691394d49c3559ab681faded80306af183b6873a0b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7516645.exe

    Filesize

    317KB

    MD5

    3955b8605058d135eba88a6fd222aea9

    SHA1

    55b9042aa6214a6f80a6998598f632d98181e5f3

    SHA256

    3369874d48e071441dd9443bf199e7110968ca6e35af5178a075d220d873d9d4

    SHA512

    a7cb741779039a02a76b95b46e76e88ead23d7d4f0ab056dd539820ec97c7c60e9d95129342084feb285ed691394d49c3559ab681faded80306af183b6873a0b

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6292954.exe

    Filesize

    230KB

    MD5

    5ab037c7da61e4e073b98ce5b0989c68

    SHA1

    dde4dc6a2e8faeb6e4df99c65b5f3ef9cc8f1853

    SHA256

    152260d3db6670684ffe6ec08fce7a30f0b66a6d0fcb01e6a92e547b038c84cd

    SHA512

    93d5e97e9b54d431b4d96dfac51e83cd47a78656fd55ce2da385efe8b1b6970b1f9f2b1bed4240765314608cfbd4f4876f5842134e43ae2ea7baf1e4dd0a3d94

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6292954.exe

    Filesize

    230KB

    MD5

    5ab037c7da61e4e073b98ce5b0989c68

    SHA1

    dde4dc6a2e8faeb6e4df99c65b5f3ef9cc8f1853

    SHA256

    152260d3db6670684ffe6ec08fce7a30f0b66a6d0fcb01e6a92e547b038c84cd

    SHA512

    93d5e97e9b54d431b4d96dfac51e83cd47a78656fd55ce2da385efe8b1b6970b1f9f2b1bed4240765314608cfbd4f4876f5842134e43ae2ea7baf1e4dd0a3d94

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9563774.exe

    Filesize

    174KB

    MD5

    246abffada26d9bb6f3444c7e8772d94

    SHA1

    9846e92b329e17fbb3f8c14ecf486c56467373fd

    SHA256

    b9681fd53d44a66034139375a182a7a704b4f31793727a868e7b0328817a2b19

    SHA512

    c0f5a2f7c0aeab9dc6b9324dff53ed8f89a94ef6ab8b6b79ae8fae53f89ea86172984f162a0ac045cbcecce5db1977600789d06cee9b265bfc3992df7191ae46

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9563774.exe

    Filesize

    174KB

    MD5

    246abffada26d9bb6f3444c7e8772d94

    SHA1

    9846e92b329e17fbb3f8c14ecf486c56467373fd

    SHA256

    b9681fd53d44a66034139375a182a7a704b4f31793727a868e7b0328817a2b19

    SHA512

    c0f5a2f7c0aeab9dc6b9324dff53ed8f89a94ef6ab8b6b79ae8fae53f89ea86172984f162a0ac045cbcecce5db1977600789d06cee9b265bfc3992df7191ae46

  • memory/1796-3-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/1796-2-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/1796-1-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/1796-0-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/1796-36-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2772-32-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2772-44-0x00000000741D0000-0x0000000074980000-memory.dmp

    Filesize

    7.7MB

  • memory/2772-38-0x00000000741D0000-0x0000000074980000-memory.dmp

    Filesize

    7.7MB

  • memory/2772-42-0x00000000741D0000-0x0000000074980000-memory.dmp

    Filesize

    7.7MB

  • memory/4424-41-0x00000000741D0000-0x0000000074980000-memory.dmp

    Filesize

    7.7MB

  • memory/4424-40-0x0000000004D80000-0x0000000004D86000-memory.dmp

    Filesize

    24KB

  • memory/4424-39-0x00000000004A0000-0x00000000004D0000-memory.dmp

    Filesize

    192KB

  • memory/4424-37-0x00000000741D0000-0x0000000074980000-memory.dmp

    Filesize

    7.7MB

  • memory/4424-45-0x000000000A8F0000-0x000000000AF08000-memory.dmp

    Filesize

    6.1MB

  • memory/4424-46-0x000000000A450000-0x000000000A55A000-memory.dmp

    Filesize

    1.0MB

  • memory/4424-47-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

    Filesize

    64KB

  • memory/4424-48-0x000000000A390000-0x000000000A3A2000-memory.dmp

    Filesize

    72KB

  • memory/4424-49-0x000000000A3F0000-0x000000000A42C000-memory.dmp

    Filesize

    240KB

  • memory/4424-50-0x000000000A560000-0x000000000A5AC000-memory.dmp

    Filesize

    304KB

  • memory/4424-51-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

    Filesize

    64KB