Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
x3809978.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x3809978.exe
Resource
win10v2004-20230915-en
General
-
Target
x3809978.exe
-
Size
472KB
-
MD5
0a74a2da8c9ff123830eaacb6fd6fb70
-
SHA1
d0961f548c731fb67474bda1f5a3a9abb1ff656a
-
SHA256
6bb2de9283392086d93b17c34546bc4cb1e12392e697fec56a187202da275a84
-
SHA512
1037c8c1e80e49a4218438b80cf582d8f820c457d28764ade2907fc0deee00a3719fea067f4a20e3c85a63a7903e5d454f1f7c441ad6a4dbc2448f83f2298a8a
-
SSDEEP
6144:Kdy+bnr+Pp0yN90QE1SqA9wSFAGaA7fyYiVaXMx0R02wjlGyQ/Q6KsyTNQ1+tufv:7Mrfy90Sb97FPjRiVuM60p8fKlntu2y
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4572-14-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1932 x4764518.exe 4740 g7306605.exe 3744 i6207862.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x3809978.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4764518.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4740 set thread context of 4572 4740 g7306605.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4572 AppLaunch.exe 4572 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4572 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3820 wrote to memory of 1932 3820 x3809978.exe 86 PID 3820 wrote to memory of 1932 3820 x3809978.exe 86 PID 3820 wrote to memory of 1932 3820 x3809978.exe 86 PID 1932 wrote to memory of 4740 1932 x4764518.exe 87 PID 1932 wrote to memory of 4740 1932 x4764518.exe 87 PID 1932 wrote to memory of 4740 1932 x4764518.exe 87 PID 4740 wrote to memory of 4572 4740 g7306605.exe 89 PID 4740 wrote to memory of 4572 4740 g7306605.exe 89 PID 4740 wrote to memory of 4572 4740 g7306605.exe 89 PID 4740 wrote to memory of 4572 4740 g7306605.exe 89 PID 4740 wrote to memory of 4572 4740 g7306605.exe 89 PID 4740 wrote to memory of 4572 4740 g7306605.exe 89 PID 4740 wrote to memory of 4572 4740 g7306605.exe 89 PID 4740 wrote to memory of 4572 4740 g7306605.exe 89 PID 1932 wrote to memory of 3744 1932 x4764518.exe 90 PID 1932 wrote to memory of 3744 1932 x4764518.exe 90 PID 1932 wrote to memory of 3744 1932 x4764518.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\x3809978.exe"C:\Users\Admin\AppData\Local\Temp\x3809978.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4764518.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4764518.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7306605.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7306605.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i6207862.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i6207862.exe3⤵
- Executes dropped EXE
PID:3744
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306KB
MD53f3cc50c21794ba104585c5d4f1d4627
SHA165de12fba1a5337ad14f7b2ae256d84a6272ce8f
SHA256a1e18b3b829427c81e8a2743828396522e6d955db27fc522990eda7775998f70
SHA5124c5b7475b9ff8f4b2263081c0ce0b3092a12515953bc7c5541533951d1f287d7a24f319e13a2e9cef03514493257a9d11050e56c18700782e04d14ed158df055
-
Filesize
306KB
MD53f3cc50c21794ba104585c5d4f1d4627
SHA165de12fba1a5337ad14f7b2ae256d84a6272ce8f
SHA256a1e18b3b829427c81e8a2743828396522e6d955db27fc522990eda7775998f70
SHA5124c5b7475b9ff8f4b2263081c0ce0b3092a12515953bc7c5541533951d1f287d7a24f319e13a2e9cef03514493257a9d11050e56c18700782e04d14ed158df055
-
Filesize
213KB
MD5ba2e40d2cf49ce7901cc39e793ed4109
SHA10e1814555f7b66886d9bce7a2497c65395e3663c
SHA2569d47a47a910ce3505288372749c21ba14978721946403aba4df7cff52aceb9c4
SHA5123f863210fba8af719c52cc69460feb652be6c0abf9ea727e940e637a61cf458b532e5c630ea6d8027984dd7f31875b59ebf1375727e27efc28b837a9ba98bf63
-
Filesize
213KB
MD5ba2e40d2cf49ce7901cc39e793ed4109
SHA10e1814555f7b66886d9bce7a2497c65395e3663c
SHA2569d47a47a910ce3505288372749c21ba14978721946403aba4df7cff52aceb9c4
SHA5123f863210fba8af719c52cc69460feb652be6c0abf9ea727e940e637a61cf458b532e5c630ea6d8027984dd7f31875b59ebf1375727e27efc28b837a9ba98bf63
-
Filesize
174KB
MD5fe8cbe8eab55d1cac15887969ea08baf
SHA1641bce8492ff90a809ca125689deacb62b50844e
SHA2569456182b40b4fa0daa2fca3f2926585e0a7e711eaa9abbe6a863b0a3bdee61df
SHA5125e3ca369d7e143f90f70f87c9adae8b1a19bcf14d69c2bd944cfd6b928aee9727c0fdd70ce3637cb7ccd1d20cb8230ac739ed9cd577816fc5297eb84c170ec87
-
Filesize
174KB
MD5fe8cbe8eab55d1cac15887969ea08baf
SHA1641bce8492ff90a809ca125689deacb62b50844e
SHA2569456182b40b4fa0daa2fca3f2926585e0a7e711eaa9abbe6a863b0a3bdee61df
SHA5125e3ca369d7e143f90f70f87c9adae8b1a19bcf14d69c2bd944cfd6b928aee9727c0fdd70ce3637cb7ccd1d20cb8230ac739ed9cd577816fc5297eb84c170ec87