Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 02:49

General

  • Target

    0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe

  • Size

    1.2MB

  • MD5

    afdcb9fe08736951088d5f1ac3a91882

  • SHA1

    31638b05828c06bebc0e4fd654a1777a71f27855

  • SHA256

    0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7

  • SHA512

    fb33e564a5f8c4d67631d7331dd3903bfb8b993f1fe63b79f0cbf35fba501424c7ef91423c14dc46c72f13189fbf97212a69489a2da17e2665ca19352fe1d762

  • SSDEEP

    24576:EZtRsbYYOb5xGSBs7dsNIriUZ5aV/8c3lK2i6b0sJQp95IFHIuhqnMzXhu62G9eC:EZtRsXOb5x/OWYimc6cTkkjo8XlhZ

Malware Config

Extracted

Family

redline

Botnet

petin

C2

77.91.124.82:19071

Attributes
  • auth_value

    f6cf7a48c0291d1ef5a3440429827d6d

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe
    "C:\Users\Admin\AppData\Local\Temp\0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:264
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7180346.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7180346.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:260
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0958919.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0958919.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4732
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6383766.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6383766.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4200
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1102232.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1102232.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:372
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3756
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3113838.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3113838.exe
              6⤵
              • Executes dropped EXE
              PID:4564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7180346.exe

    Filesize

    749KB

    MD5

    fb306937a0de377d4f0df7e201c0b87f

    SHA1

    47b84313061061ff619707578b2b7e047fd85f18

    SHA256

    acb2ededf24e438f0466c119f5fb8ec07860a530cae228c9ef4df4deffd9fe1e

    SHA512

    3e9e1ebafcfd56f85ce79eb35cfc19cfb40f74052b4bf75fa7d61b44f82d259f65f41b3067b173a07ecb0ecbce16979f8d3e8130a48943d018b76e4a8f2f5d17

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7180346.exe

    Filesize

    749KB

    MD5

    fb306937a0de377d4f0df7e201c0b87f

    SHA1

    47b84313061061ff619707578b2b7e047fd85f18

    SHA256

    acb2ededf24e438f0466c119f5fb8ec07860a530cae228c9ef4df4deffd9fe1e

    SHA512

    3e9e1ebafcfd56f85ce79eb35cfc19cfb40f74052b4bf75fa7d61b44f82d259f65f41b3067b173a07ecb0ecbce16979f8d3e8130a48943d018b76e4a8f2f5d17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0958919.exe

    Filesize

    483KB

    MD5

    0ca2d22fe85625f7ea160cd29084b19e

    SHA1

    4cd9e0f414409e733bea2fb7010d3adad527e042

    SHA256

    b797ccd72d14d21c1745ebb9f395411bfbb0b5c00a74b856096cce1ea8277258

    SHA512

    58a84555865cf23f509737918318e5ad21873d55bcb4820d8d711b5624edfee783359ef48d8f93599dfa703cf30d9cad1c14bb46321d0448fae159a91e8a3e84

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0958919.exe

    Filesize

    483KB

    MD5

    0ca2d22fe85625f7ea160cd29084b19e

    SHA1

    4cd9e0f414409e733bea2fb7010d3adad527e042

    SHA256

    b797ccd72d14d21c1745ebb9f395411bfbb0b5c00a74b856096cce1ea8277258

    SHA512

    58a84555865cf23f509737918318e5ad21873d55bcb4820d8d711b5624edfee783359ef48d8f93599dfa703cf30d9cad1c14bb46321d0448fae159a91e8a3e84

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6383766.exe

    Filesize

    317KB

    MD5

    1bb0d024292897c1dfd3b6702ac54439

    SHA1

    6c0062c605e57f0976cf2322250407360a149998

    SHA256

    5876b94494b57f6bfd18573c935dc6df35f6a7ee1d2d5c4aeeaa9059f46ff3bc

    SHA512

    6ab0942c27591fce8f3cc9cbce54e873bbb5de3c173d103411b00fe4be5ed6a6810ed85a669d6b2f3003dbaff2dd2c2e7c0f37d8860629848a4dc95f0f03822c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6383766.exe

    Filesize

    317KB

    MD5

    1bb0d024292897c1dfd3b6702ac54439

    SHA1

    6c0062c605e57f0976cf2322250407360a149998

    SHA256

    5876b94494b57f6bfd18573c935dc6df35f6a7ee1d2d5c4aeeaa9059f46ff3bc

    SHA512

    6ab0942c27591fce8f3cc9cbce54e873bbb5de3c173d103411b00fe4be5ed6a6810ed85a669d6b2f3003dbaff2dd2c2e7c0f37d8860629848a4dc95f0f03822c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1102232.exe

    Filesize

    230KB

    MD5

    1375d64d7bfe2ebd738661d583b67c9d

    SHA1

    b1cd6248544917ddd906cb3bbe6b7113e09bf482

    SHA256

    1ce39c54524017d36aa25b20906b47d124933059068d535a8a92f01d47496936

    SHA512

    3be4cfb9150553ea71b5da33923a694c321c357d9dd0c70002f72f8d51415bdbf1e42e0242a310e586e76bdaf50992d33d96f1f7437bfa225cbd5b976ce71ed4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1102232.exe

    Filesize

    230KB

    MD5

    1375d64d7bfe2ebd738661d583b67c9d

    SHA1

    b1cd6248544917ddd906cb3bbe6b7113e09bf482

    SHA256

    1ce39c54524017d36aa25b20906b47d124933059068d535a8a92f01d47496936

    SHA512

    3be4cfb9150553ea71b5da33923a694c321c357d9dd0c70002f72f8d51415bdbf1e42e0242a310e586e76bdaf50992d33d96f1f7437bfa225cbd5b976ce71ed4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3113838.exe

    Filesize

    174KB

    MD5

    6d4bed963cb65ab10d7271232967982b

    SHA1

    6041ebe9cb0b76b9c1e224497bc9e404a13351de

    SHA256

    fe9e64edc7ba1d12448b5769c5e83195eeb8a34726c1a09dc1a8f95d7f35a206

    SHA512

    2405bcc2b305435f5f52fc4a3826325be62c6a2c35f8a01bc3c556f9c83dfaf1f8dd864c07b3ee6b9b0018ae3c4e03cee728a8eaae79f1938e4ddab3a4de3131

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3113838.exe

    Filesize

    174KB

    MD5

    6d4bed963cb65ab10d7271232967982b

    SHA1

    6041ebe9cb0b76b9c1e224497bc9e404a13351de

    SHA256

    fe9e64edc7ba1d12448b5769c5e83195eeb8a34726c1a09dc1a8f95d7f35a206

    SHA512

    2405bcc2b305435f5f52fc4a3826325be62c6a2c35f8a01bc3c556f9c83dfaf1f8dd864c07b3ee6b9b0018ae3c4e03cee728a8eaae79f1938e4ddab3a4de3131

  • memory/264-41-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/264-2-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/264-3-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/264-1-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/264-0-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/3756-47-0x0000000073DF0000-0x00000000745A0000-memory.dmp

    Filesize

    7.7MB

  • memory/3756-37-0x0000000073DF0000-0x00000000745A0000-memory.dmp

    Filesize

    7.7MB

  • memory/3756-50-0x0000000073DF0000-0x00000000745A0000-memory.dmp

    Filesize

    7.7MB

  • memory/3756-32-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4564-40-0x0000000005940000-0x0000000005F58000-memory.dmp

    Filesize

    6.1MB

  • memory/4564-36-0x0000000000A10000-0x0000000000A40000-memory.dmp

    Filesize

    192KB

  • memory/4564-42-0x0000000005460000-0x000000000556A000-memory.dmp

    Filesize

    1.0MB

  • memory/4564-43-0x0000000005210000-0x0000000005220000-memory.dmp

    Filesize

    64KB

  • memory/4564-44-0x00000000053A0000-0x00000000053B2000-memory.dmp

    Filesize

    72KB

  • memory/4564-45-0x0000000005400000-0x000000000543C000-memory.dmp

    Filesize

    240KB

  • memory/4564-39-0x0000000001230000-0x0000000001236000-memory.dmp

    Filesize

    24KB

  • memory/4564-46-0x0000000005570000-0x00000000055BC000-memory.dmp

    Filesize

    304KB

  • memory/4564-48-0x0000000073DF0000-0x00000000745A0000-memory.dmp

    Filesize

    7.7MB

  • memory/4564-38-0x0000000073DF0000-0x00000000745A0000-memory.dmp

    Filesize

    7.7MB

  • memory/4564-51-0x0000000005210000-0x0000000005220000-memory.dmp

    Filesize

    64KB