Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe
Resource
win10v2004-20230915-en
General
-
Target
0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe
-
Size
1.2MB
-
MD5
afdcb9fe08736951088d5f1ac3a91882
-
SHA1
31638b05828c06bebc0e4fd654a1777a71f27855
-
SHA256
0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7
-
SHA512
fb33e564a5f8c4d67631d7331dd3903bfb8b993f1fe63b79f0cbf35fba501424c7ef91423c14dc46c72f13189fbf97212a69489a2da17e2665ca19352fe1d762
-
SSDEEP
24576:EZtRsbYYOb5xGSBs7dsNIriUZ5aV/8c3lK2i6b0sJQp95IFHIuhqnMzXhu62G9eC:EZtRsXOb5x/OWYimc6cTkkjo8XlhZ
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/3756-32-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 260 x7180346.exe 4732 x0958919.exe 4200 x6383766.exe 372 g1102232.exe 4564 h3113838.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7180346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0958919.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6383766.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4504 set thread context of 264 4504 0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe 85 PID 372 set thread context of 3756 372 g1102232.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3756 AppLaunch.exe 3756 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3756 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4504 wrote to memory of 264 4504 0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe 85 PID 4504 wrote to memory of 264 4504 0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe 85 PID 4504 wrote to memory of 264 4504 0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe 85 PID 4504 wrote to memory of 264 4504 0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe 85 PID 4504 wrote to memory of 264 4504 0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe 85 PID 4504 wrote to memory of 264 4504 0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe 85 PID 4504 wrote to memory of 264 4504 0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe 85 PID 4504 wrote to memory of 264 4504 0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe 85 PID 4504 wrote to memory of 264 4504 0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe 85 PID 4504 wrote to memory of 264 4504 0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe 85 PID 264 wrote to memory of 260 264 AppLaunch.exe 86 PID 264 wrote to memory of 260 264 AppLaunch.exe 86 PID 264 wrote to memory of 260 264 AppLaunch.exe 86 PID 260 wrote to memory of 4732 260 x7180346.exe 87 PID 260 wrote to memory of 4732 260 x7180346.exe 87 PID 260 wrote to memory of 4732 260 x7180346.exe 87 PID 4732 wrote to memory of 4200 4732 x0958919.exe 89 PID 4732 wrote to memory of 4200 4732 x0958919.exe 89 PID 4732 wrote to memory of 4200 4732 x0958919.exe 89 PID 4200 wrote to memory of 372 4200 x6383766.exe 90 PID 4200 wrote to memory of 372 4200 x6383766.exe 90 PID 4200 wrote to memory of 372 4200 x6383766.exe 90 PID 372 wrote to memory of 3756 372 g1102232.exe 93 PID 372 wrote to memory of 3756 372 g1102232.exe 93 PID 372 wrote to memory of 3756 372 g1102232.exe 93 PID 372 wrote to memory of 3756 372 g1102232.exe 93 PID 372 wrote to memory of 3756 372 g1102232.exe 93 PID 372 wrote to memory of 3756 372 g1102232.exe 93 PID 372 wrote to memory of 3756 372 g1102232.exe 93 PID 372 wrote to memory of 3756 372 g1102232.exe 93 PID 4200 wrote to memory of 4564 4200 x6383766.exe 94 PID 4200 wrote to memory of 4564 4200 x6383766.exe 94 PID 4200 wrote to memory of 4564 4200 x6383766.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe"C:\Users\Admin\AppData\Local\Temp\0db2a72744fc2d2e90622c9db925e36555decceceaa24a63192a1ef4cf8a5aa7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7180346.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7180346.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0958919.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0958919.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6383766.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6383766.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1102232.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1102232.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3113838.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3113838.exe6⤵
- Executes dropped EXE
PID:4564
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD5fb306937a0de377d4f0df7e201c0b87f
SHA147b84313061061ff619707578b2b7e047fd85f18
SHA256acb2ededf24e438f0466c119f5fb8ec07860a530cae228c9ef4df4deffd9fe1e
SHA5123e9e1ebafcfd56f85ce79eb35cfc19cfb40f74052b4bf75fa7d61b44f82d259f65f41b3067b173a07ecb0ecbce16979f8d3e8130a48943d018b76e4a8f2f5d17
-
Filesize
749KB
MD5fb306937a0de377d4f0df7e201c0b87f
SHA147b84313061061ff619707578b2b7e047fd85f18
SHA256acb2ededf24e438f0466c119f5fb8ec07860a530cae228c9ef4df4deffd9fe1e
SHA5123e9e1ebafcfd56f85ce79eb35cfc19cfb40f74052b4bf75fa7d61b44f82d259f65f41b3067b173a07ecb0ecbce16979f8d3e8130a48943d018b76e4a8f2f5d17
-
Filesize
483KB
MD50ca2d22fe85625f7ea160cd29084b19e
SHA14cd9e0f414409e733bea2fb7010d3adad527e042
SHA256b797ccd72d14d21c1745ebb9f395411bfbb0b5c00a74b856096cce1ea8277258
SHA51258a84555865cf23f509737918318e5ad21873d55bcb4820d8d711b5624edfee783359ef48d8f93599dfa703cf30d9cad1c14bb46321d0448fae159a91e8a3e84
-
Filesize
483KB
MD50ca2d22fe85625f7ea160cd29084b19e
SHA14cd9e0f414409e733bea2fb7010d3adad527e042
SHA256b797ccd72d14d21c1745ebb9f395411bfbb0b5c00a74b856096cce1ea8277258
SHA51258a84555865cf23f509737918318e5ad21873d55bcb4820d8d711b5624edfee783359ef48d8f93599dfa703cf30d9cad1c14bb46321d0448fae159a91e8a3e84
-
Filesize
317KB
MD51bb0d024292897c1dfd3b6702ac54439
SHA16c0062c605e57f0976cf2322250407360a149998
SHA2565876b94494b57f6bfd18573c935dc6df35f6a7ee1d2d5c4aeeaa9059f46ff3bc
SHA5126ab0942c27591fce8f3cc9cbce54e873bbb5de3c173d103411b00fe4be5ed6a6810ed85a669d6b2f3003dbaff2dd2c2e7c0f37d8860629848a4dc95f0f03822c
-
Filesize
317KB
MD51bb0d024292897c1dfd3b6702ac54439
SHA16c0062c605e57f0976cf2322250407360a149998
SHA2565876b94494b57f6bfd18573c935dc6df35f6a7ee1d2d5c4aeeaa9059f46ff3bc
SHA5126ab0942c27591fce8f3cc9cbce54e873bbb5de3c173d103411b00fe4be5ed6a6810ed85a669d6b2f3003dbaff2dd2c2e7c0f37d8860629848a4dc95f0f03822c
-
Filesize
230KB
MD51375d64d7bfe2ebd738661d583b67c9d
SHA1b1cd6248544917ddd906cb3bbe6b7113e09bf482
SHA2561ce39c54524017d36aa25b20906b47d124933059068d535a8a92f01d47496936
SHA5123be4cfb9150553ea71b5da33923a694c321c357d9dd0c70002f72f8d51415bdbf1e42e0242a310e586e76bdaf50992d33d96f1f7437bfa225cbd5b976ce71ed4
-
Filesize
230KB
MD51375d64d7bfe2ebd738661d583b67c9d
SHA1b1cd6248544917ddd906cb3bbe6b7113e09bf482
SHA2561ce39c54524017d36aa25b20906b47d124933059068d535a8a92f01d47496936
SHA5123be4cfb9150553ea71b5da33923a694c321c357d9dd0c70002f72f8d51415bdbf1e42e0242a310e586e76bdaf50992d33d96f1f7437bfa225cbd5b976ce71ed4
-
Filesize
174KB
MD56d4bed963cb65ab10d7271232967982b
SHA16041ebe9cb0b76b9c1e224497bc9e404a13351de
SHA256fe9e64edc7ba1d12448b5769c5e83195eeb8a34726c1a09dc1a8f95d7f35a206
SHA5122405bcc2b305435f5f52fc4a3826325be62c6a2c35f8a01bc3c556f9c83dfaf1f8dd864c07b3ee6b9b0018ae3c4e03cee728a8eaae79f1938e4ddab3a4de3131
-
Filesize
174KB
MD56d4bed963cb65ab10d7271232967982b
SHA16041ebe9cb0b76b9c1e224497bc9e404a13351de
SHA256fe9e64edc7ba1d12448b5769c5e83195eeb8a34726c1a09dc1a8f95d7f35a206
SHA5122405bcc2b305435f5f52fc4a3826325be62c6a2c35f8a01bc3c556f9c83dfaf1f8dd864c07b3ee6b9b0018ae3c4e03cee728a8eaae79f1938e4ddab3a4de3131