Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe
Resource
win10v2004-20230915-en
General
-
Target
2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe
-
Size
1.2MB
-
MD5
9ee3d132a5160d17dfb59b03105c8066
-
SHA1
d3f17b9eca03f18acc805516c9bfdc5392a7e94d
-
SHA256
2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057
-
SHA512
9d0a8af1d3a999a2961174048b653eae6762fc62f1845cbeee0b3184bea22b579686a4a540da640068f7cf5832645765cacab011da1cead17d0c9e2fa63451e9
-
SSDEEP
24576:s9q+Vovdoqnvtus5weoALArAMJ/MjBG7TAvNkN7DsrNz1gC4b4G:gq+VoCkvturlALItQBG/EN4IJ1d44G
Malware Config
Extracted
redline
petin
77.91.124.82:19071
-
auth_value
f6cf7a48c0291d1ef5a3440429827d6d
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/5064-32-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 2124 x2768644.exe 2720 x1165784.exe 2684 x9977147.exe 4052 g0277742.exe 4264 h6465535.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2768644.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1165784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9977147.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3928 set thread context of 3316 3928 2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe 97 PID 4052 set thread context of 5064 4052 g0277742.exe 103 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5064 AppLaunch.exe 5064 AppLaunch.exe 5064 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5064 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3928 wrote to memory of 3316 3928 2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe 97 PID 3928 wrote to memory of 3316 3928 2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe 97 PID 3928 wrote to memory of 3316 3928 2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe 97 PID 3928 wrote to memory of 3316 3928 2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe 97 PID 3928 wrote to memory of 3316 3928 2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe 97 PID 3928 wrote to memory of 3316 3928 2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe 97 PID 3928 wrote to memory of 3316 3928 2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe 97 PID 3928 wrote to memory of 3316 3928 2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe 97 PID 3928 wrote to memory of 3316 3928 2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe 97 PID 3928 wrote to memory of 3316 3928 2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe 97 PID 3316 wrote to memory of 2124 3316 AppLaunch.exe 98 PID 3316 wrote to memory of 2124 3316 AppLaunch.exe 98 PID 3316 wrote to memory of 2124 3316 AppLaunch.exe 98 PID 2124 wrote to memory of 2720 2124 x2768644.exe 99 PID 2124 wrote to memory of 2720 2124 x2768644.exe 99 PID 2124 wrote to memory of 2720 2124 x2768644.exe 99 PID 2720 wrote to memory of 2684 2720 x1165784.exe 100 PID 2720 wrote to memory of 2684 2720 x1165784.exe 100 PID 2720 wrote to memory of 2684 2720 x1165784.exe 100 PID 2684 wrote to memory of 4052 2684 x9977147.exe 101 PID 2684 wrote to memory of 4052 2684 x9977147.exe 101 PID 2684 wrote to memory of 4052 2684 x9977147.exe 101 PID 4052 wrote to memory of 5064 4052 g0277742.exe 103 PID 4052 wrote to memory of 5064 4052 g0277742.exe 103 PID 4052 wrote to memory of 5064 4052 g0277742.exe 103 PID 4052 wrote to memory of 5064 4052 g0277742.exe 103 PID 4052 wrote to memory of 5064 4052 g0277742.exe 103 PID 4052 wrote to memory of 5064 4052 g0277742.exe 103 PID 4052 wrote to memory of 5064 4052 g0277742.exe 103 PID 4052 wrote to memory of 5064 4052 g0277742.exe 103 PID 2684 wrote to memory of 4264 2684 x9977147.exe 104 PID 2684 wrote to memory of 4264 2684 x9977147.exe 104 PID 2684 wrote to memory of 4264 2684 x9977147.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe"C:\Users\Admin\AppData\Local\Temp\2d0f85bc228d867386383abfb98f145d2ef21507e5409a3881148bb9efe9c057.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2768644.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2768644.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1165784.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1165784.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9977147.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9977147.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0277742.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0277742.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6465535.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h6465535.exe6⤵
- Executes dropped EXE
PID:4264
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD59d437f840bf9d86d702fb66dcaa1e8e7
SHA1bd18e0262e8dcfc399fafe8fab52dfd3abe884da
SHA2562ae43312f41e90477f5ad83d07ce0c441003a126186bec670dff5b6b797898d0
SHA51242b0d411d0e79c3a32a684c5b2e1899494fb4322015f5b87276ad98f64e8ff836d9294b68807ff6be75725a68076b24166ff45d9db5400d424bab227acd6da70
-
Filesize
744KB
MD59d437f840bf9d86d702fb66dcaa1e8e7
SHA1bd18e0262e8dcfc399fafe8fab52dfd3abe884da
SHA2562ae43312f41e90477f5ad83d07ce0c441003a126186bec670dff5b6b797898d0
SHA51242b0d411d0e79c3a32a684c5b2e1899494fb4322015f5b87276ad98f64e8ff836d9294b68807ff6be75725a68076b24166ff45d9db5400d424bab227acd6da70
-
Filesize
480KB
MD55cda3535a6504d33c80cb88dbd4e7353
SHA12ac6950e252ffca30fa128635c8949bf5aa63366
SHA25654bf8065f2152d2f147a7a89686e5d89ea294f3c13345e0719b2c96a1df2445a
SHA51218aa539aaf2ada2b60f727ca9ce126ee6be0841a7747cd9b0d8ea69a21f4142109beef05a21832e99c5180a37e33c910993f87328149b66731922486830ffe42
-
Filesize
480KB
MD55cda3535a6504d33c80cb88dbd4e7353
SHA12ac6950e252ffca30fa128635c8949bf5aa63366
SHA25654bf8065f2152d2f147a7a89686e5d89ea294f3c13345e0719b2c96a1df2445a
SHA51218aa539aaf2ada2b60f727ca9ce126ee6be0841a7747cd9b0d8ea69a21f4142109beef05a21832e99c5180a37e33c910993f87328149b66731922486830ffe42
-
Filesize
314KB
MD5d8ffe6bd4fbc2dc4b7eb3f93c1bc14a8
SHA10435ed9bdf64c77ed64bb5507bd142f669c3cb19
SHA2564fb8f03561a30ac8370a8baaef8198507363d182d527cf6ca222422ae99a030e
SHA512d7526787f0bba2a26a449313fc3fe8935716c146335e27b405fe9276f9ed3e0118ca556e964448eadc90e9e36a21244ed5c5a9976bc1ccbc7eba0c9e2b9b92f1
-
Filesize
314KB
MD5d8ffe6bd4fbc2dc4b7eb3f93c1bc14a8
SHA10435ed9bdf64c77ed64bb5507bd142f669c3cb19
SHA2564fb8f03561a30ac8370a8baaef8198507363d182d527cf6ca222422ae99a030e
SHA512d7526787f0bba2a26a449313fc3fe8935716c146335e27b405fe9276f9ed3e0118ca556e964448eadc90e9e36a21244ed5c5a9976bc1ccbc7eba0c9e2b9b92f1
-
Filesize
229KB
MD5425776c76042f941909ea3c090ca546d
SHA1fb5263fc11d47553ea6422441c3950ffccb0690c
SHA256ccffc3ff953e735600b03a0980454f16aa2dba7117c4587aac5855296312595c
SHA512f95c9e1b0960c9c3ba9a0c39ad06ad08fb557c14d9b53209c706ecb4aee83803ef20ee488a37d9efe8e135446085407ba7fb172046b9206cd4f8890847eb3502
-
Filesize
229KB
MD5425776c76042f941909ea3c090ca546d
SHA1fb5263fc11d47553ea6422441c3950ffccb0690c
SHA256ccffc3ff953e735600b03a0980454f16aa2dba7117c4587aac5855296312595c
SHA512f95c9e1b0960c9c3ba9a0c39ad06ad08fb557c14d9b53209c706ecb4aee83803ef20ee488a37d9efe8e135446085407ba7fb172046b9206cd4f8890847eb3502
-
Filesize
174KB
MD5b8d6dcde6357ab6c47c3210ff93e0ec5
SHA170146eaa451a8f7201a89a0816ba18fc6566d8f1
SHA2561feb0acf9be0aa1ded433f2300d387201b7423df60bf04faa8211afd788b5b64
SHA512a462f772a7554df9a2c864872842d26ead9521b49b192cd757928656e48eed11b5bcede53d58816a2c19f71162b0f73be62a5c4f229a00a33fa4e6d26e79fe5d
-
Filesize
174KB
MD5b8d6dcde6357ab6c47c3210ff93e0ec5
SHA170146eaa451a8f7201a89a0816ba18fc6566d8f1
SHA2561feb0acf9be0aa1ded433f2300d387201b7423df60bf04faa8211afd788b5b64
SHA512a462f772a7554df9a2c864872842d26ead9521b49b192cd757928656e48eed11b5bcede53d58816a2c19f71162b0f73be62a5c4f229a00a33fa4e6d26e79fe5d