Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    168s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 02:28

General

  • Target

    88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe

  • Size

    930KB

  • MD5

    2dfd9fd982fbf4cc8024e0516fadfb51

  • SHA1

    6f75d913aa14b7ccbe316325463e5d34e4c23843

  • SHA256

    88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2

  • SHA512

    cc80fc9a068bf5ca7512eb43b8d8ada6aa976ef49462e8596066920fb305da28f1b500428281917fe4dbb0335e3d2546dd62df4b9d3dca8e986b7ebd8f987f93

  • SSDEEP

    12288:E9//yfYb5BIQZVtR6Ar8OJuq/YDPfSQF3sPp+uptyodtqNpKZ2dsi+gI1PBAhKhS:EiuBtZc08OJpY/8PYHodtqfBKl1p/Kx

Malware Config

Extracted

Family

redline

Botnet

moner

C2

77.91.124.82:19071

Attributes
  • auth_value

    a94cd9e01643e1945b296c28a2f28707

Signatures

  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe
    "C:\Users\Admin\AppData\Local\Temp\88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3852
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3720978.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3720978.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:684
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9017694.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9017694.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:408
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4538512.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4538512.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:768
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2376
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2356
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0260117.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0260117.exe
              5⤵
              • Executes dropped EXE
              PID:4004

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3720978.exe

      Filesize

      472KB

      MD5

      a34388d806fb51b173a6b7ccdc1a8e9e

      SHA1

      aeb1f1eae6382588199b1d0ce08ef068d53c25aa

      SHA256

      8f09f82a1b0e960f9b682ff846c1b3ca8f18e3957b9d27a570130b7823bd315e

      SHA512

      ef1ae817c5fd5dab1986dc6b370ea836ad53c38ac126166b82009c42e46feb19af1cdf3e9e3336ff67f4b8bfe75cea436ab6df85a7c109522a50fb77f9388894

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3720978.exe

      Filesize

      472KB

      MD5

      a34388d806fb51b173a6b7ccdc1a8e9e

      SHA1

      aeb1f1eae6382588199b1d0ce08ef068d53c25aa

      SHA256

      8f09f82a1b0e960f9b682ff846c1b3ca8f18e3957b9d27a570130b7823bd315e

      SHA512

      ef1ae817c5fd5dab1986dc6b370ea836ad53c38ac126166b82009c42e46feb19af1cdf3e9e3336ff67f4b8bfe75cea436ab6df85a7c109522a50fb77f9388894

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9017694.exe

      Filesize

      306KB

      MD5

      4e8b81b35c50e99bd53bd292415928a3

      SHA1

      7d1b5c003195704d1f943f489a92f3d52073de98

      SHA256

      b0792d4de4c2f20dd01180edaab579d40ecab2d695012e031fef37004c0fe8b3

      SHA512

      db8b987cc1a749597ed197b59395dfa7d8bb993afbd159303c625129ba4f50ffbbae1d8eb2876649c6989bf5222210723f20b3b3c6b327639db9b4f6f3c64a9d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9017694.exe

      Filesize

      306KB

      MD5

      4e8b81b35c50e99bd53bd292415928a3

      SHA1

      7d1b5c003195704d1f943f489a92f3d52073de98

      SHA256

      b0792d4de4c2f20dd01180edaab579d40ecab2d695012e031fef37004c0fe8b3

      SHA512

      db8b987cc1a749597ed197b59395dfa7d8bb993afbd159303c625129ba4f50ffbbae1d8eb2876649c6989bf5222210723f20b3b3c6b327639db9b4f6f3c64a9d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4538512.exe

      Filesize

      213KB

      MD5

      c439257f60e9ffc3e66683d4b97b0e3a

      SHA1

      dc80fe709b195dd724963006d43ede867e3d3d77

      SHA256

      a822d7ee0844408b51e9aaef83359398a4545313a8823c7955f29886287de960

      SHA512

      ece5f5c882fbf9e4e713aa4cf78ce258319450ddab8a94fa0b70a11f9c6f7f84abc5264c133d38813ec805fd849c035a988eb6ae0e9da11b6224814a6ecd35a4

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4538512.exe

      Filesize

      213KB

      MD5

      c439257f60e9ffc3e66683d4b97b0e3a

      SHA1

      dc80fe709b195dd724963006d43ede867e3d3d77

      SHA256

      a822d7ee0844408b51e9aaef83359398a4545313a8823c7955f29886287de960

      SHA512

      ece5f5c882fbf9e4e713aa4cf78ce258319450ddab8a94fa0b70a11f9c6f7f84abc5264c133d38813ec805fd849c035a988eb6ae0e9da11b6224814a6ecd35a4

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0260117.exe

      Filesize

      174KB

      MD5

      bf9fae646ac8403f2c3fbe0c3708d9db

      SHA1

      8b6fcd623462862f8c1b7d4187a04d3ec2c0c60f

      SHA256

      2c02293dfbebd95c10ef25aa34550794c14a808d706f12c56f47ab08ba9aa74d

      SHA512

      9331b71e2252c3983c637652a7293d568824d403be975b1386e09ce033a19c7f697f757bcea7cd2ba7dbda19fb841e7af9f2efdf557b2edabde8fa6478d1e7e1

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0260117.exe

      Filesize

      174KB

      MD5

      bf9fae646ac8403f2c3fbe0c3708d9db

      SHA1

      8b6fcd623462862f8c1b7d4187a04d3ec2c0c60f

      SHA256

      2c02293dfbebd95c10ef25aa34550794c14a808d706f12c56f47ab08ba9aa74d

      SHA512

      9331b71e2252c3983c637652a7293d568824d403be975b1386e09ce033a19c7f697f757bcea7cd2ba7dbda19fb841e7af9f2efdf557b2edabde8fa6478d1e7e1

    • memory/2356-25-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2356-43-0x0000000073FC0000-0x0000000074770000-memory.dmp

      Filesize

      7.7MB

    • memory/2356-41-0x0000000073FC0000-0x0000000074770000-memory.dmp

      Filesize

      7.7MB

    • memory/2356-32-0x0000000073FC0000-0x0000000074770000-memory.dmp

      Filesize

      7.7MB

    • memory/3608-3-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/3608-2-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/3608-1-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/3608-39-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/3608-0-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/4004-30-0x0000000073FC0000-0x0000000074770000-memory.dmp

      Filesize

      7.7MB

    • memory/4004-34-0x0000000004F50000-0x000000000505A000-memory.dmp

      Filesize

      1.0MB

    • memory/4004-36-0x0000000004E30000-0x0000000004E40000-memory.dmp

      Filesize

      64KB

    • memory/4004-35-0x0000000004E40000-0x0000000004E52000-memory.dmp

      Filesize

      72KB

    • memory/4004-37-0x0000000004EA0000-0x0000000004EDC000-memory.dmp

      Filesize

      240KB

    • memory/4004-38-0x0000000004EE0000-0x0000000004F2C000-memory.dmp

      Filesize

      304KB

    • memory/4004-33-0x0000000005460000-0x0000000005A78000-memory.dmp

      Filesize

      6.1MB

    • memory/4004-40-0x0000000073FC0000-0x0000000074770000-memory.dmp

      Filesize

      7.7MB

    • memory/4004-31-0x0000000002680000-0x0000000002686000-memory.dmp

      Filesize

      24KB

    • memory/4004-29-0x0000000000360000-0x0000000000390000-memory.dmp

      Filesize

      192KB

    • memory/4004-44-0x0000000004E30000-0x0000000004E40000-memory.dmp

      Filesize

      64KB