Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe
Resource
win10v2004-20230915-en
General
-
Target
88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe
-
Size
930KB
-
MD5
2dfd9fd982fbf4cc8024e0516fadfb51
-
SHA1
6f75d913aa14b7ccbe316325463e5d34e4c23843
-
SHA256
88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2
-
SHA512
cc80fc9a068bf5ca7512eb43b8d8ada6aa976ef49462e8596066920fb305da28f1b500428281917fe4dbb0335e3d2546dd62df4b9d3dca8e986b7ebd8f987f93
-
SSDEEP
12288:E9//yfYb5BIQZVtR6Ar8OJuq/YDPfSQF3sPp+uptyodtqNpKZ2dsi+gI1PBAhKhS:EiuBtZc08OJpY/8PYHodtqfBKl1p/Kx
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2356-25-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 684 x3720978.exe 408 x9017694.exe 768 g4538512.exe 4004 i0260117.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3720978.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9017694.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3852 set thread context of 3608 3852 88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe 92 PID 768 set thread context of 2356 768 g4538512.exe 100 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2356 AppLaunch.exe 2356 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2356 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3852 wrote to memory of 3608 3852 88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe 92 PID 3852 wrote to memory of 3608 3852 88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe 92 PID 3852 wrote to memory of 3608 3852 88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe 92 PID 3852 wrote to memory of 3608 3852 88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe 92 PID 3852 wrote to memory of 3608 3852 88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe 92 PID 3852 wrote to memory of 3608 3852 88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe 92 PID 3852 wrote to memory of 3608 3852 88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe 92 PID 3852 wrote to memory of 3608 3852 88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe 92 PID 3852 wrote to memory of 3608 3852 88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe 92 PID 3852 wrote to memory of 3608 3852 88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe 92 PID 3608 wrote to memory of 684 3608 AppLaunch.exe 95 PID 3608 wrote to memory of 684 3608 AppLaunch.exe 95 PID 3608 wrote to memory of 684 3608 AppLaunch.exe 95 PID 684 wrote to memory of 408 684 x3720978.exe 96 PID 684 wrote to memory of 408 684 x3720978.exe 96 PID 684 wrote to memory of 408 684 x3720978.exe 96 PID 408 wrote to memory of 768 408 x9017694.exe 97 PID 408 wrote to memory of 768 408 x9017694.exe 97 PID 408 wrote to memory of 768 408 x9017694.exe 97 PID 768 wrote to memory of 2376 768 g4538512.exe 99 PID 768 wrote to memory of 2376 768 g4538512.exe 99 PID 768 wrote to memory of 2376 768 g4538512.exe 99 PID 768 wrote to memory of 2356 768 g4538512.exe 100 PID 768 wrote to memory of 2356 768 g4538512.exe 100 PID 768 wrote to memory of 2356 768 g4538512.exe 100 PID 768 wrote to memory of 2356 768 g4538512.exe 100 PID 768 wrote to memory of 2356 768 g4538512.exe 100 PID 768 wrote to memory of 2356 768 g4538512.exe 100 PID 768 wrote to memory of 2356 768 g4538512.exe 100 PID 768 wrote to memory of 2356 768 g4538512.exe 100 PID 408 wrote to memory of 4004 408 x9017694.exe 101 PID 408 wrote to memory of 4004 408 x9017694.exe 101 PID 408 wrote to memory of 4004 408 x9017694.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe"C:\Users\Admin\AppData\Local\Temp\88050edb4a0c073628d88b2d7ac9b33169e89d580404c391eb416c2d973601e2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3720978.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3720978.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9017694.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9017694.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4538512.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4538512.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0260117.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0260117.exe5⤵
- Executes dropped EXE
PID:4004
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD5a34388d806fb51b173a6b7ccdc1a8e9e
SHA1aeb1f1eae6382588199b1d0ce08ef068d53c25aa
SHA2568f09f82a1b0e960f9b682ff846c1b3ca8f18e3957b9d27a570130b7823bd315e
SHA512ef1ae817c5fd5dab1986dc6b370ea836ad53c38ac126166b82009c42e46feb19af1cdf3e9e3336ff67f4b8bfe75cea436ab6df85a7c109522a50fb77f9388894
-
Filesize
472KB
MD5a34388d806fb51b173a6b7ccdc1a8e9e
SHA1aeb1f1eae6382588199b1d0ce08ef068d53c25aa
SHA2568f09f82a1b0e960f9b682ff846c1b3ca8f18e3957b9d27a570130b7823bd315e
SHA512ef1ae817c5fd5dab1986dc6b370ea836ad53c38ac126166b82009c42e46feb19af1cdf3e9e3336ff67f4b8bfe75cea436ab6df85a7c109522a50fb77f9388894
-
Filesize
306KB
MD54e8b81b35c50e99bd53bd292415928a3
SHA17d1b5c003195704d1f943f489a92f3d52073de98
SHA256b0792d4de4c2f20dd01180edaab579d40ecab2d695012e031fef37004c0fe8b3
SHA512db8b987cc1a749597ed197b59395dfa7d8bb993afbd159303c625129ba4f50ffbbae1d8eb2876649c6989bf5222210723f20b3b3c6b327639db9b4f6f3c64a9d
-
Filesize
306KB
MD54e8b81b35c50e99bd53bd292415928a3
SHA17d1b5c003195704d1f943f489a92f3d52073de98
SHA256b0792d4de4c2f20dd01180edaab579d40ecab2d695012e031fef37004c0fe8b3
SHA512db8b987cc1a749597ed197b59395dfa7d8bb993afbd159303c625129ba4f50ffbbae1d8eb2876649c6989bf5222210723f20b3b3c6b327639db9b4f6f3c64a9d
-
Filesize
213KB
MD5c439257f60e9ffc3e66683d4b97b0e3a
SHA1dc80fe709b195dd724963006d43ede867e3d3d77
SHA256a822d7ee0844408b51e9aaef83359398a4545313a8823c7955f29886287de960
SHA512ece5f5c882fbf9e4e713aa4cf78ce258319450ddab8a94fa0b70a11f9c6f7f84abc5264c133d38813ec805fd849c035a988eb6ae0e9da11b6224814a6ecd35a4
-
Filesize
213KB
MD5c439257f60e9ffc3e66683d4b97b0e3a
SHA1dc80fe709b195dd724963006d43ede867e3d3d77
SHA256a822d7ee0844408b51e9aaef83359398a4545313a8823c7955f29886287de960
SHA512ece5f5c882fbf9e4e713aa4cf78ce258319450ddab8a94fa0b70a11f9c6f7f84abc5264c133d38813ec805fd849c035a988eb6ae0e9da11b6224814a6ecd35a4
-
Filesize
174KB
MD5bf9fae646ac8403f2c3fbe0c3708d9db
SHA18b6fcd623462862f8c1b7d4187a04d3ec2c0c60f
SHA2562c02293dfbebd95c10ef25aa34550794c14a808d706f12c56f47ab08ba9aa74d
SHA5129331b71e2252c3983c637652a7293d568824d403be975b1386e09ce033a19c7f697f757bcea7cd2ba7dbda19fb841e7af9f2efdf557b2edabde8fa6478d1e7e1
-
Filesize
174KB
MD5bf9fae646ac8403f2c3fbe0c3708d9db
SHA18b6fcd623462862f8c1b7d4187a04d3ec2c0c60f
SHA2562c02293dfbebd95c10ef25aa34550794c14a808d706f12c56f47ab08ba9aa74d
SHA5129331b71e2252c3983c637652a7293d568824d403be975b1386e09ce033a19c7f697f757bcea7cd2ba7dbda19fb841e7af9f2efdf557b2edabde8fa6478d1e7e1