Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe
-
Size
930KB
-
MD5
003a5adb39b4aae944fcee366eeecb08
-
SHA1
34603c966fd5bb29b671275d215db348a66e8ea6
-
SHA256
c680e5bf89609a2bc8f50217c7bc859fa7d60bdcb53660475bd49e980e2c1e6f
-
SHA512
d8ebaed7db5a8f2991e88a3c03c0d03137867369b10b9d07fa5dee377424fa9d85b71d3cee02c63a2c73b6737c7b6f1b48309de33dfa429685f3762ad9f47545
-
SSDEEP
12288:50//yfYb5BIQZVtRXPWfrcojoQkFAaoDUTlJ/Y/ezShebbLAfIoo/d2kgExJkPy9:GiuBtZeraPKengSVL6oJgFbBmW8XBh
Malware Config
Extracted
redline
moner
77.91.124.82:19071
-
auth_value
a94cd9e01643e1945b296c28a2f28707
Signatures
-
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4188-25-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4000 x5698455.exe 3436 x7036598.exe 552 g4392317.exe 3752 i7885357.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" AppLaunch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5698455.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7036598.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3856 set thread context of 2148 3856 SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe 89 PID 552 set thread context of 4188 552 g4392317.exe 94 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4188 AppLaunch.exe 4188 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4188 AppLaunch.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3856 wrote to memory of 2148 3856 SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe 89 PID 3856 wrote to memory of 2148 3856 SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe 89 PID 3856 wrote to memory of 2148 3856 SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe 89 PID 3856 wrote to memory of 2148 3856 SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe 89 PID 3856 wrote to memory of 2148 3856 SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe 89 PID 3856 wrote to memory of 2148 3856 SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe 89 PID 3856 wrote to memory of 2148 3856 SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe 89 PID 3856 wrote to memory of 2148 3856 SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe 89 PID 3856 wrote to memory of 2148 3856 SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe 89 PID 3856 wrote to memory of 2148 3856 SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe 89 PID 2148 wrote to memory of 4000 2148 AppLaunch.exe 90 PID 2148 wrote to memory of 4000 2148 AppLaunch.exe 90 PID 2148 wrote to memory of 4000 2148 AppLaunch.exe 90 PID 4000 wrote to memory of 3436 4000 x5698455.exe 91 PID 4000 wrote to memory of 3436 4000 x5698455.exe 91 PID 4000 wrote to memory of 3436 4000 x5698455.exe 91 PID 3436 wrote to memory of 552 3436 x7036598.exe 92 PID 3436 wrote to memory of 552 3436 x7036598.exe 92 PID 3436 wrote to memory of 552 3436 x7036598.exe 92 PID 552 wrote to memory of 4188 552 g4392317.exe 94 PID 552 wrote to memory of 4188 552 g4392317.exe 94 PID 552 wrote to memory of 4188 552 g4392317.exe 94 PID 552 wrote to memory of 4188 552 g4392317.exe 94 PID 552 wrote to memory of 4188 552 g4392317.exe 94 PID 552 wrote to memory of 4188 552 g4392317.exe 94 PID 552 wrote to memory of 4188 552 g4392317.exe 94 PID 552 wrote to memory of 4188 552 g4392317.exe 94 PID 3436 wrote to memory of 3752 3436 x7036598.exe 95 PID 3436 wrote to memory of 3752 3436 x7036598.exe 95 PID 3436 wrote to memory of 3752 3436 x7036598.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.31728.27686.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5698455.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5698455.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7036598.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7036598.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4392317.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g4392317.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7885357.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7885357.exe5⤵
- Executes dropped EXE
PID:3752
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD51c27eaa1bec64afac44138dac9516234
SHA1b6bd0cedbcac50a681150b64bbb94b24be145cbe
SHA25679f498c67bb64e7b40ea5dfe2c46e702e5d681a0e0d323b779d100e9895f6de7
SHA5125ef72f48cc2f704e87a9a5a8c852fed18ce3fd05ce751fb36708ca7426c404761a90bd1fca4e1409ebede5ae0f748d70858b3fc5db2f0b5f74a9e542936d7517
-
Filesize
472KB
MD51c27eaa1bec64afac44138dac9516234
SHA1b6bd0cedbcac50a681150b64bbb94b24be145cbe
SHA25679f498c67bb64e7b40ea5dfe2c46e702e5d681a0e0d323b779d100e9895f6de7
SHA5125ef72f48cc2f704e87a9a5a8c852fed18ce3fd05ce751fb36708ca7426c404761a90bd1fca4e1409ebede5ae0f748d70858b3fc5db2f0b5f74a9e542936d7517
-
Filesize
307KB
MD57e6c7033ed2a212226d8b68162029983
SHA1e85c15fb89c11a925fed240e564ec9fcf83429a0
SHA256af289cf7bc0a63df86d167d97bd5a48a8220aa9cbf675b7ee1f249c29d1e35a2
SHA51222f22da9327637865e709dc771fb5a5dc54db2d9b84d8c31b9b1493ba41d3bf968e081acadf1be22102debe4794e904a167af8f4b6b34c71690e7c65aa2a9c1a
-
Filesize
307KB
MD57e6c7033ed2a212226d8b68162029983
SHA1e85c15fb89c11a925fed240e564ec9fcf83429a0
SHA256af289cf7bc0a63df86d167d97bd5a48a8220aa9cbf675b7ee1f249c29d1e35a2
SHA51222f22da9327637865e709dc771fb5a5dc54db2d9b84d8c31b9b1493ba41d3bf968e081acadf1be22102debe4794e904a167af8f4b6b34c71690e7c65aa2a9c1a
-
Filesize
213KB
MD55ec496bb5683ef7e3a48e2d8ca3951d1
SHA1dc1ed109d83f51e07dbc64593ec47f180f496846
SHA256dde54bf709a7cf9a51d3fa4f4e5c97052c9419d909343fb93a48e4bcfb4ffd23
SHA512c3cb7f118079e0a3dd113a870f220dcfce08b913bf64c784a71dda451df78557885f3272051df8bfff1a64457b9ed31b95f264c43ca5dbea6d0434f641f53eae
-
Filesize
213KB
MD55ec496bb5683ef7e3a48e2d8ca3951d1
SHA1dc1ed109d83f51e07dbc64593ec47f180f496846
SHA256dde54bf709a7cf9a51d3fa4f4e5c97052c9419d909343fb93a48e4bcfb4ffd23
SHA512c3cb7f118079e0a3dd113a870f220dcfce08b913bf64c784a71dda451df78557885f3272051df8bfff1a64457b9ed31b95f264c43ca5dbea6d0434f641f53eae
-
Filesize
174KB
MD501127829196770ec06b1ec31956fe3f2
SHA19e3f7032122c65a05fe0e8ed8bfa0076c1915923
SHA2561d48c0aa7f9925c1e751c4021b8df169520c59fd1af08d6993168a4a398be824
SHA512829a15cb3ccef47f673655994d77d17fb5dc8200219db5a0e55792438ee0c5f42e99f5a843ae8717d7ef15322055509dadf5aa40be0a0a77f2af54d66129cb28
-
Filesize
174KB
MD501127829196770ec06b1ec31956fe3f2
SHA19e3f7032122c65a05fe0e8ed8bfa0076c1915923
SHA2561d48c0aa7f9925c1e751c4021b8df169520c59fd1af08d6993168a4a398be824
SHA512829a15cb3ccef47f673655994d77d17fb5dc8200219db5a0e55792438ee0c5f42e99f5a843ae8717d7ef15322055509dadf5aa40be0a0a77f2af54d66129cb28