Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
660cd93864059f23653b20035ddf65ca8ab2a6b7955845956e3ac0bdbbcd28ec.exe
Resource
win10v2004-20240412-en
General
-
Target
660cd93864059f23653b20035ddf65ca8ab2a6b7955845956e3ac0bdbbcd28ec.exe
-
Size
765KB
-
MD5
96a5cea23c1716449eb15f99d93edfec
-
SHA1
66f58e9b63aeedfc3164a127997c6be833920146
-
SHA256
660cd93864059f23653b20035ddf65ca8ab2a6b7955845956e3ac0bdbbcd28ec
-
SHA512
2b76e77439f2d9036065a54e18666fb9f7ad92683deb1f8816bfd28bd3c9df3e1d31b9a3118b1ff91a29656155401709bfafb1e3e25510b6fa4587a275fc9e1d
-
SSDEEP
12288:dy90HSrtyuZkQ0VyqZnkcPU8wft/fNzIVoGp0rmi/biJg82aBeqpri6W6Q39:dyWSrtyu2Q0VtdnUhFNzIVoWqmiTMgOS
Malware Config
Signatures
-
Detect ZGRat V1 20 IoCs
resource yara_rule behavioral1/memory/1496-61-0x0000000002860000-0x000000000289C000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-68-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-71-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-67-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-64-0x0000000005410000-0x000000000544A000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-73-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-75-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-77-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-79-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-81-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-83-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-85-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-87-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-89-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-91-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-93-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-95-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-97-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-99-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 behavioral1/memory/1496-101-0x0000000005410000-0x0000000005445000-memory.dmp family_zgrat_v1 -
Detects Healer an antivirus disabler dropper 18 IoCs
resource yara_rule behavioral1/memory/880-18-0x0000000002730000-0x000000000274A000-memory.dmp healer behavioral1/memory/880-21-0x0000000002810000-0x0000000002820000-memory.dmp healer behavioral1/memory/880-23-0x00000000027B0000-0x00000000027C8000-memory.dmp healer behavioral1/memory/880-25-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-24-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-27-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-29-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-31-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-35-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-37-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-33-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-49-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-47-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-45-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-43-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-41-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-51-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/880-39-0x00000000027B0000-0x00000000027C2000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr481470.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr481470.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr481470.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr481470.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr481470.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr481470.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1496-61-0x0000000002860000-0x000000000289C000-memory.dmp family_redline behavioral1/memory/1496-68-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-71-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-67-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-64-0x0000000005410000-0x000000000544A000-memory.dmp family_redline behavioral1/memory/1496-73-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-75-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-77-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-79-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-81-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-83-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-85-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-87-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-89-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-91-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-93-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-95-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-97-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-99-0x0000000005410000-0x0000000005445000-memory.dmp family_redline behavioral1/memory/1496-101-0x0000000005410000-0x0000000005445000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 18 IoCs
resource yara_rule behavioral1/memory/880-18-0x0000000002730000-0x000000000274A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-21-0x0000000002810000-0x0000000002820000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-23-0x00000000027B0000-0x00000000027C8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-25-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-24-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-27-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-29-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-31-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-35-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-37-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-33-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-49-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-47-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-45-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-43-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-41-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-51-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/880-39-0x00000000027B0000-0x00000000027C2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 20 IoCs
resource yara_rule behavioral1/memory/1496-61-0x0000000002860000-0x000000000289C000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-68-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-71-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-67-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-64-0x0000000005410000-0x000000000544A000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-73-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-75-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-77-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-79-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-81-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-83-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-85-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-87-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-89-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-91-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-93-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-95-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-97-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-99-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1496-101-0x0000000005410000-0x0000000005445000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Executes dropped EXE 3 IoCs
pid Process 4444 un606167.exe 880 pr481470.exe 1496 qu272517.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr481470.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr481470.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 660cd93864059f23653b20035ddf65ca8ab2a6b7955845956e3ac0bdbbcd28ec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un606167.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3644 880 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 880 pr481470.exe 880 pr481470.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 880 pr481470.exe Token: SeDebugPrivilege 1496 qu272517.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1516 wrote to memory of 4444 1516 660cd93864059f23653b20035ddf65ca8ab2a6b7955845956e3ac0bdbbcd28ec.exe 84 PID 1516 wrote to memory of 4444 1516 660cd93864059f23653b20035ddf65ca8ab2a6b7955845956e3ac0bdbbcd28ec.exe 84 PID 1516 wrote to memory of 4444 1516 660cd93864059f23653b20035ddf65ca8ab2a6b7955845956e3ac0bdbbcd28ec.exe 84 PID 4444 wrote to memory of 880 4444 un606167.exe 85 PID 4444 wrote to memory of 880 4444 un606167.exe 85 PID 4444 wrote to memory of 880 4444 un606167.exe 85 PID 4444 wrote to memory of 1496 4444 un606167.exe 100 PID 4444 wrote to memory of 1496 4444 un606167.exe 100 PID 4444 wrote to memory of 1496 4444 un606167.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\660cd93864059f23653b20035ddf65ca8ab2a6b7955845956e3ac0bdbbcd28ec.exe"C:\Users\Admin\AppData\Local\Temp\660cd93864059f23653b20035ddf65ca8ab2a6b7955845956e3ac0bdbbcd28ec.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un606167.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un606167.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr481470.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr481470.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 10804⤵
- Program crash
PID:3644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu272517.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu272517.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 880 -ip 8801⤵PID:3660
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610KB
MD5b29d673ce1bb3eb24787709a2074e8fd
SHA192307ca2dc5f538162368381583f64f403fea29d
SHA2562aa314b524e754edb0bd84fb3907353f6b18c1286e8d605c83b37e9080052d4f
SHA5123a2ea68b827daf1972c9955c0205f4214168849f84202752e4acc74bdaf51b7eaad4f3fc73f68bbab700db06b6ea76fae25c6ad382aff9e244f418291421ff32
-
Filesize
403KB
MD5079b082230b86057c1003d6802d5d375
SHA1f59fb36c9bdc3d6a3b1ca10554c414f58d12d05d
SHA2565cfb45177f2571c9467a416fa58e4d56ba18c300c693cbe8a6c248be738298c0
SHA5129e4a7d847e9e4bf142140f2e763d84463f762c399d2578261ede93e8562b251303167c9a2894e934698e8b71fd64bd3a4e1617d6302dd8f6084885f3b9281606
-
Filesize
486KB
MD5253b2ec97923381ce443a170f4df792d
SHA14290ccbc39a14c9615e1167cd84e20676652ef25
SHA256c11fcc608ebd3e568c203b0a5610075a3056273908f812de1a776c282e8c35be
SHA5129364ec8bd1819d8016374d41ea5d272bd255eee5316c3c9c7a0c300101dfb42a236ece1aef38c18601b3ebf9b7f916499b53233e23903324829cbb3ccb7cf9b0