Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
30e13a10fd6...cb.exe
windows10-2004-x64
100f3fc05fe2...99.exe
windows10-2004-x64
101437361c67...55.exe
windows10-2004-x64
1023bea5b85d...33.exe
windows10-2004-x64
1027054c4ef8...56.exe
windows10-2004-x64
102b700615cb...c1.exe
windows10-2004-x64
1030fb90dbd1...b4.exe
windows10-2004-x64
10312c299a84...a6.exe
windows7-x64
3312c299a84...a6.exe
windows10-2004-x64
1035d50aca92...42.exe
windows10-2004-x64
10627c0990f7...d9.exe
windows10-2004-x64
1065db5d7052...3e.exe
windows10-2004-x64
10677afbc183...fd.exe
windows7-x64
3677afbc183...fd.exe
windows10-2004-x64
10841ea03e18...82.exe
windows10-2004-x64
1085594a9dff...ab.exe
windows10-2004-x64
108c7a2623ea...7d.exe
windows10-2004-x64
109a0ecac5f6...8e.exe
windows10-2004-x64
10adaea581d9...c2.exe
windows10-2004-x64
10c64d3873d4...2e.exe
windows10-2004-x64
10ffa14d4c0b...02.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
0e13a10fd67a47892e598c6953856fd7786d3e7b1f70c519cae5cfe6b7ce37cb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0f3fc05fe2db9d3b03c0b7d1c6af9353f3d7c1d340577a71dabad5617658cb99.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
23bea5b85d6bafc9a62fa8bb8337d9c39b8f4f7d139c32113e8eaa6099afc933.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
27054c4ef87730930ab8bbec2331b567a7518f766c3e7f55e066fb7014ae3556.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2b700615cbaa89c4d3e0272582a4db8e51bcfe6c3333a5be92e93784b2855ac1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
30fb90dbd15d7cf28cd8c2c3ac256de3f63d31799b3d6452d6448ff5fc3a88b4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
312c299a844cf7520e53edede1e26057b44acb35e70aba017a6e87804cd037a6.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
312c299a844cf7520e53edede1e26057b44acb35e70aba017a6e87804cd037a6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
35d50aca923965e5a644e1735c8cd657d562282a8fddd8a654982c84f9258342.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
627c0990f7c6fa8cc9a276966f3e2b428f8323bdd73c68bdf8034799f948f0d9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
65db5d7052987e7e8d814719a1e9c77b7d0f755b7f100a0b3f0b0d1b83d9b43e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
677afbc18346258efc780d794cf589d9e949ec77c0f68fc663b38c6f663cf7fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
841ea03e181082fcf7f5533397a6731021c045058047518f2795b78fd69dda82.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
85594a9dffbaaedca9ea95760b5683bb9ed199e29a54525ac755697a6e18aaab.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
8c7a2623ea0bfbad72a17add57243068958fa7289cd1319d5cbc3af84eeac07d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
9a0ecac5f61531b0c28426e6e97edeaa0c930397169075cb98b077174beb638e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
adaea581d959a8c0e4a570708711cc0a4112daa9ef8d47d1f5dafe486a1b32c2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
c64d3873d4dbf74d0c6e28f27a09adb2a8c897e218d1a4a4f5822391bf80c92e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
ffa14d4c0be8bc789970a81ab0d1c4ceb689e261224f173a8dbd9609a9b45102.exe
Resource
win10v2004-20240508-en
General
-
Target
1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe
-
Size
390KB
-
MD5
461a41b00e56b7edc7c954b28a7ab0f3
-
SHA1
4b60bd82ddaf0916bda391168caafa6813c8d184
-
SHA256
1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55
-
SHA512
290ae015d12adb975cd1d5fd757e83be03d1de7e6b5b78ca06f8bab8aef88fb395d6d0b78393d1b5ab1be5b9f48146e247c09c7962d541a341f75c31fc123e46
-
SSDEEP
6144:KXy+bnr+1p0yN90QE+susNp+TPHNPdk1deU/4KlvZimAKtvqoDbcG4hJQURF0:hMrly908MHuPHzGeUPR5AiTbQHR+
Malware Config
Extracted
amadey
3.86
http://5.42.92.67
-
install_dir
ebb444342c
-
install_file
legola.exe
-
strings_key
5680b049188ecacbfa57b1b29c2f35a7
-
url_paths
/norm/index.php
Extracted
redline
krast
77.91.68.68:19071
-
auth_value
9059ea331e4599de3746df73ccb24514
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral3/files/0x000800000002342d-12.dat healer behavioral3/memory/3180-15-0x0000000000F60000-0x0000000000F6A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection p3786087.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p3786087.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p3786087.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p3786087.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p3786087.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p3786087.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral3/files/0x000700000002342b-32.dat family_redline behavioral3/memory/4804-33-0x0000000000330000-0x0000000000360000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation r4077298.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation legola.exe -
Executes dropped EXE 7 IoCs
pid Process 3728 z6287530.exe 3180 p3786087.exe 5224 r4077298.exe 2476 legola.exe 4804 t4795198.exe 1280 legola.exe 4020 legola.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p3786087.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6287530.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2156 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3180 p3786087.exe 3180 p3786087.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3180 p3786087.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3772 wrote to memory of 3728 3772 1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe 82 PID 3772 wrote to memory of 3728 3772 1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe 82 PID 3772 wrote to memory of 3728 3772 1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe 82 PID 3728 wrote to memory of 3180 3728 z6287530.exe 83 PID 3728 wrote to memory of 3180 3728 z6287530.exe 83 PID 3728 wrote to memory of 5224 3728 z6287530.exe 95 PID 3728 wrote to memory of 5224 3728 z6287530.exe 95 PID 3728 wrote to memory of 5224 3728 z6287530.exe 95 PID 5224 wrote to memory of 2476 5224 r4077298.exe 96 PID 5224 wrote to memory of 2476 5224 r4077298.exe 96 PID 5224 wrote to memory of 2476 5224 r4077298.exe 96 PID 3772 wrote to memory of 4804 3772 1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe 97 PID 3772 wrote to memory of 4804 3772 1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe 97 PID 3772 wrote to memory of 4804 3772 1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe 97 PID 2476 wrote to memory of 2156 2476 legola.exe 98 PID 2476 wrote to memory of 2156 2476 legola.exe 98 PID 2476 wrote to memory of 2156 2476 legola.exe 98 PID 2476 wrote to memory of 3740 2476 legola.exe 100 PID 2476 wrote to memory of 3740 2476 legola.exe 100 PID 2476 wrote to memory of 3740 2476 legola.exe 100 PID 3740 wrote to memory of 5336 3740 cmd.exe 102 PID 3740 wrote to memory of 5336 3740 cmd.exe 102 PID 3740 wrote to memory of 5336 3740 cmd.exe 102 PID 3740 wrote to memory of 2428 3740 cmd.exe 103 PID 3740 wrote to memory of 2428 3740 cmd.exe 103 PID 3740 wrote to memory of 2428 3740 cmd.exe 103 PID 3740 wrote to memory of 5208 3740 cmd.exe 104 PID 3740 wrote to memory of 5208 3740 cmd.exe 104 PID 3740 wrote to memory of 5208 3740 cmd.exe 104 PID 3740 wrote to memory of 6060 3740 cmd.exe 105 PID 3740 wrote to memory of 6060 3740 cmd.exe 105 PID 3740 wrote to memory of 6060 3740 cmd.exe 105 PID 3740 wrote to memory of 4540 3740 cmd.exe 106 PID 3740 wrote to memory of 4540 3740 cmd.exe 106 PID 3740 wrote to memory of 4540 3740 cmd.exe 106 PID 3740 wrote to memory of 4920 3740 cmd.exe 107 PID 3740 wrote to memory of 4920 3740 cmd.exe 107 PID 3740 wrote to memory of 4920 3740 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe"C:\Users\Admin\AppData\Local\Temp\1437361c67b59d113cebaa24a142650e8b8b3172ab6a6714c71515ad86d9fa55.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6287530.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6287530.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3786087.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\p3786087.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4077298.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4077298.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5224 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legola.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe" /F5⤵
- Creates scheduled task(s)
PID:2156
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legola.exe" /P "Admin:N"&&CACLS "legola.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:N"6⤵PID:2428
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legola.exe" /P "Admin:R" /E6⤵PID:5208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:6060
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"6⤵PID:4540
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E6⤵PID:4920
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4795198.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t4795198.exe2⤵
- Executes dropped EXE
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:1280
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legola.exe1⤵
- Executes dropped EXE
PID:4020
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD513bfd044f0c8e0094d8d3034ab2e0799
SHA15085edca67bb69cda5293df2f6b7e4dc34d28ca2
SHA2566cac6f1c34de64aee0f3c06ac59ca03dfe13ed95d54424e4324f43e1543450b3
SHA512c28f3b8cf22afcdde6199fb74df2ecf4b71ada46d7ba4ac74e36d912c2d90dcc7c03784247305a2051e0d74a94abbd2dcd2613591f6cde86a8e3b9f290a26f49
-
Filesize
234KB
MD525cb0b8858e09d787c3ebdfedb3a3c00
SHA1494d389aa2c8562749b61261c58bfd86487fe489
SHA2568018e1b6a8a774d26b17404f0efd8e921ffc3d98d759b8ef4a379416bea956d2
SHA512ba6d310809ffce0489777f563bcd334183dfce169e6ae55d6dc265f9c54d1faf4dd7780ee1823c28c4c91e1d12f4171a9bae4cd9078649e52089253a07710684
-
Filesize
11KB
MD5ebc18c0930b24f701d6a53185a72939c
SHA11049cec9e7bb27d735ae447286aa18d7e1993dad
SHA256b2501b84803871c8fdef2b7f65de00ac2480d84da05515f29b299cfc6585657e
SHA5125ceca9604513b89dbed91f154ff4151368c686804b27cdc1acdaa9ffaddf1a32e47189a5160c22597a97fefbcc76de24e260e89bfabb0936702ebb9a411c0470
-
Filesize
223KB
MD54541e5a1e02ea96db339a8751deba945
SHA145169ee283e91af3450a06ca7488aee3e1541ee0
SHA25676a230e48a3d7015f378a294877f2f76f7cd9345e3638d760318a1a8689d818d
SHA512b43f6733b30b52d62d33a761eea3ef69d6372fc441101a3393217bd5256085296d3113e1435afbd3c362928c79cfd0608974bff71d4e5beb6443b6069808871f