Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

29/10/2024, 12:49 UTC

241029-p2kbwswqel 10

07/05/2023, 07:46 UTC

230507-jl68tsfe27 10

Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2024, 12:49 UTC

General

  • Target

    e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe

  • Size

    706KB

  • MD5

    a57eaa069601c17aff489167c2a819e5

  • SHA1

    d9087bc4e79264a8a47324c0a373f3a101c083ee

  • SHA256

    e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a

  • SHA512

    8cd870ca8dd9a5b1fca449d7e960efefd6428f8f71cb7112224a0b2701d2660d97661c208a4438a4423770fb897f8d786797ed42f6691fc72e199d7a47a51657

  • SSDEEP

    12288:jy90TiPXDCcW9nLRnB3tcCHzU8j8y+Sr2dg2EoyzPqOzUpNdXtlWRKjp8S:jyQgE9nNB3Nw8WSr2ZTyhzcdXtAcjp8S

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
    "C:\Users\Admin\AppData\Local\Temp\e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460721.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460721.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr352157.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr352157.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu619011.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu619011.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2744

Network

    No results found
  • 185.161.248.142:38452
    qu619011.exe
    152 B
    3
  • 185.161.248.142:38452
    qu619011.exe
    152 B
    3
  • 185.161.248.142:38452
    qu619011.exe
    152 B
    3
  • 185.161.248.142:38452
    qu619011.exe
    152 B
    3
  • 185.161.248.142:38452
    qu619011.exe
    152 B
    3
  • 185.161.248.142:38452
    qu619011.exe
    152 B
    3
  • 185.161.248.142:38452
    qu619011.exe
    104 B
    2
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un460721.exe

    Filesize

    551KB

    MD5

    a4c8943c5d021f12d17f93c6328328c4

    SHA1

    68ea049990962d746b6a536ed674e1566c44ead3

    SHA256

    baf59f967c98b99115168a74d1516e332573078399aff17ae49c1df8974db623

    SHA512

    269c3aa7c3588303d1157a98de77a67fad3fac50f80241778977f965c0ba1cec961f69368ecb7f77a1f3c621e04e5d70bbec4477d3c9f1f1c31d3264882d8657

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pr352157.exe

    Filesize

    286KB

    MD5

    a3c21d10a14315f68dc2329de4977403

    SHA1

    4a3fc4564ecbec45ff388773a5ddad89280b26b7

    SHA256

    382f2509df79a2fa34653bd0f9763971b0b4bc2bcb5142b9b1034b03a95fbed9

    SHA512

    2ad2b31d462d0faf34027a896dbd9ceaef2febb133b4df932dd9db1007c177c9fa5cc8506b7f6c6bb9a88b410201661c8479adc8be85eff93ee1ba724922efbd

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu619011.exe

    Filesize

    369KB

    MD5

    4b4514014cf7f85a6bc70736dac74ab5

    SHA1

    f1804216e8fbb186c377195b6afe78c1cb7266f1

    SHA256

    a2e1a1f6f4635554a4d5dc9741f612d25284338d5ef80e43d609f722881886ad

    SHA512

    3154e109f747fd30bb745a4236c1dc384e9a51a3ed90a2837cf39abed3cff9c3e6010e840a3834fe6dd6438c713e60e670028e82b8ec55e2576624463da377c0

  • memory/2744-89-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-81-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-68-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-69-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-71-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-73-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-75-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-77-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-79-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-97-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-83-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-85-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-87-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-91-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-93-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-95-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-66-0x0000000004860000-0x000000000489C000-memory.dmp

    Filesize

    240KB

  • memory/2744-67-0x00000000048A0000-0x00000000048DA000-memory.dmp

    Filesize

    232KB

  • memory/2744-99-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2744-101-0x00000000048A0000-0x00000000048D5000-memory.dmp

    Filesize

    212KB

  • memory/2868-49-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-54-0x0000000000400000-0x0000000002BB1000-memory.dmp

    Filesize

    39.7MB

  • memory/2868-28-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-25-0x0000000004750000-0x0000000004768000-memory.dmp

    Filesize

    96KB

  • memory/2868-29-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-35-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-37-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-24-0x00000000045C0000-0x00000000045DA000-memory.dmp

    Filesize

    104KB

  • memory/2868-41-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-43-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-55-0x0000000000400000-0x0000000002BB1000-memory.dmp

    Filesize

    39.7MB

  • memory/2868-51-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-53-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-31-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-26-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-47-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-45-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-39-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

  • memory/2868-34-0x0000000004750000-0x0000000004762000-memory.dmp

    Filesize

    72KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.