Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 13:11
Static task
static1
Behavioral task
behavioral1
Sample
a0dc2f970d7bf96dc36bf2de4f43249ebc9cf3ed60472ec1e489ff2c49e00e25.exe
Resource
win10v2004-20241007-en
General
-
Target
a0dc2f970d7bf96dc36bf2de4f43249ebc9cf3ed60472ec1e489ff2c49e00e25.exe
-
Size
705KB
-
MD5
08381b50151deae2f9341a66455458db
-
SHA1
c90f2486947454093e2e54464bf89a5cdfd143d2
-
SHA256
a0dc2f970d7bf96dc36bf2de4f43249ebc9cf3ed60472ec1e489ff2c49e00e25
-
SHA512
8e371c057fc82a22125ba100216733de58ccdf17dfe3deddaae5f6b88b7fcaee0f75e7611cd3c7ece35122e2631950b56ed9741c958735876e592364761bedec
-
SSDEEP
12288:5y90HkOkY/8svKcs828XCtG7Z8CD8GpqOS8TiJsgKvj0sWW+KQEkUL:5yGBEsvKzdxty0GpqOrTiJsgKvj0zKxn
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4488-18-0x00000000047B0000-0x00000000047CA000-memory.dmp healer behavioral1/memory/4488-20-0x0000000004AC0000-0x0000000004AD8000-memory.dmp healer behavioral1/memory/4488-46-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-48-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-44-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-42-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-40-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-38-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-36-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-34-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-32-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-30-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-28-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-26-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-24-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-22-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer behavioral1/memory/4488-21-0x0000000004AC0000-0x0000000004AD2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr782479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr782479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr782479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr782479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr782479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr782479.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/5072-60-0x0000000007120000-0x000000000715C000-memory.dmp family_redline behavioral1/memory/5072-61-0x00000000071A0000-0x00000000071DA000-memory.dmp family_redline behavioral1/memory/5072-69-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-77-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-95-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-93-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-89-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-87-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-85-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-83-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-81-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-75-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-73-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-71-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-91-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-79-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-67-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-65-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-63-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/5072-62-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1724 un201924.exe 4488 pr782479.exe 5072 qu813107.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr782479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr782479.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a0dc2f970d7bf96dc36bf2de4f43249ebc9cf3ed60472ec1e489ff2c49e00e25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un201924.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 556 4488 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu813107.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0dc2f970d7bf96dc36bf2de4f43249ebc9cf3ed60472ec1e489ff2c49e00e25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un201924.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr782479.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4488 pr782479.exe 4488 pr782479.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4488 pr782479.exe Token: SeDebugPrivilege 5072 qu813107.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4144 wrote to memory of 1724 4144 a0dc2f970d7bf96dc36bf2de4f43249ebc9cf3ed60472ec1e489ff2c49e00e25.exe 84 PID 4144 wrote to memory of 1724 4144 a0dc2f970d7bf96dc36bf2de4f43249ebc9cf3ed60472ec1e489ff2c49e00e25.exe 84 PID 4144 wrote to memory of 1724 4144 a0dc2f970d7bf96dc36bf2de4f43249ebc9cf3ed60472ec1e489ff2c49e00e25.exe 84 PID 1724 wrote to memory of 4488 1724 un201924.exe 85 PID 1724 wrote to memory of 4488 1724 un201924.exe 85 PID 1724 wrote to memory of 4488 1724 un201924.exe 85 PID 1724 wrote to memory of 5072 1724 un201924.exe 100 PID 1724 wrote to memory of 5072 1724 un201924.exe 100 PID 1724 wrote to memory of 5072 1724 un201924.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0dc2f970d7bf96dc36bf2de4f43249ebc9cf3ed60472ec1e489ff2c49e00e25.exe"C:\Users\Admin\AppData\Local\Temp\a0dc2f970d7bf96dc36bf2de4f43249ebc9cf3ed60472ec1e489ff2c49e00e25.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201924.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201924.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr782479.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr782479.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 10844⤵
- Program crash
PID:556
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu813107.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu813107.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4488 -ip 44881⤵PID:3196
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD53af06e03a2671304ebb752380453800f
SHA155db3a999546a2d79215555aae2d07d8473864f5
SHA2568c5dafd470c69bd22a971dbad93c7edd72e3b4fb2872a533820f45ad014100dc
SHA51212a9ed161c52110bf04ef1958f67d7a678fcd1a21819508b9f252e0313b5f9b1100a2f0d8064a9be390b32f6a343b7e9348ec8415e3862f080ef498288933254
-
Filesize
286KB
MD58090bb6d1da851696e30531d1ea7ecd8
SHA13780384500871cd6df3a60940594bbc25e56f899
SHA25661ee5350a872eb6cfd8b82cd1d2e435ff5926ccabafd4230c7ecae8077960a4a
SHA5121083e79c021e609dd29c42dc7c931f0112913e3ad636fd3c60b0887d2fd8e82ea2deb43c17a65c7a5856969dda8408b9bcde9092d7b5cce98a1859a9ac022161
-
Filesize
368KB
MD532775dde45dffa71720afc57c5d24a74
SHA1ddf14520e320bdf2e67b35c307210a0b63ffa52a
SHA2564f778220b18a33a58371f70b7a9e3eb90ffb8eae69bf05729ed4c87a564ed5aa
SHA512d8e479ebd2edb38a0e15a6e09220a6a581e67dc21f25c90ffa5ca3a1beddea8630baa088dae35c794612155086668ef8bcde03190da243360e615f7f42c97ac5