Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe
Resource
win10v2004-20241007-en
General
-
Target
705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe
-
Size
777KB
-
MD5
0367a4874aeba4b3ecbfb20b7f455b31
-
SHA1
77582a1b5b5bbfe7c1ae0af51cdc9472d57108fe
-
SHA256
705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0
-
SHA512
a46e85ba514c257b04535c7bb1a274a595ddb56c5835db451b08e4196280d9d4ef392a4ffcf89b2ccd3eef023acc7235b7b252b25e96688ae885ac87865d6585
-
SSDEEP
24576:4ypsjaWOH4r5U71yt8EojxjBINTrn8IrfSH:/2JFU78iEy9wh
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca1-20.dat healer behavioral1/memory/4968-22-0x0000000000530000-0x000000000053A000-memory.dmp healer behavioral1/memory/3560-29-0x00000000008A0000-0x00000000008BA000-memory.dmp healer behavioral1/memory/3560-31-0x0000000002370000-0x0000000002388000-memory.dmp healer behavioral1/memory/3560-59-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-57-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-55-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-53-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-51-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-47-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-37-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-45-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-43-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-41-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-39-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-49-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-35-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-33-0x0000000002370000-0x0000000002382000-memory.dmp healer behavioral1/memory/3560-32-0x0000000002370000-0x0000000002382000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f3502WR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f3502WR.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f3502WR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f3502WR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f3502WR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f3502WR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h97Lc81.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3128-67-0x0000000004B30000-0x0000000004B76000-memory.dmp family_redline behavioral1/memory/3128-68-0x0000000004BF0000-0x0000000004C34000-memory.dmp family_redline behavioral1/memory/3128-70-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-80-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-102-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-100-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-98-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-94-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-90-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-88-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-86-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-84-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-82-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-78-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-76-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-74-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-72-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-96-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-92-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline behavioral1/memory/3128-69-0x0000000004BF0000-0x0000000004C2E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 4576 niba5711.exe 524 niba0003.exe 4968 f3502WR.exe 3560 h97Lc81.exe 3128 iDdKj02.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h97Lc81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f3502WR.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h97Lc81.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba5711.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba0003.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 632 3560 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niba0003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h97Lc81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iDdKj02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niba5711.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4968 f3502WR.exe 4968 f3502WR.exe 3560 h97Lc81.exe 3560 h97Lc81.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4968 f3502WR.exe Token: SeDebugPrivilege 3560 h97Lc81.exe Token: SeDebugPrivilege 3128 iDdKj02.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4088 wrote to memory of 4576 4088 705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe 87 PID 4088 wrote to memory of 4576 4088 705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe 87 PID 4088 wrote to memory of 4576 4088 705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe 87 PID 4576 wrote to memory of 524 4576 niba5711.exe 88 PID 4576 wrote to memory of 524 4576 niba5711.exe 88 PID 4576 wrote to memory of 524 4576 niba5711.exe 88 PID 524 wrote to memory of 4968 524 niba0003.exe 89 PID 524 wrote to memory of 4968 524 niba0003.exe 89 PID 524 wrote to memory of 3560 524 niba0003.exe 95 PID 524 wrote to memory of 3560 524 niba0003.exe 95 PID 524 wrote to memory of 3560 524 niba0003.exe 95 PID 4576 wrote to memory of 3128 4576 niba5711.exe 102 PID 4576 wrote to memory of 3128 4576 niba5711.exe 102 PID 4576 wrote to memory of 3128 4576 niba5711.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe"C:\Users\Admin\AppData\Local\Temp\705b11db0cf933af567d919a3bb25e0b8cc9768fb5f6b638b6029e14715140c0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba5711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba5711.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba0003.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba0003.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3502WR.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f3502WR.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h97Lc81.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h97Lc81.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 10845⤵
- Program crash
PID:632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iDdKj02.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iDdKj02.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3560 -ip 35601⤵PID:3008
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635KB
MD502e4913546ccdf8bfc8f80daa8ae0463
SHA18e9ed3851ea59dc646cc1fb5a9686d0b1ebabfee
SHA2560d2aeab589e66bc2af8825e0e0449d8762ad3586c753f2a3b8ef9071a9338f29
SHA51284d3d4f1bc04464d95abbc83690bac279a628adf02bdc62bcb2767a5d3d8b5f69d5446e4596c793d7d173bd32ba56737e09edfeb32ff5cfdd19223a59c730349
-
Filesize
287KB
MD5a8b7dd84ddda5bd29f9e1a6de036feea
SHA1243a1d14e714a46b1a0a66e6cd20cd3a76aa163d
SHA256ec566375190f3ec7438a9dd6474b2f75a515ca51e70686b7d4ace9daec33b658
SHA5128e8cfa700cfdbc217ebe36c639cca0e246730ce3e6cbbc289dab8fbc3cf602218340b717a1112b1ba299098dd62edeb500cd4ca65ae4d55314e5ceadd34a7919
-
Filesize
314KB
MD5617d48d250a9832865b48d565a696fba
SHA171cad04bdae0b21743c6fed69e080618003732f8
SHA256ef756b45b6d465f94f914bbcad3e0e793e69bf10c737e7ca102363ad5ebd4e65
SHA512fed804cfff1b53a5053fa7fb592cf6a3912f89e381427f5461e24c6a8779ec1de8b788db0c21954b720bdf3dc6383c425d4e9ae88c308202ba5063c3c1e97ce1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
229KB
MD5c5013f742c2f23d212033ba2fab5e36a
SHA1064cb4f934280ecad09b73b2eaaf180e57daf267
SHA2562e8f7fb3e1f60c242e3345c0ebca7d24b4613a4f2bcc8b7aab964dfc544946bc
SHA512c5c4e062a6ecef324c2070fb60daa07a40cda370634a66f35b5666d8e65041091b269b97ce3df8466b0a378d5b5a9b6d273ba5a4b9c06e3801311e35c92e1e88