Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
fa60b38bd6bb045ce86b17f8f41b80822f985b6b6c6f35b2ef1a8b3e762f551f.exe
Resource
win10v2004-20241007-en
General
-
Target
fa60b38bd6bb045ce86b17f8f41b80822f985b6b6c6f35b2ef1a8b3e762f551f.exe
-
Size
747KB
-
MD5
aee91897c7d89e27d63be49ebc22d243
-
SHA1
b897900aa87ddc3e404653cac8c5fcc6da1bc85b
-
SHA256
fa60b38bd6bb045ce86b17f8f41b80822f985b6b6c6f35b2ef1a8b3e762f551f
-
SHA512
6ba85f6fd602edc92b3c33530a26eb944a9a741694bd11fca990aad9e6f713c7b3686a0071186faf9f1f8f51bd0976d3028c6a60ad88a20dbec1ab57da8984a5
-
SSDEEP
12288:by90CMISGkjcEHhHaFjLb5UdpxioWB5TYmQJgy5rRrta:by1MI/EHhHeLbSd3dAEmAgurRrta
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2416-19-0x0000000000C10000-0x0000000000C2A000-memory.dmp healer behavioral1/memory/2416-21-0x0000000002860000-0x0000000002878000-memory.dmp healer behavioral1/memory/2416-22-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-49-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-47-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-46-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-43-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-41-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-39-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-37-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-36-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-33-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-31-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-29-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-27-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-25-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/2416-23-0x0000000002860000-0x0000000002872000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 60845427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 60845427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 60845427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 60845427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 60845427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 60845427.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4468-61-0x0000000002770000-0x00000000027AC000-memory.dmp family_redline behavioral1/memory/4468-62-0x0000000005500000-0x000000000553A000-memory.dmp family_redline behavioral1/memory/4468-64-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-63-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-66-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-72-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-76-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-74-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-95-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-92-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-90-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-86-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-84-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-80-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-79-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-96-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-88-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-82-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-70-0x0000000005500000-0x0000000005535000-memory.dmp family_redline behavioral1/memory/4468-68-0x0000000005500000-0x0000000005535000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2036 un684447.exe 2416 60845427.exe 4468 rk386092.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 60845427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 60845427.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fa60b38bd6bb045ce86b17f8f41b80822f985b6b6c6f35b2ef1a8b3e762f551f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un684447.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1636 2416 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa60b38bd6bb045ce86b17f8f41b80822f985b6b6c6f35b2ef1a8b3e762f551f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un684447.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60845427.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk386092.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2416 60845427.exe 2416 60845427.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2416 60845427.exe Token: SeDebugPrivilege 4468 rk386092.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2036 1580 fa60b38bd6bb045ce86b17f8f41b80822f985b6b6c6f35b2ef1a8b3e762f551f.exe 87 PID 1580 wrote to memory of 2036 1580 fa60b38bd6bb045ce86b17f8f41b80822f985b6b6c6f35b2ef1a8b3e762f551f.exe 87 PID 1580 wrote to memory of 2036 1580 fa60b38bd6bb045ce86b17f8f41b80822f985b6b6c6f35b2ef1a8b3e762f551f.exe 87 PID 2036 wrote to memory of 2416 2036 un684447.exe 88 PID 2036 wrote to memory of 2416 2036 un684447.exe 88 PID 2036 wrote to memory of 2416 2036 un684447.exe 88 PID 2036 wrote to memory of 4468 2036 un684447.exe 97 PID 2036 wrote to memory of 4468 2036 un684447.exe 97 PID 2036 wrote to memory of 4468 2036 un684447.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa60b38bd6bb045ce86b17f8f41b80822f985b6b6c6f35b2ef1a8b3e762f551f.exe"C:\Users\Admin\AppData\Local\Temp\fa60b38bd6bb045ce86b17f8f41b80822f985b6b6c6f35b2ef1a8b3e762f551f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684447.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un684447.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\60845427.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\60845427.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 10844⤵
- Program crash
PID:1636
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk386092.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk386092.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2416 -ip 24161⤵PID:1148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5eb28df465ac40e71e075a34bb630f995
SHA1ce6d98105155bd8368682ff825ab5a6e6ebeb133
SHA2567457f27807200f1102174b81d9ec685cdaf8fa7373184263e93f4f3a7b391da3
SHA512c8fe3809681c02844a2844286163fd76f9fa75a655faf794c21e088e0f093445f28e0d853d7e29fc2fda97917b39d106c2a4e0fa3315f1872d39b13791be5d55
-
Filesize
378KB
MD503afd8afa9c9be9247ea1bf3f7fb074e
SHA19f38888485561856881cc405ee0cdc0d3caefb70
SHA2564cfc04b10785528ef31be860933b342cce67f4359862ccd5af28ad12d2cafdfd
SHA512f93a056bd3ed49b0b1356e079f2ea1ee2710566c2288be9399790ed40c8bda765325bab83138a6567a2b1051b8a719e54f9fc675659dcd56908f94112a942722
-
Filesize
460KB
MD51f0789c65e963fd6fd62418f8bfa373a
SHA150b078713c2ffec4367ce3fe6e4d32401bb4d2cf
SHA2561845d9252baf4d4a3299c36efd4aab8383c24b404c1a4c4de0d3964794d0c8a7
SHA512669f6da20d31737fb29ded48707bd02ada5ed68bfd491c50524f3a21e15ed6ea2298fc4022a2d0ac969efba96f2c85e27c4912745e6ffb87162f7cc3bc4c8ba8