Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
608312e5a94be37df8805a0729a223eb5cbc5ed9d21225d617129a5cabb031d8.exe
Resource
win10v2004-20241007-en
General
-
Target
608312e5a94be37df8805a0729a223eb5cbc5ed9d21225d617129a5cabb031d8.exe
-
Size
491KB
-
MD5
06c4bd51cbf51954b34d81b43bd144f2
-
SHA1
e924fad84cc93ea850f632291b7a1692efd391f5
-
SHA256
608312e5a94be37df8805a0729a223eb5cbc5ed9d21225d617129a5cabb031d8
-
SHA512
4beecaa4ac861556d927ce0fbf9275b2938f0934c6c0c7d93807f88c0878e660bc6e2b864ae6de58b88963b3feaef7da82e51f6507a4b54d84e34ea0335f8edb
-
SSDEEP
12288:hMryy90tNXA8J+H4kcg1msGSksfQ+Yy2LhROG:bywNm4eIsDkoQ+YUG
Malware Config
Extracted
redline
lade
217.196.96.101:4132
-
auth_value
6e597bb53b7858f1eaca3f569cb16e1e
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2476-15-0x0000000002180000-0x000000000219A000-memory.dmp healer behavioral1/memory/2476-19-0x0000000002410000-0x0000000002428000-memory.dmp healer behavioral1/memory/2476-20-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-33-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-47-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-45-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-43-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-41-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-39-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-37-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-31-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-29-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-27-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-25-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-23-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-21-0x0000000002410000-0x0000000002422000-memory.dmp healer behavioral1/memory/2476-35-0x0000000002410000-0x0000000002422000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o3932238.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o3932238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o3932238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o3932238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o3932238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o3932238.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023b8b-53.dat family_redline behavioral1/memory/2756-55-0x0000000000C10000-0x0000000000C3E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4040 z1944079.exe 2476 o3932238.exe 2756 r4943099.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o3932238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o3932238.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 608312e5a94be37df8805a0729a223eb5cbc5ed9d21225d617129a5cabb031d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1944079.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 608312e5a94be37df8805a0729a223eb5cbc5ed9d21225d617129a5cabb031d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z1944079.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o3932238.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r4943099.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2476 o3932238.exe 2476 o3932238.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2476 o3932238.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4840 wrote to memory of 4040 4840 608312e5a94be37df8805a0729a223eb5cbc5ed9d21225d617129a5cabb031d8.exe 87 PID 4840 wrote to memory of 4040 4840 608312e5a94be37df8805a0729a223eb5cbc5ed9d21225d617129a5cabb031d8.exe 87 PID 4840 wrote to memory of 4040 4840 608312e5a94be37df8805a0729a223eb5cbc5ed9d21225d617129a5cabb031d8.exe 87 PID 4040 wrote to memory of 2476 4040 z1944079.exe 88 PID 4040 wrote to memory of 2476 4040 z1944079.exe 88 PID 4040 wrote to memory of 2476 4040 z1944079.exe 88 PID 4040 wrote to memory of 2756 4040 z1944079.exe 96 PID 4040 wrote to memory of 2756 4040 z1944079.exe 96 PID 4040 wrote to memory of 2756 4040 z1944079.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\608312e5a94be37df8805a0729a223eb5cbc5ed9d21225d617129a5cabb031d8.exe"C:\Users\Admin\AppData\Local\Temp\608312e5a94be37df8805a0729a223eb5cbc5ed9d21225d617129a5cabb031d8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1944079.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1944079.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o3932238.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o3932238.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4943099.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4943099.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD542092990daea1da03845faa13f93c54d
SHA1302194fe73568569dd4eb5aba37951cf46247b13
SHA25668d9855f5efa5018ac846653d3a2d07e17fc1fcdfc0032c369f9a96e50c913aa
SHA5121f0c3eeaf9f65dee1c15bc6e350c59bbf9d22f6b339d3d7c0b1e2b69a36a65675f325ed423f60a6dc0fa99fc4bef77f2a58f8b2ff8ce6059d983bc6fcaf8a746
-
Filesize
177KB
MD5d38bcad19c8593893c18f8fb870e1583
SHA1427da7efe362534e6ef6c42737b8541435978644
SHA256598a3a54f3b29a78865dd05e0fe15455f38e912d4f54a0ed100647dfa75af866
SHA512acb1f8d7be4d5bda7ed53da3f854dd802cecae786a9cda7a346b208c9906737af52a02c04a6d1cf5c2e22390fb413b4c6c9d08052f7e1f02a9cd8da63b31b009
-
Filesize
168KB
MD59f9190a8b5b86d984fef5ddc8372179b
SHA1dc25417120a0c2ca7a4b505340d6d47b9b055c53
SHA2567e8be0c8f2b311d37eda03f21d8be13e8686e8b95f952cf92ee994080a9bea48
SHA512f5c12c1db4b94a1164abc18400f90d49d83c4c753deb682a314c9cedd1c24a8ff4b356e2ab15b5b959a76b7f4343bc1e481f4a80180b498777e3d73f4b3faebc