Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee.exe
Resource
win10v2004-20241007-en
General
-
Target
3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee.exe
-
Size
550KB
-
MD5
b3eaa7306d7a80b3b41dfda3aab9c97e
-
SHA1
223741db58ef3bf4f82d961d2e9ec688f4435856
-
SHA256
3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee
-
SHA512
dddb1228c1ccb86f7e4f9db3d41e3d8a3704bfb9faf3115136716f6f3cde965538650ad206cb0cd19de59b4a2bf542e6cb71c39cf6c44f4111cbcc52cfa2e777
-
SSDEEP
12288:nMrEy90zx4yi5Kud0jXnv8FzphtckFj86mbTarG:Hy89iajXv8Fz6/6ma6
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cc0-12.dat healer behavioral1/memory/2660-15-0x00000000003A0000-0x00000000003AA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw74zj85rS57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw74zj85rS57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw74zj85rS57.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw74zj85rS57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw74zj85rS57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw74zj85rS57.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2132-22-0x0000000007180000-0x00000000071C6000-memory.dmp family_redline behavioral1/memory/2132-24-0x0000000007200000-0x0000000007244000-memory.dmp family_redline behavioral1/memory/2132-25-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-34-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-32-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-84-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-80-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-78-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-76-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-74-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-72-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-70-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-68-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-66-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-65-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-62-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-60-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-58-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-54-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-52-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-50-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-48-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-46-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-40-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-38-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-36-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-30-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-88-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-86-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-82-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-28-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-26-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-56-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-44-0x0000000007200000-0x000000000723E000-memory.dmp family_redline behavioral1/memory/2132-42-0x0000000007200000-0x000000000723E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2864 vmU0736te.exe 2660 sw74zj85rS57.exe 2132 tAw53IY15.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw74zj85rS57.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmU0736te.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmU0736te.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tAw53IY15.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 sw74zj85rS57.exe 2660 sw74zj85rS57.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2660 sw74zj85rS57.exe Token: SeDebugPrivilege 2132 tAw53IY15.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4736 wrote to memory of 2864 4736 3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee.exe 87 PID 4736 wrote to memory of 2864 4736 3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee.exe 87 PID 4736 wrote to memory of 2864 4736 3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee.exe 87 PID 2864 wrote to memory of 2660 2864 vmU0736te.exe 88 PID 2864 wrote to memory of 2660 2864 vmU0736te.exe 88 PID 2864 wrote to memory of 2132 2864 vmU0736te.exe 89 PID 2864 wrote to memory of 2132 2864 vmU0736te.exe 89 PID 2864 wrote to memory of 2132 2864 vmU0736te.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee.exe"C:\Users\Admin\AppData\Local\Temp\3d78465e6518d39431a5ef69b21816c5828994bd2a51e62666a8954568c285ee.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmU0736te.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmU0736te.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw74zj85rS57.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw74zj85rS57.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tAw53IY15.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tAw53IY15.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD5002d44ddfa6f9184f57ee6e1702aa1d0
SHA11dd19adeea6a26e0937c0d8f87e7b2b1616e13bb
SHA25696d6cd474368876a92b30f90b4d955e7d33e32bef76d39d4da56a78c1ead7280
SHA5122c606c16e579a8a7f0b3bcd6f4eec02e1e5fc24f4615732a2e8da98fb711abd05b9c145f83221bcb630dcaba36d22e075b3c505826b296145abaa30f9c905fc8
-
Filesize
17KB
MD533a88c84a5894edb6dee9ca59113ef7e
SHA1528277380941d61825d533e0fad17961aa34c6d1
SHA2561c5f3c9b6f171ac3320eaacc1ac5052dad5e5b2ba7f2b18931950922b0bad9e7
SHA512edfcb899be28da635b87e201b36432dcb3d01a4796bd77dc095011ecdb5d825da4fcb090cf304b19618047a123582b3ae511ba0fb75b8e7b7a5318cafb802aea
-
Filesize
387KB
MD5114729e73998f8b36384a7c4cadcf3b0
SHA1aca4ea52bbd204fa016311eb5e1f6ef9770f2362
SHA256dbeeca1aaeaa247cb4a672c8741e578a235817831a080ce894a08d71a1bbb7fa
SHA5124044a648270d77f84c822346d483fa32a39c24b3088a874a4d9e53584ed228e1a67c4c10654eb20209dc48339308d65c5c8bde33f26eb6e5d0741f354f24cc44