Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
4090bf86bf48b7e5916f2b98d9fbaa583475f0bd689e82539d318711021268f3.exe
Resource
win10v2004-20241007-en
General
-
Target
4090bf86bf48b7e5916f2b98d9fbaa583475f0bd689e82539d318711021268f3.exe
-
Size
666KB
-
MD5
599aa6510a715e5d4322aa71b54420fe
-
SHA1
60c30dd45ffae8c314f1b974c4d1a7cdfd0c5134
-
SHA256
4090bf86bf48b7e5916f2b98d9fbaa583475f0bd689e82539d318711021268f3
-
SHA512
607c2128aa122094261970df2534b679961e9f9c847a67d5c3a1d8109f225e39760c39234dc34e1bc507080e81358cae0e85be1a8c6c957c5ef803e2d047e5b0
-
SSDEEP
12288:vMrcy90KvxQKdOXN3HKAXmPlaHON/lUM8utnTHKdmTGppL7b5gtSqd:fyZv+N3qemlaIpnbKUTGpxCSi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4888-19-0x0000000002510000-0x000000000252A000-memory.dmp healer behavioral1/memory/4888-21-0x00000000027D0000-0x00000000027E8000-memory.dmp healer behavioral1/memory/4888-33-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-49-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-47-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-45-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-43-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-41-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-39-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-37-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-31-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-29-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-27-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-25-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-35-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-23-0x00000000027D0000-0x00000000027E2000-memory.dmp healer behavioral1/memory/4888-22-0x00000000027D0000-0x00000000027E2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1903.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1903.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1903.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1903.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1903.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1903.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4092-61-0x00000000028F0000-0x0000000002936000-memory.dmp family_redline behavioral1/memory/4092-62-0x0000000005400000-0x0000000005444000-memory.dmp family_redline behavioral1/memory/4092-63-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-66-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-96-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-94-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-90-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-86-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-83-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-78-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-76-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-74-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-70-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-92-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-89-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-85-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-80-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-72-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-68-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4092-64-0x0000000005400000-0x000000000543F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4780 un978194.exe 4888 pro1903.exe 4092 qu8039.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1903.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1903.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4090bf86bf48b7e5916f2b98d9fbaa583475f0bd689e82539d318711021268f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un978194.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3416 4888 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4090bf86bf48b7e5916f2b98d9fbaa583475f0bd689e82539d318711021268f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un978194.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1903.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8039.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4888 pro1903.exe 4888 pro1903.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4888 pro1903.exe Token: SeDebugPrivilege 4092 qu8039.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3500 wrote to memory of 4780 3500 4090bf86bf48b7e5916f2b98d9fbaa583475f0bd689e82539d318711021268f3.exe 84 PID 3500 wrote to memory of 4780 3500 4090bf86bf48b7e5916f2b98d9fbaa583475f0bd689e82539d318711021268f3.exe 84 PID 3500 wrote to memory of 4780 3500 4090bf86bf48b7e5916f2b98d9fbaa583475f0bd689e82539d318711021268f3.exe 84 PID 4780 wrote to memory of 4888 4780 un978194.exe 85 PID 4780 wrote to memory of 4888 4780 un978194.exe 85 PID 4780 wrote to memory of 4888 4780 un978194.exe 85 PID 4780 wrote to memory of 4092 4780 un978194.exe 96 PID 4780 wrote to memory of 4092 4780 un978194.exe 96 PID 4780 wrote to memory of 4092 4780 un978194.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4090bf86bf48b7e5916f2b98d9fbaa583475f0bd689e82539d318711021268f3.exe"C:\Users\Admin\AppData\Local\Temp\4090bf86bf48b7e5916f2b98d9fbaa583475f0bd689e82539d318711021268f3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un978194.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un978194.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1903.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1903.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 10844⤵
- Program crash
PID:3416
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8039.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8039.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4888 -ip 48881⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD5379df358c89f09946d818ed648017830
SHA16fa93a2b59d25ff688dec3a16c186564fe76d21f
SHA2561a41ac3c315b8f7a80ad05bbe3571b4d59f8a6fbb96edbc696c3367616e50d05
SHA512457d7f3411a4b802ff883e0eae5b719ec3a3b4864f1ed7ca08a1c9018d6cec48420a001b8e2b11c8ea58a3cdc93daad265aff15d43b47ddd80600a54491b97b5
-
Filesize
295KB
MD5a8f33561ef3341c82986e00947ab6774
SHA16c5967619347055d4f44e0f09d1700002c636967
SHA25680a884e721b5cef16325d2c4ff1aea994c0eba92933a76d3babc810748d26c5b
SHA5123fe83980e4752ae9f3fb5de970384bee2f19bbdc0004ff67c00d933822aca1b1786a79c6a5dfe7d17c4c4140706549921029ed5a897ed49d6260e280a68c7699
-
Filesize
353KB
MD520ed01089dc2b49d99b7209c5de43d96
SHA1dcfb81d089c9501a0286469728ddb9020f7b8f10
SHA256625c58dd9f188dd751eab11a6782a8ad4d720afe2c197f5396edce27b49702ef
SHA512226050bc5d5982ce22b00387284a8d41279b742ab7ad75c9e7718c26080dcfa84a19f5a83150275a8965c115a8ce7000608c7a4c306b3064c9eebd555cf8806f