Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
49e87643f147c34a783c436459f53ba0653071176bac0dd2af0e8fdbaaf58fa3.exe
Resource
win10v2004-20241007-en
General
-
Target
49e87643f147c34a783c436459f53ba0653071176bac0dd2af0e8fdbaaf58fa3.exe
-
Size
1.1MB
-
MD5
d4c2095b8277a25e7d8bbea2b254327a
-
SHA1
741f21cb683efe35fd38c0ae7454c8e620013584
-
SHA256
49e87643f147c34a783c436459f53ba0653071176bac0dd2af0e8fdbaaf58fa3
-
SHA512
8a2e78a3ed342b7c305003606b2838be3a47c1600fc7e16f6aa2ffd8c38fe715a029cbbcf585f4c01c5eb4852301d37d79d65a1adaa2d25da67ee99661cf4fe0
-
SSDEEP
24576:1yKyXC6k4ceCQ5rMVMDWv3ssZt1tcWVLL:QKGTT1M0Z8J
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023caf-27.dat healer behavioral1/memory/2552-28-0x0000000000730000-0x000000000073A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz8934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz8934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz8934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz8934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz8934.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz8934.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4168-34-0x0000000007100000-0x000000000713C000-memory.dmp family_redline behavioral1/memory/4168-36-0x00000000071A0000-0x00000000071DA000-memory.dmp family_redline behavioral1/memory/4168-37-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-38-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-78-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-100-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-98-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-96-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-95-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-92-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-90-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-88-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-86-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-84-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-82-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-81-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-76-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-74-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-72-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-70-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-68-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-66-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-64-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-62-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-60-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-58-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-56-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-54-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-52-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-50-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-48-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-46-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-44-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-42-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline behavioral1/memory/4168-40-0x00000000071A0000-0x00000000071D5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 516 za832920.exe 4124 za870745.exe 3556 za020625.exe 2552 tz8934.exe 4168 v9222Zn.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz8934.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za832920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za870745.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" za020625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49e87643f147c34a783c436459f53ba0653071176bac0dd2af0e8fdbaaf58fa3.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2872 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49e87643f147c34a783c436459f53ba0653071176bac0dd2af0e8fdbaaf58fa3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language za832920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language za870745.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language za020625.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v9222Zn.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2552 tz8934.exe 2552 tz8934.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2552 tz8934.exe Token: SeDebugPrivilege 4168 v9222Zn.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4544 wrote to memory of 516 4544 49e87643f147c34a783c436459f53ba0653071176bac0dd2af0e8fdbaaf58fa3.exe 84 PID 4544 wrote to memory of 516 4544 49e87643f147c34a783c436459f53ba0653071176bac0dd2af0e8fdbaaf58fa3.exe 84 PID 4544 wrote to memory of 516 4544 49e87643f147c34a783c436459f53ba0653071176bac0dd2af0e8fdbaaf58fa3.exe 84 PID 516 wrote to memory of 4124 516 za832920.exe 85 PID 516 wrote to memory of 4124 516 za832920.exe 85 PID 516 wrote to memory of 4124 516 za832920.exe 85 PID 4124 wrote to memory of 3556 4124 za870745.exe 86 PID 4124 wrote to memory of 3556 4124 za870745.exe 86 PID 4124 wrote to memory of 3556 4124 za870745.exe 86 PID 3556 wrote to memory of 2552 3556 za020625.exe 87 PID 3556 wrote to memory of 2552 3556 za020625.exe 87 PID 3556 wrote to memory of 4168 3556 za020625.exe 96 PID 3556 wrote to memory of 4168 3556 za020625.exe 96 PID 3556 wrote to memory of 4168 3556 za020625.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\49e87643f147c34a783c436459f53ba0653071176bac0dd2af0e8fdbaaf58fa3.exe"C:\Users\Admin\AppData\Local\Temp\49e87643f147c34a783c436459f53ba0653071176bac0dd2af0e8fdbaaf58fa3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za832920.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za832920.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za870745.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za870745.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za020625.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za020625.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8934.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8934.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9222Zn.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9222Zn.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2872
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
899KB
MD5990432a209fd25da3c059423152f0b46
SHA1322c499564ec42b954a4547628c55bd97a9fe6fa
SHA25673c85672dd6418a9e49233bb37cb794e5068d106a0905cb573fddd60d9404310
SHA512d4a0858c05cf03c8a7ec2297a920933de62da398b8371ee84a2575016edee19d86e6f6a5377e12c38f7a99e8cda8ffd4aa6d71da03b4245deff2f2bc317ac0aa
-
Filesize
686KB
MD549775efb5c1947a5c254b5f8409eb6cb
SHA18f377ff9c264884955ff8ed06cb0bdf037192a82
SHA2569147533cbea6b4ed95a3aefd375d2c4cd529f811c6f8dd5eccd68c099b45c6da
SHA512dc3f5dca6e1fe153450868211d7e1bd76a5ac9370082b1e54196776b831d1969cc996974f622861a956aaa266ac346bf38ba9b4b49d1dafd1d7e62d793408aad
-
Filesize
405KB
MD5930f52ce78fa6ffb0dc7811beb89f86e
SHA1d26ed7f95bb85a7146fe8d73df3c51c538da2525
SHA256df4b895c6c66e39f0f4fc3563964cbdf9dc40af6bd52f21b8e671e3dc8ac82b6
SHA51275b620ae9fac815a23a93b3e71dec6be42c35a3adabb677a57fe7532d18c1dce3f79a529ef5fa41eabb89b36d9a55d6909e67ecb71d2d949bca25ea09a9c1414
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
352KB
MD5cab7f7ed4e337f5a06d2dd35e78e3720
SHA13cd0f749993ee8ccf41a4447120f98c8f77b557d
SHA256db80d7b9e899901b148ba1e4e514c75ecb7cb1f6488de80c90832ae249804cd9
SHA512278e08a50963fccbc4699e19a268e00fab37a2d4492e31e7927b176c4452c896c982bed557ea210db437eb5757aeec3ac826a878894253e49d01b6321e59ae81