Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2024, 14:27

General

  • Target

    97e24a7eb082738d2c0a83ee476ca3344eea562d4a392786f31b6f2137432304.exe

  • Size

    694KB

  • MD5

    b008e41a317cfee9a3649d3edb1d346b

  • SHA1

    6e7e2f0f200ac7912bd80e99db616a53b7fd0377

  • SHA256

    97e24a7eb082738d2c0a83ee476ca3344eea562d4a392786f31b6f2137432304

  • SHA512

    395bc0a03890e4f777c97df372a469248fffc85cd5c88d38e1e5cb9a11d4edb48ef362ed915dfa59d46762d77b083808c4cb5c12fb476b1fa6e8bfb6619a7792

  • SSDEEP

    12288:My903KQt7Eug6fQlo5hMwpFTxpvXewh4dnBWe6FX18bQKWA+jPazBfREzw43:My2e50hMoFbvXXhUl6FX18bQN9aZRhU

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97e24a7eb082738d2c0a83ee476ca3344eea562d4a392786f31b6f2137432304.exe
    "C:\Users\Admin\AppData\Local\Temp\97e24a7eb082738d2c0a83ee476ca3344eea562d4a392786f31b6f2137432304.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un786150.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un786150.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92195187.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92195187.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 1080
          4⤵
          • Program crash
          PID:1256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk755533.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk755533.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2448
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3932 -ip 3932
    1⤵
      PID:1756

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un786150.exe

      Filesize

      540KB

      MD5

      c898b5b44f0277c342fce2ef08c68217

      SHA1

      c124ab95e6c117899eac653164749d2b1236c266

      SHA256

      29b801bb047ccd9e60d9d297a70e4836e99700a591b6e860eba2bc7783bcfacd

      SHA512

      25741435e279c0e4a20cff9b62f2e9a9e64cbf86d77bdb27ec07047693369d773531ecefaf2383ad5b657a5ddd6c46e66acba485b3dcf63ba9bbdba4ffdd86ed

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92195187.exe

      Filesize

      258KB

      MD5

      7b0926faec08820eb311c6b8b64d5a83

      SHA1

      4ef99a38760ce749c09813415414f04d444857bf

      SHA256

      4e406901b380317dcfa23799aa567cc856ac9a3fb6210b8ca035f6d5551557ae

      SHA512

      8d7441456d15a383868af82b376f78383cba4a05e7fc7656e9d4e7b038d2b352b7b327d73e303bc354dbd23ae5491488c379dacc5f45583a7f793c60443e2f5a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk755533.exe

      Filesize

      340KB

      MD5

      f294b83a930c1e1ecb5f88617f7b9a5b

      SHA1

      f117f78f6bbc405bface6bc74e49dfe8cb034794

      SHA256

      f32fcba09ee2d5392e73a892bc6c8b3738adc691cf0c845e8e9dc44ab7ceff08

      SHA512

      ef2ea6a918f3585d0866f27b3b1732a0c66384e273f22822b676bc06dd7078e6f0e3b692ca24b493e00332a4ab603a3d16aa0ba3159adf9de5bd35b7fe053396

    • memory/2448-79-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-88-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-855-0x000000000A330000-0x000000000A342000-memory.dmp

      Filesize

      72KB

    • memory/2448-854-0x0000000009D10000-0x000000000A328000-memory.dmp

      Filesize

      6.1MB

    • memory/2448-67-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-70-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-71-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-73-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-75-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-77-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-857-0x000000000A470000-0x000000000A4AC000-memory.dmp

      Filesize

      240KB

    • memory/2448-858-0x0000000006C60000-0x0000000006CAC000-memory.dmp

      Filesize

      304KB

    • memory/2448-81-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-856-0x000000000A350000-0x000000000A45A000-memory.dmp

      Filesize

      1.0MB

    • memory/2448-89-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-91-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-93-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-95-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-83-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-85-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-65-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-63-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-62-0x0000000007180000-0x00000000071B5000-memory.dmp

      Filesize

      212KB

    • memory/2448-61-0x0000000007180000-0x00000000071BA000-memory.dmp

      Filesize

      232KB

    • memory/2448-60-0x0000000004AF0000-0x0000000004B2C000-memory.dmp

      Filesize

      240KB

    • memory/3932-38-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-54-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/3932-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3932-52-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3932-51-0x0000000002C70000-0x0000000002C9D000-memory.dmp

      Filesize

      180KB

    • memory/3932-49-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/3932-50-0x0000000002D10000-0x0000000002E10000-memory.dmp

      Filesize

      1024KB

    • memory/3932-21-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-22-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-24-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-26-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-28-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-30-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-32-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-34-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-36-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-40-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-44-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-46-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-48-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-42-0x0000000007150000-0x0000000007163000-memory.dmp

      Filesize

      76KB

    • memory/3932-20-0x0000000007150000-0x0000000007168000-memory.dmp

      Filesize

      96KB

    • memory/3932-19-0x00000000072C0000-0x0000000007864000-memory.dmp

      Filesize

      5.6MB

    • memory/3932-18-0x0000000004A90000-0x0000000004AAA000-memory.dmp

      Filesize

      104KB

    • memory/3932-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3932-16-0x0000000002C70000-0x0000000002C9D000-memory.dmp

      Filesize

      180KB

    • memory/3932-15-0x0000000002D10000-0x0000000002E10000-memory.dmp

      Filesize

      1024KB