Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/11/2024, 01:44

General

  • Target

    10560114082a4ad73efbd6fd854da77962bd60bf80a80112f1cdf2793c11f9bd.exe

  • Size

    661KB

  • MD5

    b52c6b390bcc2680758827a8cae3be3d

  • SHA1

    1296a37b6c88e076a1d8656518778d29cab741bd

  • SHA256

    10560114082a4ad73efbd6fd854da77962bd60bf80a80112f1cdf2793c11f9bd

  • SHA512

    629eae9d986c87dce91a138aadf97c0b86aab8905fd35c656f3e6f08de34e3a8cf422d425196004d84486abf29e675d1f7a167b71946bca3e1b929c252479979

  • SSDEEP

    12288:yMrCy90evTToXvU6C4vsA5PsGNSYGbL6cR6ltfmg8QMc8u:8yWvUGsA5EGNSbv6cR6ltft4A

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Detects Healer an antivirus disabler dropper 17 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Redline family
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10560114082a4ad73efbd6fd854da77962bd60bf80a80112f1cdf2793c11f9bd.exe
    "C:\Users\Admin\AppData\Local\Temp\10560114082a4ad73efbd6fd854da77962bd60bf80a80112f1cdf2793c11f9bd.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553397.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553397.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4482.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4482.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3816
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3816 -s 1084
          4⤵
          • Program crash
          PID:3960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5351.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5351.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3384
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3816 -ip 3816
    1⤵
      PID:1700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553397.exe

      Filesize

      518KB

      MD5

      40457ea9797c6cad42de556a17ae9178

      SHA1

      130d982f99c39c3d126f3f468e3ac26f70427bb5

      SHA256

      658f55a10cf0016b3899e786f732a0454ec915cd19881fda685ae1db874615cd

      SHA512

      313b27485927bbd134dd20e22a12668a6986bd0c777f04e66efa71efe7b2c44e96dcf3c1cc5911913e9b2ad5c5a366d9e92fd550fe8d5856899a24e9e4cb8217

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4482.exe

      Filesize

      276KB

      MD5

      65e2b9b0a298e1a4195a161c3c2f013c

      SHA1

      365cd3d65aaeb71f41d02653c61d2b8bd17889bc

      SHA256

      b57741087f2339b4b0a198bfe58817d98df97624ac1c117d2fae402eb5b86d70

      SHA512

      d9f986099f2b150911fb9b709e3fc7fed04d49793feee0f588e16846c5f783c28c48c871db1979ff66962d28bfa62ed77014e8542ee8cf048940eebb03e8b737

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5351.exe

      Filesize

      295KB

      MD5

      f863c67da2124c89ecca3d55001e2235

      SHA1

      7e6f66c82c9664f7b2b5c56c70f26cc26f3cd25b

      SHA256

      1266834c69ef1d19bd146cf7e5d3e5dfbfbd9f83ac5db76befde4cf057c0a086

      SHA512

      cc0ee86684965d5d0c56340336abbbdf0b328dfd8e8337b3533fb88a7907db894c8b2d8696a72fb8fb96366001f7fd092e840ace38a2d7b25182f433c03fc0ce

    • memory/3384-84-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-88-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-970-0x0000000005790000-0x000000000589A000-memory.dmp

      Filesize

      1.0MB

    • memory/3384-969-0x0000000005140000-0x0000000005758000-memory.dmp

      Filesize

      6.1MB

    • memory/3384-72-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-74-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-76-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-78-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-80-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-82-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-972-0x00000000058F0000-0x000000000592C000-memory.dmp

      Filesize

      240KB

    • memory/3384-973-0x0000000005A40000-0x0000000005A8C000-memory.dmp

      Filesize

      304KB

    • memory/3384-86-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-971-0x00000000058D0000-0x00000000058E2000-memory.dmp

      Filesize

      72KB

    • memory/3384-90-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-92-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-94-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-63-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-64-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-66-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-68-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-70-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-96-0x0000000002480000-0x00000000024BF000-memory.dmp

      Filesize

      252KB

    • memory/3384-62-0x0000000002480000-0x00000000024C4000-memory.dmp

      Filesize

      272KB

    • memory/3384-61-0x00000000023E0000-0x0000000002426000-memory.dmp

      Filesize

      280KB

    • memory/3816-41-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-56-0x0000000000400000-0x0000000001ADC000-memory.dmp

      Filesize

      22.9MB

    • memory/3816-55-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3816-51-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3816-50-0x0000000001D00000-0x0000000001E00000-memory.dmp

      Filesize

      1024KB

    • memory/3816-22-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-23-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-25-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-27-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-29-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-31-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-33-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-35-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-37-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-39-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-43-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-45-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-47-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-49-0x0000000003D10000-0x0000000003D22000-memory.dmp

      Filesize

      72KB

    • memory/3816-20-0x0000000003D10000-0x0000000003D28000-memory.dmp

      Filesize

      96KB

    • memory/3816-21-0x0000000000400000-0x0000000001ADC000-memory.dmp

      Filesize

      22.9MB

    • memory/3816-19-0x0000000006290000-0x0000000006834000-memory.dmp

      Filesize

      5.6MB

    • memory/3816-18-0x0000000003B70000-0x0000000003B8A000-memory.dmp

      Filesize

      104KB

    • memory/3816-17-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/3816-16-0x0000000001E40000-0x0000000001E6D000-memory.dmp

      Filesize

      180KB

    • memory/3816-15-0x0000000001D00000-0x0000000001E00000-memory.dmp

      Filesize

      1024KB