Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
955cdb8022fc586c90dedf7939de6d0a9500298a010ec4a0b53b4d7da5bd481e.exe
Resource
win10v2004-20241007-en
General
-
Target
955cdb8022fc586c90dedf7939de6d0a9500298a010ec4a0b53b4d7da5bd481e.exe
-
Size
674KB
-
MD5
4cbd1ac9fe3978bafefec0823698215b
-
SHA1
5d9d7130d552eed0fea6d2eda6c521556d93e7cc
-
SHA256
955cdb8022fc586c90dedf7939de6d0a9500298a010ec4a0b53b4d7da5bd481e
-
SHA512
184978e40bfdb3b3946668e5c0b5a43b105f68d2c2a9bb5ffee37190ee7d986cc506f6c45d900aa4e14fc647ebe6375d6b81f82715f2b9bdf4db786436faea4c
-
SSDEEP
12288:Dy90Je9T1rh/VRU6hfSGFP+JmAnNXKZrIqXQRhwlXs9kYrsXhrAqz:Dyce9hhDbFP+JmAnNXKZrzXfW9kYAhF
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2352-15-0x0000000002390000-0x00000000023AA000-memory.dmp healer behavioral1/memory/2352-18-0x0000000004AC0000-0x0000000004AD8000-memory.dmp healer behavioral1/memory/2352-36-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-42-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-48-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-46-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-44-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-40-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-38-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-34-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-32-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-30-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-28-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-26-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-24-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-22-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer behavioral1/memory/2352-21-0x0000000004AC0000-0x0000000004AD3000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 24870164.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 24870164.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 24870164.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 24870164.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 24870164.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 24870164.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/3572-57-0x00000000023A0000-0x00000000023DC000-memory.dmp family_redline behavioral1/memory/3572-58-0x0000000002580000-0x00000000025BA000-memory.dmp family_redline behavioral1/memory/3572-74-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-76-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-94-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-92-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-90-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-88-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-86-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-82-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-80-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-78-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-72-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-70-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-68-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-84-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-66-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-64-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-62-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-60-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline behavioral1/memory/3572-59-0x0000000002580000-0x00000000025B5000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 740 st819916.exe 2352 24870164.exe 3572 kp882329.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 24870164.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 24870164.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 955cdb8022fc586c90dedf7939de6d0a9500298a010ec4a0b53b4d7da5bd481e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st819916.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 955cdb8022fc586c90dedf7939de6d0a9500298a010ec4a0b53b4d7da5bd481e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language st819916.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24870164.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp882329.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2352 24870164.exe 2352 24870164.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2352 24870164.exe Token: SeDebugPrivilege 3572 kp882329.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2276 wrote to memory of 740 2276 955cdb8022fc586c90dedf7939de6d0a9500298a010ec4a0b53b4d7da5bd481e.exe 85 PID 2276 wrote to memory of 740 2276 955cdb8022fc586c90dedf7939de6d0a9500298a010ec4a0b53b4d7da5bd481e.exe 85 PID 2276 wrote to memory of 740 2276 955cdb8022fc586c90dedf7939de6d0a9500298a010ec4a0b53b4d7da5bd481e.exe 85 PID 740 wrote to memory of 2352 740 st819916.exe 86 PID 740 wrote to memory of 2352 740 st819916.exe 86 PID 740 wrote to memory of 2352 740 st819916.exe 86 PID 740 wrote to memory of 3572 740 st819916.exe 92 PID 740 wrote to memory of 3572 740 st819916.exe 92 PID 740 wrote to memory of 3572 740 st819916.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\955cdb8022fc586c90dedf7939de6d0a9500298a010ec4a0b53b4d7da5bd481e.exe"C:\Users\Admin\AppData\Local\Temp\955cdb8022fc586c90dedf7939de6d0a9500298a010ec4a0b53b4d7da5bd481e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st819916.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st819916.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24870164.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\24870164.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp882329.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp882329.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5b2fc08fe1150b16194430b036c5a892c
SHA1ce09518d09026182e422bf0dc1b6b439e0a95d77
SHA25613e97ad27a8c9d08db8fd9ba1ec63ce4fbb4e2a715e20343fc8dd810c4c4527a
SHA512220613662a91e255b5ed3818efadc77ac8c6c216d9a362a840e6e769f6ec55de2953ffdbafc7805bfa3a845ac50238beca9aac41b14e29f8849b69d4de0a7a1a
-
Filesize
175KB
MD509846796e84145cfc8cf63f18a3b788f
SHA1058499bd1b740e5938fe446527d042e88acf8b05
SHA256e4ed376eedc8500fe4192a964b6b40fd7326e41b119e685eee5af87906b82837
SHA5121ae105dc99e90037b41d1ad647e260c9db18d912b2853dc59cc976cab30b5c524069da284be160c94ab1ffe64f0addd09d018e6f6ac03b255b6562233fd18a4c
-
Filesize
415KB
MD5ae6eea091c9369db3a3d29b8bc66b4f4
SHA1ca144bc127c2a82e655f13204a08ffc65e2eea91
SHA256f3bf80e19216daf7d2571eda21276967a8a6a56ad4c27752c78877d5e7c93779
SHA51280c80646613a5349aad4152f8babe8e5d8cf4aba0a8f43d057711a943469a9dba121c229576f2bd88d9b86db7f25af89311ce998ee26ee166d07d080a3c6cbac